<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 21 to 35.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/vidhi-doshi-fingerprint-payments-prompt-privacy-fears-in-india-the-guardian"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/will-the-magic-number-deliver-aadhaar-cslg-26042016"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/right-to-food-campaign-ranchi-convention-2016"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/economic-times-indulekha-aravind-january-15-2017-the-soon-to-be-launched-aadhaar-pay-will-let-you-make-purchases-using-your-fingerprint"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/wall-street-journal-gabriele-parussini-january-13-2017-indias-digital-id-rollout-collides-with-rickety-reality"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/financial-times-march-27-2017-amy-kazmin-indias-biometric-id-scans-make-sci-fi-a-reality"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/biometric-update-june-26-2021-chris-burt-advanced-biometric-technologies-and-new-market-entries-tackle-fraud-chase-digital-id-billions"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/tech-president-jessica-mckenzie-august-28-2014-the-uncertain-future-of-indias-plan-to-biometrically-identify-everyone"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-new-aadhaar-bill-in-plain-english"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/report-on-understanding-aadhaar-and-its-new-challenges"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/gov-now-pratap-vikram-singh-17032016-why-aadhaar-is-baseless"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/aadhaar-project-and-bill-faq"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/aadhaar-act-and-its-non-compliance-with-data-protection-law-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-last-chance-for-a-welfare-state-doesnt-rest-in-the-aadhaar-system"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/understanding-aadhaar-and-its-new-challenges-may-26-27-2016"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/vidhi-doshi-fingerprint-payments-prompt-privacy-fears-in-india-the-guardian">
    <title>Vidhi Doshi - Fingerprint Payments Prompt Privacy Fears in India (The Guardian)</title>
    <link>https://cis-india.org/internet-governance/news/vidhi-doshi-fingerprint-payments-prompt-privacy-fears-in-india-the-guardian</link>
    <description>
        &lt;b&gt;This article by Vidhi Doshi on the use of Aadhaar-based payments by private companies in India was published by The Guardian on February 09, 2017. Sumandro Chattapadhyay is quoted in the article.&lt;/b&gt;
        
&lt;p&gt;Originally published by &lt;a href="https://www.theguardian.com/sustainable-business/2017/feb/09/fingerprint-payments-privacy-fears-india-banknotes"&gt;The Guardian&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;For two years, Indian officials have been trawling the country, from city slums to unelectrified villages, zapping eyeballs, scanning fingerprints and taking photographs.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Last month, Indian shoppers started to see the results. With the launch of a government-backed fingerprint payment system, tied to India’s growing biometric data bank, registered citizens can – in theory at least – now pay for things with the touch of a finger.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;India’s extraordinary biometric database, named Aadhaar after a Hindi word for ‘foundation’, is the biggest of its kind in the world. It was initially sold to the public as a welfare delivery mechanism that would ensure the country’s 1.25bn citizens were each receiving the right quantity of subsidised rice or cooking fuel, while weeding out fraudsters.&lt;/p&gt;
&lt;p&gt;But now this pool of more than a billion people’s biometric data is being used by banks, credit checking firms and other private companies to identify customers, raising questions about privacy and security.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;As one of his flagship policies, prime minister Narendra Modi pledged to create a “digital India” in which the country’s cash-centric economy would switch to credit and debit cards, squeezing the parallel economy of untaxed cash transactions and giving more citizens access to digital financial services.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In a surprise television announcement last November, Modi announced the demonetisation of 500 and 1,000 rupee notes (around £6 and £12), wiping out 85% of the country’s circulating currency overnight.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Two days later, when the banks reopened, long queues snaked around almost every branch, with millions lining up to open bank accounts for the first time. Many used their 12-digit Aadhaar number, linked to their biometric profile, to sign up. Within three weeks, 3m bank accounts had been opened using fingerprint verification, according to estimates.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The moment marked a radical change for India’s banking system, under which applicants were traditionally required to file photocopies of passports or voter IDs. Banks could take weeks, sometimes months, to verify them. Now applicants’ encrypted biometric data can be sent to the Unique Identification Authority of India (UIDAI), a government agency, to be matched against their Aadhaar data, re-encrypted and sent back to the bank.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Despite technical teething problems, the system is designed to allow very fast authorisation. “All this happens in a matter or two or three seconds,” explains Ajay Bhushan Pandey, UIDAI’s director general.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;For Pandey, the benefits are clear: paper documents are easy to forge and hard to verify, especially in India where until recently thousands of people still used handwritten passports. Not so biometric data.&lt;/p&gt;
&lt;h4&gt;Privacy fears&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;Pandey emphasises that private banks and companies aren’t able to access the entire Aadhaar database, only to use the government interface, which allows them to verify identities.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Nonetheless, many Indians are worried about the privacy implications. Sumandro Chattapadhyay, a director at the Centre for Internet and Society thinktank, is one of them.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;For starters, says Chattapadhyay, the law governing use of the biometric database, fast-tracked through parliament last year, is flimsy when it comes to the private sector. Since India lacks a general privacy or data protection law, this leaves corporate use of Aadhaar services effectively unregulated, he says.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This is particularly worrying, says Chattapadhyay, because of the data-sharing possibilities opened up by Aadhaar. It makes it easier for companies not only to share information on individuals’ consumption and mobility habits, but also to link this data up with public records like the electoral register, he says. “Both lead to significant threats to privacy of individuals.”&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Chattapadhyay’s fear is that private companies could eventually gain access to government-held personal data, such as income or medical records, while the government could use company data like phone records to target specific individuals in political campaigns.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Already companies are linking Aadhaar numbers with collected metadata. Credit-checking startup CreditVidya, for example, identifies clients using their biometric ID in combination with their internet browsing history and other data, to assign credit scores for users who have no record of loan repayments. Banks then store this processed metadata, for example whether or not someone’s Facebook name is consistent with the name on their bank account.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Its founder Abhishek Agarwal admits there are risks for users: “[I]f someone managed to hack the bank’s security system, as well as the Aadhaar database, they could potentially be able to link your Facebook or LinkedIn data with your biometric information.” But he says this would be hard to do.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Pandey insists the companies are carefully vetted before they can use Aadhaar authentication. But, like Agarwal, he acknowledges the system can never be 100% secure: ““I wouldn’t say it is impossible to break the system, but it is very, very difficult.”&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/vidhi-doshi-fingerprint-payments-prompt-privacy-fears-in-india-the-guardian'&gt;https://cis-india.org/internet-governance/news/vidhi-doshi-fingerprint-payments-prompt-privacy-fears-in-india-the-guardian&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Vidhi Doshi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Demonetisation</dc:subject>
    
    
        <dc:subject>Digital Payment</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Biometrics</dc:subject>
    

   <dc:date>2017-02-13T09:21:42Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/will-the-magic-number-deliver-aadhaar-cslg-26042016">
    <title>"Will the Magic Number Deliver?" - Roundtable on Aadhaar at CSLG, JNU, April 26</title>
    <link>https://cis-india.org/internet-governance/news/will-the-magic-number-deliver-aadhaar-cslg-26042016</link>
    <description>
        &lt;b&gt;The Centre for the Study of Law and Governance (CSLG), Jawaharlal Nehru University (JNU), will organise a roundtable discussion on Tuesday, April 26, to discuss the Aadhaar project and Act. Along with Rajeev Chandrasekhar, Prasanna S, Apar Gupta, and Chirashree Dasgupta, Sumandro Chattapadhyay will be one of the discussants. It will  take place in the CSLG Conference Room at 6 pm.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Discussion Note&lt;/h3&gt;
&lt;p&gt;The Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Act, 2016, was enacted by the Parliament on March 16. Thereafter it has been notified on March 26.&lt;/p&gt;
&lt;p&gt;The Act empowers the UIDAI (Unique Identification Authority of India) to collect biometric and demographic information of residents to provide them with a unique number. This unique number is to be used for enumeration, identification and targeting of beneficiaries of government subsidies and services.&lt;/p&gt;
&lt;p&gt;Since the creation of the UIDAI as an executive authority in 2009, this process of enumeration has been ongoing. Recently, it was announced that more than 100 crore residents have been given their aadhaar cards. Alongside, however, legal challenges have continued in the Supreme Court.&lt;/p&gt;
&lt;p&gt;Given this context, this Roundatable Discussion will focus on the following set of questions (among others):&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;Can the Aadhaar Number enable better delivery of government subsidies and services?&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;How does the Act ensure data protection?&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Is there a right to privacy in India? What are the implications in the context of Aadhaar?&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Does the Act ensure public access to statutory remedies in case of violations?&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Did the Aadhaar Bill fulfil the requirements of a money bill?&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Discussion Format&lt;/h3&gt;
&lt;p&gt;Setting the Theme - Short Introduction to the Topic by Natasha Goyal&lt;/p&gt;
&lt;p&gt;Speakers' comments, 15 minutes each, consecutive, no power points&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;&lt;a href="https://twitter.com/rajeev_mp"&gt;Rajeev Chandrasekhar&lt;/a&gt;, Member of Parliament, Rajya Sabha&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="https://twitter.com/ajantriks"&gt;Sumandro Chattapadhyay&lt;/a&gt;, the Centre for Internet and Society&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="https://twitter.com/prasanna_s"&gt;Prasanna S&lt;/a&gt;, Lawyer&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="https://twitter.com/aparatbar"&gt;Apar Gupta&lt;/a&gt;, Advocate, Delhi High Court&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="http://www.jnu.ac.in/FacultyStaff/ShowProfile.asp?SendUserName=chirashree"&gt;Dr. Chirashree Dasgupta&lt;/a&gt;,  Centre for the Study of Law and Governance&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Open Session (Moderated Q and A)&lt;/p&gt;
&lt;p&gt;Followed by Tea&lt;/p&gt;
&lt;h3&gt;Directions to Venue&lt;/h3&gt;
&lt;p&gt;From JNU main gate, proceed straight until you get to a T-junction. Turn left. Continue until you reach a second T-junction. Turn right. Follow the road for just 0.7 km until you see a bus stop labelled “Paschimmabad.” About 50 m past the bus stop turn right at a sign that reads: “Centre for the Study of Law and Governance”. The CSLG  building is on the right. The conference room is on the first floor.&lt;/p&gt;
&lt;h3&gt;Poster&lt;/h3&gt;
&lt;img src="http://cis-india.org/internet-governance/news/will-the-magic-number-deliver-aadhaar-cslg-26042016/leadImage" alt="CSLG Roundtable Discussion - Will the Magic Number Deliver? - April 26, 6 pm" /&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/will-the-magic-number-deliver-aadhaar-cslg-26042016'&gt;https://cis-india.org/internet-governance/news/will-the-magic-number-deliver-aadhaar-cslg-26042016&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Digital India</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Biometrics</dc:subject>
    

   <dc:date>2016-04-20T10:49:58Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/right-to-food-campaign-ranchi-convention-2016">
    <title>Right to Food Campaign, Ranchi Convention, 2016</title>
    <link>https://cis-india.org/internet-governance/news/right-to-food-campaign-ranchi-convention-2016</link>
    <description>
        &lt;b&gt;The Right to Food Campaign held its 2016 Convention in Ranchi during September 23-25, 2016. While three years have elapsed since the passage of the National Food Security Act, despite improvements in the Public Distribution System (PDS), large implementation gaps remain. This is what the Convention focused on, and gathered researchers and campaigners from across the country to share experiences and case studies on effectiveness and exclusions from the PDS. Sumandro Chattapadhyay took part in a session of the Convention to discuss how UID-linked welfare delivery is being rolled out across key programmes like provision of pension and rationed distribution of essential commodities, and their impact on people's right to welfare services.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Right to Food Campaign: &lt;a href="http://www.righttofoodcampaign.in/"&gt;Website&lt;/a&gt;.&lt;/h4&gt;
&lt;h4&gt;Right to Food Campaign: &lt;a href="https://docs.google.com/viewer?a=v&amp;amp;pid=sites&amp;amp;srcid=ZGVmYXVsdGRvbWFpbnxoYXFyb3ppcm90aXxneDo3MmQ3MTMyZjU2N2FjOGU"&gt;Cash Transfers and UID: Our Main Demands&lt;/a&gt;.&lt;/h4&gt;
&lt;h4&gt;Ranchi Convention, 2016: &lt;a href="https://docs.google.com/document/d/110_asJ1t14IWALbhWN1RjDiOV8WE-fIK2xJC5Yltyc4/edit"&gt;Programme&lt;/a&gt;.&lt;/h4&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/right-to-food-campaign-ranchi-convention-2016'&gt;https://cis-india.org/internet-governance/news/right-to-food-campaign-ranchi-convention-2016&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Data Systems</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Welfare Governance</dc:subject>
    
    
        <dc:subject>Biometrics</dc:subject>
    
    
        <dc:subject>Big Data for Development</dc:subject>
    
    
        <dc:subject>UID</dc:subject>
    

   <dc:date>2019-03-16T04:40:52Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/economic-times-indulekha-aravind-january-15-2017-the-soon-to-be-launched-aadhaar-pay-will-let-you-make-purchases-using-your-fingerprint">
    <title>The soon-to-be launched Aadhaar Pay will let you make purchases using your fingerprint</title>
    <link>https://cis-india.org/internet-governance/news/economic-times-indulekha-aravind-january-15-2017-the-soon-to-be-launched-aadhaar-pay-will-let-you-make-purchases-using-your-fingerprint</link>
    <description>
        &lt;b&gt;Paying for your groceries and other goods by using your biometrics instead of an e-wallet, debit card or cash seems to be the next phase in the Centre’s ambitious push to shift the country to a “less cash” economy, as its mandarins term it.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Indulekha Aravind was &lt;a class="external-link" href="http://economictimes.indiatimes.com/news/economy/policy/the-soon-to-be-launched-aadhaar-pay-will-let-you-make-purchases-using-your-fingerprint/articleshow/56542475.cms"&gt;published in the Economic Times&lt;/a&gt; on 15 January 2017. Sunil Abraham was &lt;a class="external-link" href="http://economictimes.indiatimes.com/et-now/experts/sunil-abraham-on-aadhaars-misuse-during-demonetisation/videoshow/56544492.cms"&gt;consulted for this&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ajay  Bhushan Pandey, CEO of the Unique Identification Authority of India  (UIDAI), says it will be rolling out Aadhaar-enabled payment system, or  Aadhaar Pay, for merchants in the next few weeks. This will be an app  for merchants that enables them to receive payments through biometric  authentication of the customer, provided their bank accounts are linked  to their Aadhaar number. "A pilot is under way in fair price shops in  Andhra Pradesh where shopkeepers are accepting payments from PDS  beneficiaries. The results are very encouraging," says Pandey.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The idea takes off from the existing Aadhaar-enabled payment system (AEPS) used by bank business correspondents (BCs) in rural areas to disburse and accept cash, using micro ATMs. "We are trying to tweak this so that a similar device can be used by a local merchant," says Pandey. Adoption will depend on two factors: merchants’ acceptance of it and whether they can use an app rather than a micro ATM. The biggest advantage through this method of payment, says Pandey, is that the customer will not need a credit or debit card, or even a smartphone.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img alt="The soon-to-be launched Aadhaar Pay will let you make purchases using your fingerprint" class="gwt-Image" src="http://img.etimg.com/photo/56542603/page-19-1.jpg" title="The soon-to-be launched Aadhaar Pay will let you make purchases using your fingerprint" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  limits for transactions using AEPS, such as the number of daily  transactions, will be left to the discretion of the banks. In the long  term, the AEPS will be migrated to the BHIM (Bharat Interface for Money)  platform but the rollout of Aadhaar Pay will happen before that. Post  demonetisation, banking BC’s number of transactions using AEPS has leapt  from 4-5 lakh to 14-15 lakh, says Pandey. According to Reserve Bank of  India data on electronic payment systems, the total volume of such  transactions  jumped from 671 million in November 2016 to 957 million in December. USSD-based payments, which can be done using a basic feature phone, are among the biggest beneficiaries: the volume rose from just 7,000 in November to 1,02,000 in December, and value of transactions from over Rs 7,000 to over Rs 1 lakh. Prepaid payment instruments — mainly mobile wallets — rose from 59 million to 88 million in the same period (and value from Rs 1,300 crore to Rs 2,100 crore).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While Aadhaar Pay is likely to ride the demonetisation wave if it is launched soon, certain concerns remain, as the list is how secure such a payment system will be. The UIDAI CEO says it is a paramount concern for the organisation, too. "We are using the latest technology to ensure the information stays encrypted end to-end, so that information is not leaked or misused. In the months to come, we will strengthen the security."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Wary About Security&lt;/b&gt; &lt;br /&gt; Sunil Abraham, executive director of the Centre for Internet and  Society, a think tank that has been analysing the Aadhaar project for  six years, outlines several reasons why Aadhaar-based biometrics is  inappropriate for authentication in payments, unlike card-based payments  that use cryptography.  &lt;br /&gt; &lt;br /&gt; "With biometrics, there is always  an error ratio. It is imprecise matching, whereas with cryptography  (smart cards), there is no false positive or  negative. You either have the key (PIN) or you don’t. It is also very  cheap to defeat biometric authentication — even an unlettered person can  do it," says Abraham. It would be easy enough, he says, to replicate  someone else’s fingerprint by pressing it against lukewarm wax and  filling the mould with glue to get a dummy finger. In contrast,  compromising a smart card requires more cost and effort, from  tech-savviness to machines such as a skimmer that will read the card.  "And once you are compromised,you are compromised forever. You can’t change it, like a debit card PIN."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Using  Aadhaar for authentication had proved to be a failure during the  exchange of currency notes following demonetisation, he adds, pointing  to how the poor and the middle class stood in queues for money while  stacks of new currency were recovered from the homes of businessmen and  bureaucrats. "When you have bank officials who are corrupt, giving them  your biometrics is giving them more ammunition for corruption." To catch  the criminals, law enforcement agencies had to resort to CCTV footage,a  relatively older technology, he says. Others point out that while it  may be secure, certain factors stand in the way of making  biometrics-based payment authentication a large-scale success. Amrish  Rau, CEO of PayU India, a payment gateway provider, cites a list of  reasons why it would inevitably take off but only in 5-10 years.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"For  one, the technology is not yet good enough. There are also bandwidth  and data constraints in sending biometric data," says Rau. Even in more  mature markets, it has yet to find widespread acceptance, he says,  pointing to the slow adoption of Apple Pay and Samsung Pay in the US.  "It’s not the answer today.” This is in contrast to NITI Aayog CEO  Amitabh Kant’s recent remarks that cards and PoS machines would become  redundant by 2020 because Indians would be making payments using their  thumb (biometrics).  "... my view is that in the next two and a half years, India will make  all its debit cards, credit cards, all ATM machines, all PoS machines  totally irrelevant,” Kant had said at a Pravasi Bharatiya Divas session  in Bengaluru.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;UIDAI’s Pandey is more circumspect. “I wouldn’t say who would replace  what. But from the government’s side we are encouraging all modes of  digital payment. India has a diverse population and some people might  prefer using a card, others a wallet. Collectively, they will contribute  to a less-cash society.”&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/economic-times-indulekha-aravind-january-15-2017-the-soon-to-be-launched-aadhaar-pay-will-let-you-make-purchases-using-your-fingerprint'&gt;https://cis-india.org/internet-governance/news/economic-times-indulekha-aravind-january-15-2017-the-soon-to-be-launched-aadhaar-pay-will-let-you-make-purchases-using-your-fingerprint&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Demonetisation</dc:subject>
    
    
        <dc:subject>Digital Payment</dc:subject>
    
    
        <dc:subject>Digital Governance</dc:subject>
    
    
        <dc:subject>Digital Economy</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital Money</dc:subject>
    
    
        <dc:subject>Video</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Biometrics</dc:subject>
    

   <dc:date>2017-01-16T03:14:22Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/wall-street-journal-gabriele-parussini-january-13-2017-indias-digital-id-rollout-collides-with-rickety-reality">
    <title>India’s Digital ID Rollout Collides With Rickety Reality</title>
    <link>https://cis-india.org/internet-governance/news/wall-street-journal-gabriele-parussini-january-13-2017-indias-digital-id-rollout-collides-with-rickety-reality</link>
    <description>
        &lt;b&gt;India’s new digital identification system, years in the making and now being put into widespread use, has yet to deliver the new era of modern efficiency it promised for shop owner Om Prakash and customer Daya Chand.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Gabriele Parussini was published in the &lt;a class="external-link" href="http://www.wsj.com/articles/snags-multiply-in-indias-digital-id-rollout-1484237128?mod=e2fb"&gt;Wall Street Journal&lt;/a&gt; on January 13, 2017. Hans Varghese Mathews was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;At first, it drove both men up a tree.&lt;br /&gt;&lt;br /&gt;The system, which relies on fingerprints and eye scans to eventually provide IDs to all 1.25 billion Indians, is also expected to improve the distribution of state food and fuel rations and eventually facilitate daily needs such as banking and buying train tickets.&lt;br /&gt;&lt;br /&gt;But Mr. Prakash couldn’t confirm his customers’ identities until he dragged them to a Java plum tree in a corner of his village near New Delhi’s international airport. That was the only place to get the phone signal needed to tap into the government database.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“I hopped on a chair and put my finger in the machine,” said Mr.  Chand, a 60-year-old taxi driver. Getting his state food ration “used to  be much easier,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In &lt;a class="none icon" href="http://blogs.wsj.com/briefly/2017/01/13/indias-massive-aadhaar-biometric-identification-program-the-numbers/"&gt;a system so vast&lt;/a&gt;, even small glitches can leave millions of people empty-handed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="none icon" href="http://blogs.wsj.com/indiarealtime/2012/10/03/getting-indias-id-project-back-on-track/"&gt;The government began building the system&lt;/a&gt;,  called Aadhaar, or “foundation,” with great fanfare in 2009, led by a  team of pioneering technology entrepreneurs. Since then, almost 90% of  India’s population has been enrolled in what is now the world’s largest  biometric data set.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prime Minister Narendra Modi, who set aside  early skepticism about the Aadhaar project after taking power in 2014,  is betting that it can help India address critical problems such as  poverty and corruption, while also saving money for the government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But the technology is colliding with the rickety reality of India,  where many people live off the grid or have fingerprints compromised by  manual labor or age.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Panna Singh, a 55-year-old day laborer in  the northwestern state of Rajasthan who breaks stones used to build  walls, says the machine recognized his scuffed-up fingerprints only a  couple of times.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“I’ve come twice today,” he said at a ration shop in the village of Devdungri. “That’s a full day of work, gone.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Iris scans are meant to resolve situations where fingerprints don’t work, but shops don’t yet have iris scanners.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ajay Bhushan Pandey, chief executive of the government agency that  oversees Aadhaar, said kinks will be ironed out as the system is used,  as is the case with software rollouts. It works 92% of the time, and  that will rise to 95%, he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“On the scale of what [Aadhaar]  has achieved, the rollout has been remarkably smooth,” said Nandan  Nilekani, the Infosys co-founder who spearheaded the project. “I don’t  see any issues that are disproportionate to the size of project.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An  Aadhaar ID is intended to be a great convenience, replacing the  multitude of paperwork required by banks, merchants and government  agencies. The benefits are only just beginning, backers say, as the  biometric IDs are linked to programs and services.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But in rural  areas, home to hundreds of millions of impoverished Indians dependent on  subsidies, the impact of technical disruptions has already been  evident.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After walking for two hours across rough underbrush in  Rajasthan to get kerosene for the month, Hanja Devi left empty-handed  because the machine couldn’t match her fingerprint with her Aadhaar  number.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It’s always so difficult” using the system, said Ms. Devi, who lives  with her husband and a nephew on 1,500 rupees ($22) a month.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ranjit  Singh, who operates the shop, said five of the 37 customers before Ms.  Devi also left the shop empty-handed, a failure rate of over 15%.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A shop manager in a neighboring village said identification had failed for a similar portion of his 500 customers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Any biometric recognition system of Aadhaar’s size is bound to show  duplicates, meaning some people’s biometric identifiers will match  someone else’s when they try to enroll.The new system hasn’t eliminated  attempts at fraud. In August, police in Rajasthan accused two shop  managers of linking their fingerprints to a multitude of cards and  stealing for months the rations of dozens of clients.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Hans Varghese Mathews, a mathematician at the Bangalore-based Center for  Internet and Society, used the results of a test run by Aadhaar  officials on a sample of 84 million people to extrapolate the figure for  India’s total population. The error level is less than 1%, but in the  world’s second-most populous country, the snag would still affect about  11 million people, he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Government officials disputed the calculation, saying the number of  duplicates would be much smaller—and that it would take only seven  analysts to manage the error caseload.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As for trouble connecting to the registry, better infrastructure,  including steadier internet connections, will eventually also help, Mr.  Pandey said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For now, Mr. Prakash has found a way to cope without  climbing trees. After scouring the village, he set up a shack in a spot  with enough bandwidth for his fingerprint scanner to work. It is hardly  efficient. He issues receipts in the morning at the shack, then goes  back to his shop to hand out the grains. Customers have to line up  twice, sometimes for hours.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Prakash has applied to the  government to operate without biometric identification, but his request  was turned down, he said. “They said: ‘You have to keep trying.’ ”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/wall-street-journal-gabriele-parussini-january-13-2017-indias-digital-id-rollout-collides-with-rickety-reality'&gt;https://cis-india.org/internet-governance/news/wall-street-journal-gabriele-parussini-january-13-2017-indias-digital-id-rollout-collides-with-rickety-reality&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Biometrics</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-01-17T15:35:04Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/financial-times-march-27-2017-amy-kazmin-indias-biometric-id-scans-make-sci-fi-a-reality">
    <title>India’s biometric ID scans make sci-fi a reality</title>
    <link>https://cis-india.org/internet-governance/news/financial-times-march-27-2017-amy-kazmin-indias-biometric-id-scans-make-sci-fi-a-reality</link>
    <description>
        &lt;b&gt;I have been thinking about my fingerprints and the secrets that may lie within my eyes — and whether I want to share them with the Indian government. I may not however have a choice.
&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Amy Kazmin was published in the &lt;a class="external-link" href="https://www.ft.com/content/46dcb248-0fcb-11e7-a88c-50ba212dce4d"&gt;Financial Times&lt;/a&gt; on March 27, 2017. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;India has the world’s largest domestic biometric identification system, known as Aadhaar. Since 2010, the government has collected fingerprints and iris scans from more than 1bn residents, and each has been assigned a 12-digit &lt;a class="external-link" href="https://uidai.gov.in/"&gt;identification number&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The scheme is championed by Nandan Nilekani, the billionaire co-founder of IT company Infosys. It was initially conceived to ensure poor Indians received subsidised food entitlements and other welfare benefits that were previously siphoned off by unscrupulous intermediaries. It was also seen as offering poor Indians, many of whom lack birth certificates, with a portable ID that can be used anywhere in the country.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Until now, obtaining an Aadhaar number was voluntary, though most Indians enrolled without hesitation as they see its potential benefits. But New Delhi is now enlisting Aadhaar, which means “foundation” or “base” in Hindi, in more than just welfare schemes. This would mean sharing one’s biometric details isn’t really optional any more despite a Supreme Court ruling that it should be “purely voluntary”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Last week, the government issued a rule requiring an Aadhaar number for filing tax returns, ostensibly to improve tax compliance. It has also decided that all cell phone numbers must be linked to an Aadhaar number by 2018. Even Indian Railways has plans to demand Aadhaar from those booking train tickets online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What was once touted as an initiative to improve delivery of welfare suddenly now seems like the foundation of a surveillance state — and I admit the prospect of putting my own biometrics in the database leaves me uneasy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As a US citizen, I’ve never had to give my biometric data to my government. Domestically, fingerprints are only taken from criminal suspects, or applicants for government jobs, though I know foreign citizens are fingerprinted on arrival.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To me, the idea of sharing eye scans evokes the dystopian Hollywood film, Minority Report, which depicts a near future in which optical-recognition cameras allow the authorities to identify anyone in any public place. The hero on the run, played by Tom Cruise, has an illegal eye transplant to avoid detection.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In recent days, many Indian academics and activists have raised concerns about Aadhaar data security, the lack of privacy rules and the absence of any accountability structure if data are misused.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Biometrics is being weaponised," says Sunil Abraham, executive director of the Bangalore-based Centre for Internet and Society. "What you need to be worried about is that someone will clean out your bank account or frame you in a crime," he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pratap Bhanu Mehta, director of the Centre for Policy Research, has written of the “conversion of Aadhaar from a tool of citizen empowerment to a tool of state surveillance and citizen vulnerability”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I call &lt;a class="external-link" href="https://www.ft.com/content/058c4b48-d43c-11e6-9341-7393bb2e1b51"&gt;Mr Nilekani&lt;/a&gt;, of whose honourable intentions I have no doubt. After leaving Infosys in 2009, he spent five years in government, working to get Aadhaar off the ground. He says he is “extremely offended” when his project is accused of being part of a surveillance society, a narrative he says is “completely misrepresenting” the project. “I can steal your fingerprint off your glass. I don’t need this fancy technology,” he says. “Surveillance is far better done by following my phone, or when I use a map to order a taxi: the map knows where I am. Our internet companies know where you are.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But in a society known for ingenious means of bypassing rules, such as having multiple taxpayer ID cards to aid evasion, Mr Nilekani says biometric authentication of individuals can bring discipline and reduce cheating. “It’s like you are creating a rule-based society,” he says, “it’s the transition that is going on right now.”  I hang up, hardly reassured. To me, it seems clear that in India, as in so many places these days, Big Brother is increasingly watching.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/financial-times-march-27-2017-amy-kazmin-indias-biometric-id-scans-make-sci-fi-a-reality'&gt;https://cis-india.org/internet-governance/news/financial-times-march-27-2017-amy-kazmin-indias-biometric-id-scans-make-sci-fi-a-reality&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Biometrics</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-03-28T02:45:28Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/biometric-update-june-26-2021-chris-burt-advanced-biometric-technologies-and-new-market-entries-tackle-fraud-chase-digital-id-billions">
    <title>Advanced biometric technologies and new market entries tackle fraud, chase digital ID billions</title>
    <link>https://cis-india.org/internet-governance/news/biometric-update-june-26-2021-chris-burt-advanced-biometric-technologies-and-new-market-entries-tackle-fraud-chase-digital-id-billions</link>
    <description>
        &lt;b&gt;Amid forecasts of rapid growth and huge market potential, digital ID platforms launches by Techsign and Ping Identity, new services, features and even an investment fund have been launched.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post by Chris Burt was &lt;a class="external-link" href="https://www.biometricupdate.com/202106/advanced-biometric-technologies-and-new-market-entries-tackle-fraud-chase-digital-id-billions"&gt;published by Biometric Update&lt;/a&gt; on June 26, 2021.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A new camera solution for under-display 3D face biometrics from Infineon and partners, and IPO filings by Clear and SenseTime show parallel investment activity in biometrics, meanwhile, and experts from Veridium and Intellicheck provide insight into the shifting technology and fraud landscapes, among the most widely-read stories this week on Biometric Update.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Top biometrics news of the week&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Several areas of the digital identity market continued to be very active, with a new investment fund launched to support startups in digital commerce and payments, Yoti joining a regulatory sandbox, Techsign launching a digital ID platform, and Mastercard and b.well reporting positive results from a recent pilot for their biometric healthcare platform. All this activity contributes to explaining Juniper Research’s &lt;a href="https://www.biometricupdate.com/202106/digital-identity-verification-market-forecast-to-reach-16-7b-by-2026"&gt;forecast of rapid growth&lt;/a&gt; in the sector to $16.7 billion in 2026, driven largely by spending on remote onboarding.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Okta CEO Todd McKinnon, meanwhile, told Barron’s that the total addressable market for identity and access management providers like Okta is something like &lt;a href="https://www.biometricupdate.com/202106/okta-ceo-says-total-addressable-identity-and-access-management-market-near-80b"&gt;$80 billion&lt;/a&gt;, as well as that effective integration is the key to solving biometrics challenges in the space. Entrust and Yubico formed an integration partnership, LoginRadius launched a new feature, Jamf launched a biometric tool for enterprises, and a certification program for IAM professionals was launched.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A list of goods for sale on the dark web includes a listing for &lt;a href="https://www.biometricupdate.com/202106/biometric-selfies-and-forged-passports-identities-for-sale-on-the-dark-web"&gt;selfies holding an American ID credential&lt;/a&gt;, which in theory could be used in a biometric spoofing attack. Cybersecurity researcher Luana Pascu helps guide readers through the report, and shares insights such as on the status of faked vaccination certificates on dark web marketplaces.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ensuring the validity of the ID document a biometric identity verification process is based on, without adding too much friction, often means adopting &lt;a href="https://www.biometricupdate.com/202106/intellicheck-ceo-on-building-the-foundations-for-biometric-verification-and-fraud-protection"&gt;layered risk profiling&lt;/a&gt;, Intellicheck CEO Bryan Lewis tells &lt;em&gt;Biometric Update&lt;/em&gt; in a sponsored post. The company has deep roots in detecting fraudulent documents and has found that even scanning the barcode on an identity document will not necessarily catch a fake if the unique security elements are not validated as part of the scan.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Fourthline Anti-Financial Crime Head Ro Paddock writes in a Biometric Update guest post about the ever-increasing sophistication of fraud attacks, which reached the level of computer-generated &lt;a href="https://www.biometricupdate.com/202106/the-fraudsters-new-game-face"&gt;3D masks and deepfakes&lt;/a&gt; during the pandemic,. In response, information-sharing between organizations will be necessary to understand the scope of these new threats, and how to defend against them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Philippines’ election commission has launched an app to allow people to preregister for the &lt;a href="https://www.biometricupdate.com/202106/philippines-launches-app-to-fast-track-biometric-voter-registration"&gt;voter roll online&lt;/a&gt; before enrolling their biometrics in person, as the country continues digitizing its public services. Governments in Pakistan, Haiti and Nigeria are also making moves to improve the accessibility and trustworthiness of their electoral processes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A partnership between Research ICT Africa and the Centre for Internet and Society, supported by the Omidyar Network, to explore the development of digital ID systems for the African context is explained in a &lt;a href="https://researchictafrica.net/2021/06/21/why-digital-id-matters/" target="_blank"&gt;blog post&lt;/a&gt;. The project will be based on an adaptation of the Evaluation Framework for Digital Identities which the CIS used to assess India’s Aadhaar system, with rule of law, rights and risk-based tests, and presented in a series of posts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Details of Clear’s IPO plans emerged, including its intention to raise up to &lt;a href="https://www.biometricupdate.com/202106/clear-ipo-could-raise-up-to-396m-in-hot-biometrics-investment-market"&gt;$396 million&lt;/a&gt; on the NYSE. The $2.2 billion valuation aligns with some comparable companies, by revenue multiple, but the lower voting power of the shares on offer could be a restraining factor.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An even bigger IPO could be held by SenseTime later this year, with the Chinese AI firm looking to raise up to $2 billion &lt;a href="https://www.biometricupdate.com/202106/not-smarting-from-us-sanctions-sensetime-says-its-ipo-is-on-again"&gt;on the Hong Kong exchange&lt;/a&gt;. The company has been talking about a public stock launch since before the company was hit with restrictions to U.S. trade, which it indicates have had little impact.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The latest major funding round in digital identity is the largest yet, with &lt;a href="https://www.biometricupdate.com/202106/transmit-security-raises-543m-to-grow-biometric-passwordless-authentication"&gt;Transmit Security raising $543 million&lt;/a&gt; at a $2.2 billion valuation to expand the market reach of its passwordless biometric authentication technology. The company claims it is the highest ever Series A funding round in cybersecurity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Bob Eckel, Aware CEO and International Biometrics + Identity Association (IBIA) Director and Board Member, discusses why people should own their own identity, identifying things and protecting supply chains, and his background in setting up air traffic control systems used all over the world with the Requis &lt;a href="https://requis.com/podcasts/podcast-bob-eckel-biometrics-future-secured-identities/" target="_blank"&gt;Supply Chain Next podcast&lt;/a&gt;. In the longer term Eckel sees biometric replacing passwords, and in the shorter term being used to make processes touchless.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Veridium CTO John Callahan guides Biometric Update through recent NIST guidance on the &lt;a href="https://www.biometricupdate.com/202106/nist-touchless-fingerprint-biometrics-guidance-confirms-interoperability"&gt;interoperable use of contactless fingerprints&lt;/a&gt; with contact-based back-end AFIS systems. The guidance, which changes definitions within the NIST ITL biometric container standard, but advises that the associated image quality metric does not apply to contactless prints, could spark further investment in the modality.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A new time-of-flight 3D imaging solution that could be used to implement facial authentication from &lt;a href="https://www.biometricupdate.com/202106/under-display-camera-for-3d-face-biometrics-developed-by-infineon-pmd-arcsoft"&gt;under the display of mobile devices&lt;/a&gt; without notches or bezels has been developed by partners Infineon, pmdtechnologies and ArcSoft. Based on the REAL3 sensor and ArcSoft’s computer vision algorithms, the solution is expected to reach availability in Q3 2021.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://www.biometricupdate.com/202106/ping-identity-adds-behavioral-biometrics-and-bot-detection-with-securedtouch-acquisition"&gt;Ping Identity has acquired SecuredTouch&lt;/a&gt; in a deal with undisclosed financial details to integrate its behavioral biometrics-based continuous user authentication with the PingOne enterprise cloud platform. Ping also launched a consumer application for reusable credentials and added unified management features to its cloud platform at its Identiverse 2021 event.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Notre Dame-IBM Technology Ethics Lab Founding Director Elizabeth Renieris joins the MIT Sloan Management Review’s &lt;a href="https://sloanreview.mit.edu/audio/starting-now-on-technology-ethics-elizabeth-renieris/" target="_blank"&gt;Me, Myself and AI podcast&lt;/a&gt; to discuss the role of the lab, her path past and through some of the digital identity space’s key ethical developments, and the need to take the long view on technology to understand its ethical implications. Renieris makes a pitch for process-oriented regulations, based on the best understanding we have at the time.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ProctorU’s announcement that it will no longer sell fully-automated remote proctoring services is seen as a win in the battle against “the AI shell game” by the &lt;a href="https://www.eff.org/deeplinks/2021/06/long-overdue-reckoning-online-proctoring-companies-may-finally-be-here" target="_blank"&gt;Electronic Frontier Foundation&lt;/a&gt;. The descriptions of the balance between the automated and human decision-making by AI proctoring providers amount to doublespeak, the EFF says, before panning their human review processes, accuracy rates, and use of facial recognition.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/biometric-update-june-26-2021-chris-burt-advanced-biometric-technologies-and-new-market-entries-tackle-fraud-chase-digital-id-billions'&gt;https://cis-india.org/internet-governance/news/biometric-update-june-26-2021-chris-burt-advanced-biometric-technologies-and-new-market-entries-tackle-fraud-chase-digital-id-billions&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Chris Burt</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>UIDAI</dc:subject>
    
    
        <dc:subject>Biometrics</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    

   <dc:date>2021-06-28T01:13:05Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/tech-president-jessica-mckenzie-august-28-2014-the-uncertain-future-of-indias-plan-to-biometrically-identify-everyone">
    <title>The Uncertain Future of India's Plan to Biometrically Identify Everyone</title>
    <link>https://cis-india.org/internet-governance/news/tech-president-jessica-mckenzie-august-28-2014-the-uncertain-future-of-indias-plan-to-biometrically-identify-everyone</link>
    <description>
        &lt;b&gt;Last Sunday an 11-year-old boy in Andhra Pradesh, a state in southeast India, hung himself from a ceiling fan as his family slept.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Jessica Mckenzie's &lt;a class="external-link" href="http://techpresident.com/news/wegov/25250/the-uncertain-future-indias-plan-biometrically-identify-everyone"&gt;blog post was published in Techpresident&lt;/a&gt; on August 28, 2014. Sunil Abraham gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;He was allegedly driven to this act after being denied an Aadhaar  card—formally known as Unique Identification (UID)—which he was told he  needed to attend school. The card is one arm of India's sprawling scheme  to collect the biometric data, including fingerprints and iris scans,  of its 1.2 billion citizens and residents, and is quickly becoming  practically, if not legally, mandatory, for nearly every aspect of life,  from getting married to buying cooking gas to opening a bank account.  More than &lt;a href="http://indianexpress.com/article/india/india-others/aadhaar-future-at-stake-govt-seeks-meeting-with-states/"&gt;630 million residents&lt;/a&gt; have already enrolled and received their unique 12-digit identification number.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since its &lt;a href="http://singularityhub.com/2010/09/13/india-launches-universal-id-system-with-biometrics/"&gt;launch&lt;/a&gt; in 2010, people have raised a number of questions and concerns about  Aadhaar, citing its effects on privacy rights, potential security flaws,  and failures in functionality. India's poor, who were supposed to be  the biggest beneficiaries of the program, are actually most at risk of  being excluded from UID, and there is no evidence that biometric  identification has curtailed corruption. The newly-elected Prime  Minister Narendra Modi &lt;a href="http://www.newscientist.com/article/dn25593-indian-election-win-threatens-biggest-biometrics-bank.html"&gt;lambasted&lt;/a&gt; the UID program as a candidate but in July did an about-face, &lt;a href="http://timesofindia.indiatimes.com/india/Modi-govt-to-give-legal-backing-to-Aadhaar/articleshow/38336812.cms"&gt;calling&lt;/a&gt; for the enrollment process to be expedited and supporting a UID-linked  social assistance program. In all likelihood, the world's largest  experiment in biometric identification will continue.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are still a number of unanswered questions about the future of the  program. Although created in large part as a way of more efficiently  and less corruptly dispersing government subsidies, last year the  Supreme Court &lt;a href="http://www.dailymail.co.uk/indiahome/indianews/article-2588303/Supreme-Court-demolishes-Aadhaar-card-Judges-rule-card-NOT-mandatory-government-subsidies.html"&gt;ruled&lt;/a&gt; that the Aadhaar card could not be made mandatory to receive government  assistance. The Unique Identification Authority of India (UIDAI)  operates in a kind of &lt;a href="http://www.thehindu.com/news/national/karnataka/aadhaar-has-no-legal-standing-technical-experts/article5884009.ece"&gt;legal limbo&lt;/a&gt;. Modi &lt;a href="http://www.business-standard.com/article/current-affairs/cloud-still-hangs-over-aadhaar-s-future-114081401131_1.html"&gt;is said&lt;/a&gt; to have instructed his Finance Minister Arun Jaitley to resolve these legal problems.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sorting out the legal issues is imperative if UID numbers are &lt;a href="http://profit.ndtv.com/news/industries/article-rbi-for-making-aadhaar-sole-platform-for-financial-inclusion-654514"&gt;going to be linked&lt;/a&gt; to &lt;a href="http://timesofindia.indiatimes.com/India/Modi-govt-faces-huge-challenge-in-giving-bank-accounts-to-all/articleshow/40990381.cms"&gt;Modi's proposed financial inclusion program&lt;/a&gt; that aims to bring 75 million additional households into the country's banking system by 2018.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is also &lt;a href="http://indianexpress.com/article/india/india-others/uidai-npr-projects-likely-to-be-merged/"&gt;the possibility&lt;/a&gt; that UID will be merged, absorbed or superseded by the National  Population Register (NPR), yet another biometric identification system.  The NPR, unlike Aadhaar, is mandatory for all residents. In addition to  fingerprints and iris scans, NPR collects information on familial  relationships, nationality, occupation and education level. There is a  great deal of overlap between the two programs, which has been a source  of conflict between government agencies in the past. The home ministry,  for example, argues that government subsidies should be disbursed  through NPR, not UID.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is also &lt;a href="http://www.business-standard.com/article/current-affairs/cloud-still-hangs-over-aadhaar-s-future-114081401131_1.html"&gt;speculation&lt;/a&gt; that UID could be picked up as part of Digital India, &lt;a href="http://articles.economictimes.indiatimes.com/2014-08-25/news/53205445_1_digital-india-india-today-financial-services"&gt;Modi's ambitious plan&lt;/a&gt; to modernize India by building national broadband infrastructure,  ensuring universal mobile service access, creating e-government  services, and &lt;a href="http://www.business-standard.com/article/current-affairs/cloud-still-hangs-over-aadhaar-s-future-114081401131_1.html"&gt;establishing&lt;/a&gt; a “cradle-to-grave digital identity for every citizen of the country—unique, lifelong, online and authenticable [&lt;i&gt;sic&lt;/i&gt;].”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In spite of UID's tenuous position and uncertain future, it has become  “essential” in nearly every facet of life. The Delhi government is  rolling out &lt;a href="http://timesofindia.indiatimes.com/city/delhi/Marriage-registrations-to-go-online-from-next-month/articleshow/40319783.cms"&gt;a suite of e-government services&lt;/a&gt;, starting with marriage registration, that will require a UID. Fishermen in Gujarat &lt;a href="http://timesofindia.indiatimes.com/city/ahmedabad/Biometric-cards-must-for-fishermen-this-season/articleshow/39901977.cms"&gt;have been told&lt;/a&gt; they cannot go out to sea without biometric identification.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Then there is Kora Balakrishna, the 11-year-old who committed suicide  after being denied an Aadhaar card because he has webbed fingers. His  school headmaster had instructed him to get one as a prerequisite for  study and, per one news outlet, &lt;a href="http://www.thehindu.com/news/cities/Visakhapatnam/fear-of-being-denied-midday-meal-drove-him-to-suicide/article6354316.ece"&gt;a mid-day meal&lt;/a&gt;. An investigation into the incident &lt;a href="http://www.newindianexpress.com/states/andhra_pradesh/Tribal-Kid-Denied-Admission-into-Welfare-Hostel-Ends-Life/2014/08/26/article2398922.ece"&gt;has been ordered&lt;/a&gt;. Pravin Kumar, a local administrative official, said webbed fingers are not a legitimate reason for rejection from the program.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/tech-president-jessica-mckenzie-august-28-2014-the-uncertain-future-of-indias-plan-to-biometrically-identify-everyone'&gt;https://cis-india.org/internet-governance/news/tech-president-jessica-mckenzie-august-28-2014-the-uncertain-future-of-indias-plan-to-biometrically-identify-everyone&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Biometrics</dc:subject>
    
    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-09-08T05:31:28Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-new-aadhaar-bill-in-plain-english">
    <title>The New Aadhaar Bill in Plain English</title>
    <link>https://cis-india.org/internet-governance/blog/the-new-aadhaar-bill-in-plain-english</link>
    <description>
        &lt;b&gt;We have put together a plain English version of the The Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Bill, 2016. 
&lt;/b&gt;
        
&lt;h2 id="docs-internal-guid-4528559b-63ee-ea8a-5fc7-ff5b32b069f6" dir="ltr"&gt;The Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Bill, 2016&lt;/h2&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Chapter I. PRELIMINARY&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Section 1&lt;/p&gt;
&lt;ol&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;This Act is called Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Act, 2016.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;It will be applicable in whole of India (except the state of Jammu and Kashmir).&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;It will become applicable on a date to be notified by the Central Government.&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Section 2&lt;/p&gt;
&lt;ol&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;“Aadhaar number” is the identification number issued to an individual under the Act;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;“Aadhaar number holder” is the person who has been given an Aadhaar number;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;“authentication” is the process of verifying the Aadhaar number, demographic information and biometric information of any person by the Central Identities Data Repository (CIDR);&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;“authentication record” is the record of the authentication which will contain the identity of the requesting entity and the response of the CIDR;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;“Authority” &amp;nbsp;or “UIDAI” refers to the Unique Identification Authority of India established under this Act;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;“benefit” means any relief or payment which may be notified by the Central Government;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;“biometric information” means photograph, fingerprint, Iris scan, or any other biological attributes specified by regulations;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;“Central Identities Data Repository” or “CIDR” means a centralised database containing all Aadhaar numbers, demographic information and biometric information and other related information;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;“Chairperson” means the Chairperson of the UIDAI;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;“core biometric information” means fingerprint, Iris scan, or any biological attributes specified by regulations;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;“demographic information” includes information relating to the name, date of birth, address and other relevant information as specified by regulations. This information will not include race, religion, caste, tribe, ethnicity, language, records of entitlement, income or medical history;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;“enrolling agency” means an agency appointed by the UIDAI or a Registrar for collecting demographic and biometric information of individuals for issuing Aadhaar numbers;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;“enrolment” means the process of collecting demographic and biometric information from individuals for the purpose of issuing Aadhaar numbers;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;“identity information” in respect of an individual, includes his Aadhaar number, his biometric information and his demographic information;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;“Member” includes the Chairperson and Member of the Authority appointed under section 12;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;“notification” means a notification published in the Official Gazette and the expression “notified” with its cognate meanings and grammatical variations will be construed accordingly;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;“prescribed” means prescribed by rules made by the Central Government under this Act;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;“records of entitlement” means the records of benefits, subsidies or services provided to any individual under any government programme;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;“Registrar” means any person authorized by the UIDAI to enroll individuals under the Act;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;“regulations” means the regulations made by the UIDAI under this Act;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;“requesting entity” means an agency that submits the Aadhaar number and other information of an individual to the CIDR for authentication;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;“resident” means a person who has resided in India for atleast 182 days in the last twelve months before the date of application for enrolment;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;“service” means any facility or assistance provided by the Central Government in any form;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;“subsidy” means any form of aid, support, grant, etc. in cash or kind as notified by the Central Government.&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h5 dir="ltr"&gt;Chapter II. ENROLMENT&lt;/h5&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Section 3&lt;/p&gt;
&lt;ol&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Every resident is entitled to get an Aadhaar number.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;At the time of enrollment, the enrolling agency will inform the individual of the following details—&lt;/p&gt;
&lt;/li&gt;
&lt;ol&gt;&lt;li style="list-style-type: lower-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;how their information will be used;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: lower-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;what type of entities the information will be shared with; and&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: lower-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt; that they have a right to see their information and also tell them how they can see their information.&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt; After collecting and verifying the information given by the individuals, the UIDAI will issue an Aadhaar number to each individual.&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Section 4&lt;/p&gt;
&lt;ol&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Once an Aadhaar number has been issued to a person, it will not be re-assigned to any other person.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;An Aadhaar number will be a random number and will not contain any attributes or identity of the Aadhaar number holder.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;if adopted by a service provider, an Aadhaar number may be accepted as proof of identity of the person.&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Section 5&lt;/p&gt;
&lt;p dir="ltr"&gt;The UIDAI will take special measures to issue Aadhaar number to women, children, senior citizens, persons with disability, unskilled and unorganised workers, nomadic tribes or to such other persons who do not have any permanent residence and similar categories of individuals.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Section 6&lt;/p&gt;
&lt;p dir="ltr"&gt;The UIDAI may require Aadhaar number holders to update their Aadhaar information, so that it remains accurate.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h5 dir="ltr"&gt;Chapter III. AUTHENTICATION&lt;/h5&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Section 7&lt;/p&gt;
&lt;p dir="ltr"&gt;As a condition for receiving subsidy for which the expenditure is incurred from the Consolidated Fund of India, the Government may require that a person should be authenticated or give proof of the Aadhaar number to establish his/her identity. In the case a person does not have an Aadhaar number, he/she should make an application for enrolment. If an Aadhaar number is not assigned, the person will be offered viable and alternate means of identification for receiving the subsidy, benefit or service.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Section 8&lt;/p&gt;
&lt;ol&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;The UIDAI will authenticate the Aadhaar information of people as per the conditions prescribed by the government and may also charge a fees for doing so.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Any requesting entity will— (a) take consent from the individual before collecting his/her Adhaar information; (b) use the information only for authentication with the CIDR;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;The entity requesting authentication will also inform the individual of the following— (a) what type of information will be shared for authentication; (b) what will the information be used for; and (c) whether there is any alternative to submitting the Aadhaar information to the requesting entity.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;The UIDAI will respond to the authentication request with yes, no, or other appropriate response and share identity information about the Aadhaar number holder but not share any biometric information.&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Section 9&lt;/p&gt;
&lt;p dir="ltr"&gt;The Aadhaar number or its authentication will not be a proof of citizenship or domicile.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Section 10&lt;/p&gt;
&lt;p dir="ltr"&gt;The UIDAI may engage any number of entities to establish and maintain the CIDR and to perform any other functions specified by the regulations.&lt;/p&gt;
&lt;h5 dir="ltr"&gt;&lt;br class="kix-line-break" /&gt;Chapter IV. UNIQUE IDENTIFICATION AUTHORITY OF INDIA&lt;/h5&gt;
&lt;p dir="ltr"&gt;&lt;br class="kix-line-break" /&gt;Section 11&lt;/p&gt;
&lt;ol&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt; The UIDAI will be established by the Central Government to be responsible for the processes of enrolment and authentication of Aadhaar numbers.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;The UIDAI will be a body corporate with the power to buy and sell property, to enter into contracts and to sue or be sued.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;The head office of the UIDAI will be in New Delhi.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;The UIDAI may establish its offices at other places in India.&lt;br class="kix-line-break" /&gt;&lt;br class="kix-line-break" /&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p dir="ltr"&gt;Section 12&lt;/p&gt;
&lt;p dir="ltr"&gt;The UIDAI will have a Chairperson, two part-time Members and a chief executive officer, who to be appointed by the Central Government.&lt;br class="kix-line-break" /&gt;&lt;br class="kix-line-break" /&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;Section 13&lt;/p&gt;
&lt;p dir="ltr"&gt;The Chairperson and Members will be competent people with at least 10 years experience and knowledge in technology, governance, law, development, economics, finance, management, public affairs or administration.&lt;br class="kix-line-break" /&gt;&lt;br class="kix-line-break" /&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;Section 14&lt;/p&gt;
&lt;ol&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;The Chairperson and the Members will be appointed for 3 years and can be re-appointed after their term. But no Member or Chairperson will be more than 65 years of age.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;The Chairperson and Members will take an oath of office and of secrecy.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;The Chairperson or Member may— (a) resign from office, by giving an advance written notice of at least 30 days; or (b) be removed from his office because she/he gets disqualified on any of the grounds mentioned in section 15.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;The salaries and allowances of the Members and Chairperson will be prescribed under the government. &lt;br class="kix-line-break" /&gt;&lt;br class="kix-line-break" /&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p dir="ltr"&gt;Section 15&lt;/p&gt;
&lt;ol&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;The Central Government may remove a Chairperson or Member, who—&lt;br class="kix-line-break" /&gt;(a) has gone bankrupt; &lt;br class="kix-line-break" /&gt;(b) is physically or mentally unable to do his/her job;&lt;br class="kix-line-break" /&gt;(c) has been convicted of an offence involving moral turpitude;&lt;br class="kix-line-break" /&gt;(d) has a financial conflict of interest in performing his/her functions; or&lt;br class="kix-line-break" /&gt;(e) has abused his/her position so that the government needs to remove him/her in public interest.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;The Chairperson or a Member will be given a chance to present his/her side of the story before being removed, unless he/she is being removed on the grounds of bankruptcy or criminal conviction. &lt;br class="kix-line-break" /&gt;&lt;br class="kix-line-break" /&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p dir="ltr"&gt;Section 16&lt;/p&gt;
&lt;p dir="ltr"&gt;An Ex-Chairperson or Ex-Member will have to take the approval of the Central Government,—&lt;/p&gt;
&lt;ol&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;to accept any job in any entity (other than a government organization) which was associated with any work done for the UIDAI while that person was a Chairperson or Member, for a period of three years after ceasing to hold office;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;to act or advise any entity on any particular transaction for which that person had provided advice to the UIDAI while he/she was the Chairperson or a Member;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;to give advice to any person using information which was obtained as the Chairperson or a Member which is not available to the public in general; or&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;to accept any offer of employment or appointment &amp;nbsp;as a director of any company with which he/she had direct and significant official dealings during his/her term of office, for a period of three years.&lt;br class="kix-line-break" /&gt;&lt;br class="kix-line-break" /&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p dir="ltr"&gt;Section 17&lt;/p&gt;
&lt;p dir="ltr"&gt;The Chairperson will preside over the meetings of the UIDAI and have the powers and perform the functions of the UIDAI.&lt;br class="kix-line-break" /&gt;&lt;br class="kix-line-break" /&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;Section 18&lt;/p&gt;
&lt;ol&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt; The chief executive officer (CEO) of the UIDAI will not be below the rank of Additional Secretary to the Government of India.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;The chief executive officer will be responsible for— (a) the day-to-day administration of the UIDAI; (b) implementing the programmes and decisions of the UIDAI; (c) making proposals for the UIDAI; (d) preparation of the accounts and budget of the UIDAI; and (e) performing any other functions prescribed in the regulations.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;The CEO will annually submit the following things to the UIDAI for its approval — (a) a general report covering all the activities of the Authority in the previous year; (b) programmes of work; (c) the annual accounts for the previous year; and (d) the budget for the coming year.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;The CEO will have administrative control over the officers and other employees of the Authority.&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p dir="ltr"&gt;&lt;br class="kix-line-break" /&gt;Section 19&lt;/p&gt;
&lt;ol&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt; The time and place of the meetings of the UIDAI and the rules and procedures of those meetings will be prescribed by regulations.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;The meetings will be presided by the Chairperson, and if they are absent, then the senior most Member of the UIDAI.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;All decisions at the meetings of the UIDAI will be taken by a majority vote. In case of a tie, the person presiding the meeting will have the casting vote.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;All decisions of the UIDAI will be signed by the Chairperson or any other Member or the Member-Secretary authorised by the UIDAI in this behalf.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;If any Member, who is a director of a company and because of this has any financial interest in matters coming up for consideration at a meeting, that member should disclose the financial interest and not take any further part in the discussions and decision on that matter.&lt;br class="kix-line-break" /&gt;&lt;br class="kix-line-break" /&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p dir="ltr"&gt;Section 20&lt;/p&gt;
&lt;p dir="ltr"&gt;No actions or proceeding of the UIDAI will become invalid merely because of—&lt;/p&gt;
&lt;ol&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;any vacancy in, or any defect in the constitution of, the UIDAI;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;any defect in the appointment of a person as Chairperson or Member of the Authority; or&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;any irregularity in the procedure of the Authority not affecting the merits of the case.&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Section 21&lt;/p&gt;
&lt;ol&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;The UIDAI, with the approval of the Government, can decide on the number and types of officers and employees that it would require.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;The salaries and allowances of the employees, officer and chief executive officer will be prescribed under the government.&lt;br class="kix-line-break" /&gt;&lt;br class="kix-line-break" /&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p dir="ltr"&gt;Section 22.&lt;/p&gt;
&lt;p dir="ltr"&gt;Once the UIDAI is establishment—&lt;/p&gt;
&lt;ol&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt; all the assets and liabilities of the existing Unique Identification Authority of India, established by the Government of India through notification dated the 28th January, 2009, will stand transferred to the new UIDAI.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;all data and information collected during enrolment, all details of authentication performed, by the existing Unique Identification Authority of India will be deemed to have been done by the UIDAI. All debts, liabilities incurred and all contracts entered into by the Unique Identification Authority of India will be deemed to have been entered into by the UIDAI;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;all money due to the existing Unique Identification Authority of India will be deemed to be due to the UIDAI; and&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;all suits and other legal proceedings instituted by or against such Unique Identification Authority of India may be continued by or against the UIDAI.&lt;br class="kix-line-break" /&gt;&lt;br class="kix-line-break" /&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p dir="ltr"&gt;Section 23&lt;/p&gt;
&lt;p dir="ltr"&gt;The UIDAI will develop the policy, procedure and systems for issuing Aadhaar numbers to individuals and perform their authentication. The powers and functions of the UIDAI include—&lt;/p&gt;
&lt;ol&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;specifying the demographic information and biometric information required for enrolment and the processes for collection and verification of that information;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;collecting demographic information and biometric information from people seeking Aadhaar numbers;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;appointing of one or more entities to operate the CIDR;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;generating and assigning Aadhaar numbers to individuals;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;performing authentication of Aadhaar numbers;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;maintaining and updating the information of individuals in the CIDR;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;omitting and deactivating an Aadhaar number;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;specifying the manner of use of Aadhaar numbers for the purposes of providing or availing of various subsidies and other purposes for which Aadhaar numbers may be used;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;specifying the terms and conditions for appointment of Registrars, enrolling agencies and service providers and revocation of their appointments;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;establishing, operating and maintaining of the CIDR;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;sharing the information of Aadhaar number holders;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;calling for information and records, conducting inspections, inquiries and audit of the operations of the CIDR, Registrars, enrolling agencies and other agencies appointed under this Act;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;specifying processes relating to data management, security protocols and other technology safeguards under this Act;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;specifying the conditions/procedures for issuance of new Aadhaar number to existing Aadhaar number holder;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;levying and collecting the fees or authorising the Registrars, enrolling agencies or other service providers to collect fees for the services provided by them under this Act;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;appointing committees necessary to assist the Authority in discharge of its functions;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;promoting research and development for advancement in biometrics and related areas;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;making and specifying policies and practices for Registrars, enrolling agencies and other service providers;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;setting up facilitation centres and grievance redressal mechanisms;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;other powers and functions as prescribed.&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p dir="ltr"&gt;The Authority may,— (a) enter into agreements with various state governments and Union Territories for collecting, storing, securing or processing of information or delivery of Aadhaar numbers to individuals or performing authentication; (b) appoint Registrars, engage and authorize agencies to collect, store, secure, process information or do authentication or perform other functions under this Act. The Authority may engage consultants, advisors and other persons required for efficient discharge of its functions.&lt;br class="kix-line-break" /&gt;&lt;br class="kix-line-break" /&gt;&lt;/p&gt;
&lt;h5 dir="ltr"&gt;Chapter V. GRANTS, ACCOUNTS AND AUDIT AND ANNUAL REPORT&lt;/h5&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Section 24&lt;/p&gt;
&lt;p dir="ltr"&gt;The Central Government may grant money to the UIDAI as it may decide, upon due appropriation by Parliament.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Section 25&lt;/p&gt;
&lt;p dir="ltr"&gt;Fees/revenue collected by the UIDAI will be credited to the Consolidated Fund of India&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Section 26&lt;/p&gt;
&lt;ol&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;The UIDAI will prepare an annual statement of accounts in the format prescribed by Central Government&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;The Comptroller and Auditor-General will audit the account of the UIDAI annually at intervals decided by him, at the UIDAI’s expense.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;The Comptroller and Auditor-General or his appointees will have the same powers of audit they usually have to audit Government accounts.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;The UIDAI will forward the statement of accounts certified by the Comptroller and Auditor-General and the audit report, to the Central Government who will lay it before both houses of Parliament.&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Section 27&lt;/p&gt;
&lt;ol&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;The UIDAI will provide returns, statements and particulars as sought, to the Central Government, as and when required.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;The UIDAI will prepare an annual report containing the description of work for previous years, annual accounts of previous year, and the programmes of work for coming year.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;The copy of the annual report will be laid before both houses of Parliament by the Central Government.&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h5 dir="ltr"&gt;Chapter VI. PROTECTION OF INFORMATION&lt;/h5&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Section 28&lt;/p&gt;
&lt;ol&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;The UIDAI will ensure the security and confidentiality of identity information and authentication records.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;The UIDAI will take measures to ensure that all information with the UIDAI, including CIDR records is secured and protected against access, use or disclosure and against destruction, loss or damage.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;The UIDAI will adopt and implement appropriate technical and organisational security measures, and ensure the same are imposed through agreements/arrangements with its agents, consultants, advisors or other persons.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Unless otherwise provided, the UIDAI or its agents will not reveal any information in the CIDR to anyone.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;An Aadhaar number holders may request UIDAI to provide access his information (excluding the core biometric information) as per the regulations specified.&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Section 29&lt;/p&gt;
&lt;ol&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;The core biometric information collected will not be a) shared with anyone for any reason, and b) used for any purpose other generation of Aadhaar numbers and authentication.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Identity information, other than core biometric information, may be shared only as per this Act and regulations specified under it.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Identity information available with a requesting entity will not be used for any purpose other than what is specified to the individual, nor will it be shared further without the individual’s consent.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Aadhaar numbers or core biometric information will not be made public except as specified by regulations.&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Section 30&lt;/p&gt;
&lt;p dir="ltr"&gt;All biometric information collected and stored in electronic form will be deemed to be “electronic record” and “sensitive personal data or information” under Information Technology Act, 2000 and its provisions and rules will apply to it in addition to this Act.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Section 31&lt;/p&gt;
&lt;ol&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;If the demographic or biometric information about any Aadhaar number holder changes, is lost or is found to be incorrect, they may request the UIDAI to make changes to their record in the CIDR, as necessary.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;The identity information in the CIDR will not be altered, except as provided in this Act.&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Section 32&lt;/p&gt;
&lt;ol&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;The UIDAI will maintain the authentication records in the manner and for as long as specified by regulations.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Every Aadhaar number holder may obtain his authentication record as specified by regulations.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;The UIDAI will not collect, keep or maintain any information about the purpose of authentication.&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Section 33&lt;/p&gt;
&lt;ol&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;The UIDAI may reveal identity information, authentication records or any information in the CIDR following a court order by a District Judge or higher. Any such order may only be made after UIDAI is allowed to appear in a hearing.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;The confidentiality provisions in Sections 28 and 29 will not apply with respect to disclosure made in the interest of national security following directions by a Joint Secretary to the Government of India, or an officer of a higher rank, authorised for this purpose.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;An Oversight Committee comprising Cabinet Secretary, and Secretaries of two departments — Department of Legal Affairs and DeitY— will review every direction under 33 B above.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Any directions under 33 B above are valid for 3 months, after which they may be extended following a review by the Oversight Committee.&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h5 dir="ltr"&gt;Chapter VII. OFFENCES AND PENALTIES&lt;/h5&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Section 34&lt;/p&gt;
&lt;p dir="ltr"&gt;Impersonating or attempting to impersonate another person by providing false demographic or biometric information will punishable by imprisonment of up to three years, and/or fine of up to ten thousand rupees.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Section 35&lt;/p&gt;
&lt;p dir="ltr"&gt;Changing or attempting to change any demographic or biometric information of an Aadhaar number holder by impersonating another person (or attempting to do so), with the intent of i) causing harm or mischief to an Aadhaar number holder, or ii) appropriating the identity of an Aadhaar number holder, is punishable with imprisonment up to three years and fine up to ten thousand rupees.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Section 36&lt;/p&gt;
&lt;p dir="ltr"&gt;Collection of identity information by one not authorised by this Act, by way of pretending otherwise, is punishable with imprisonment up to three years or a fine up to ten thousand rupees (in case of an individual), and fine up to one lakh rupees (in case of a company).&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Section 37&lt;/p&gt;
&lt;p dir="ltr"&gt;Intentional disclosure or dissemination of identity information, to any person not authorised under this Act, or in violation of any agreement entered into under this Act, will be punishable with imprisonment up to three years or a fine up to ten thousand rupees (in case of an individual), and fine up to one lakh rupees (in case of a company).&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Section 38&lt;/p&gt;
&lt;p dir="ltr"&gt;The following intentional acts, when not authorised by the UIDAI, will be punishable with imprisonment up to three years and a fine not less than ten lakh rupees:&lt;/p&gt;
&lt;ol&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;accessing or securing access to the CIDR;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;downloading, copying or extracting any data from the CIDR;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;introducing or causing any virus or other contaminant into the CIDR;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;damaging or causing damage to the data in the CIDR;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;disrupting or causing disruption to access to CIDR;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;causing denial of access to an authorised to the CIDR;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;revealing information in breach of (D) in Section 28, or Section 29;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;destruction, deletion or alteration of any files in the CIDR;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;stealing, destruction, concealment or alteration of any source code used by the UIDAI.&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Section 39&lt;/p&gt;
&lt;p dir="ltr"&gt;Tampering of data in the CIDR or removable storage medium, with the intention to modify or discover information relating to Aadhaar number holder will be punishable with imprisonment up to three years and a fine up to ten thousand rupees.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Section 40&lt;/p&gt;
&lt;p dir="ltr"&gt;Use of identity information in violation of Section 8 (3) by a requesting entity will be punishable with imprisonment up to three years and/or a fine up to ten thousand rupees (in case of an individual), and fine up to one lakh rupees (in case of a company).&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;br class="kix-line-break" /&gt;Section 41&lt;/p&gt;
&lt;p dir="ltr"&gt;Violation of Section 8 (3) or Section 3 (2) by a requesting entity or enrolling agency will be punishable with imprisonment up to one year and/or a fine up to ten thousand rupees (in case of an individual), and fine up to one lakh rupees (in case of a company).&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Section 42&lt;/p&gt;
&lt;p dir="ltr"&gt;Any offence against this Act or regulations made under it, for which no specific penalty is provided, will be punishable with be punishable with imprisonment up to one year and/or a fine up to twenty five thousand rupees (in case of an individual), and fine up to one lakh rupees (in case of a company).&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Section 43&lt;/p&gt;
&lt;ol&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;In case of an offence under Act committed by a Company, all person in charge of and responsible for the conduct of the company will also be held to be guilty and liable for punishment unless they can prove lack of knowledge of the offense or that they had exercised all due diligence to prevent it.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;In case an offence is committed by a Company with the consent, connivance or neglect of a director, manager, secretary or other officer of a company, they will also be held guilty of the offence.&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Section 44&lt;/p&gt;
&lt;p dir="ltr"&gt;This Act will also apply to offences committed outside of India by any person, irrespective of their nationality, if the offence involves any data in the CIDR.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Section 45&lt;/p&gt;
&lt;p dir="ltr"&gt;Offences under this Act will not be investigated by police officers below the rank of Inspector of Police.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Section 46&lt;/p&gt;
&lt;p dir="ltr"&gt;Penalties imposed under this Act will not prevent imposition of any other penalties or punishment under any other law in force.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Section 47&lt;/p&gt;
&lt;ol&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Courts will take cognizance of offences under this Act only upon complaint being made by the UIDAI or any officer authorised by it.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;No court inferior to that of a Chief Metropolitan Magistrate or a Chief Judicial Magistrate will try any offence under this Act.&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h5 dir="ltr"&gt;Chapter VIII. MISCELLANEOUS&lt;/h5&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Section 48&lt;/p&gt;
&lt;ol&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Central Government has the power to supersede the UIDAI, through a notification, not for longer than six months, in the following circumstances: i) In case of circumstances beyond the control of the UIDAI, ii) The UIDAI has defaulted in complying with directions of the Central Government, affecting financial position of the UIDAI, iii) Public emergency&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Upon publication of notification, Chairperson and Members of the UIDAI must vacate the office&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Powers, functions and duties will be performed by person(s) authorised by the President.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Properties controlled and owned by UIDAI will vest in the Central Government.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Central Government will reconstitute the UIDAI upon expiration of supersession, with fresh appointment of Chairperson and Members.&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Section 49&lt;/p&gt;
&lt;p dir="ltr"&gt;Chairperson, members, employees etc. are deemed to be public servants within the meaning of section 21 of the Indian Penal Code.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Section 50&lt;/p&gt;
&lt;ol&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Central Government has the power to issue directions to the UIDAI on questions of policy (to be decided by the Government), except technical and administrative matters and the UIDAI will be bound by it.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;The UIDAI will be given an opportunity to express views before direction is given.&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Section 51&lt;/p&gt;
&lt;p dir="ltr"&gt;The UIDAI may delegate its powers and functions to a Member or officer of the UIDAI.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Section 52&lt;/p&gt;
&lt;p dir="ltr"&gt;No suit, prosecution or other legal proceedings will lie against the Central Government, UIDAI, Chairperson, any Member, officer, or other employees of the UIDAI for an act done in good faith.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Section 53&lt;/p&gt;
&lt;p dir="ltr"&gt;The Central Government has the power to makes Rules for matters prescribed under this provision.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Section 54&lt;/p&gt;
&lt;p dir="ltr"&gt;UIDAI has the power to make regulations for matters prescribed under this provision.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Section 55&lt;/p&gt;
&lt;p dir="ltr"&gt;Rules and regulations under this Act will be laid before each House of Parliament for a total period of thirty days, both Houses must agree in making modification, and then the Rules will come into effect.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Section 56&lt;/p&gt;
&lt;p dir="ltr"&gt;Provisions of this Act are in addition to, and not in derogation of any other law currently in effect.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Section 57&lt;/p&gt;
&lt;p dir="ltr"&gt;This Act will not prevent use of Aadhaar number for other purposes under law by the State or other bodies.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Section 58&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The Central Government may pass an order to remove a difficulty in giving effect to the provisions of this Act, not beyond three years from the commencement of this Act.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Section 59&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Action take by Central Government under the Resolution of the Government of India for setting up the UIDAI or by the Department of Electronics and Information Technology under the notification including the UIDAI under the Ministry of Communications and Information Technology will be deemed to have been validly done or taken.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h5 dir="ltr"&gt;STATEMENT OF OBJECTS AND REASONS&lt;/h5&gt;
&lt;ol&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Correct identification of targeted beneficiaries for delivery of subsidies, services, frants, benefits, etc has become a challenge for the Government&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;This has proved to be a major hindrance for successful implementation of these programmes.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;In the absence of a credible system to authenticate identity of beneficiaries, it is difficult to ensure that the subsidies, benefits and services reach to intended beneficiaries.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;The UIDAI was established to lay down policies and implement the Unique Identification Scheme of the Government, by which residents of India were to be provided unique identity number.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Upon successful authentication, this number would serve as proof of identity for identification of beneficiaries for transfer of benefits, subsidies, services and other purposes.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;With increased use of the Aadhaar number, steps to ensure security of such information need to be taken and offences pertaining to certain unlawful actions, created.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;It has been felt that the processes of enrolment, authentication, security, confidentiality and use of Aadhaar related information must be made statutory.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: upper-alpha;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;The Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Bill, 2016 seeks to provide for issuance of Aadhaar numbers to individuals on providing his demographic and biometric information to the UIDAI, requiring Aadhaar numbers for identifying an individual for delivery of benefits, subsidies, and services, authentication of the Aadhaar number, establishment of the UIDAI, maintenance and updating the information of individuals in the CIDR, state measures pertaining to security, privacy and confidentiality of information in possession or control of the UIDAI including information stored in the Central Identities Data Repository and identify offences and penalties for contravention of relevant statutory provisions.&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-new-aadhaar-bill-in-plain-english'&gt;https://cis-india.org/internet-governance/blog/the-new-aadhaar-bill-in-plain-english&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Amber Sinha, Vanya Rakesh and Vipul Kharbanda</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Biometrics</dc:subject>
    

   <dc:date>2016-03-11T04:41:38Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/report-on-understanding-aadhaar-and-its-new-challenges">
    <title>Report on Understanding Aadhaar and its New Challenges</title>
    <link>https://cis-india.org/internet-governance/blog/report-on-understanding-aadhaar-and-its-new-challenges</link>
    <description>
        &lt;b&gt;The Trans-disciplinary Research Cluster on Sustainability Studies at Jawaharlal Nehru University collaborated with the Centre for Internet and Society, and other individuals and organisations to organise a two day workshop on “Understanding Aadhaar and its New Challenges” at the Centre for Studies in Science Policy, JNU on May 26 and 27, 2016. The objective of the workshop was to bring together experts from various fields, who have been rigorously following the developments in the Unique Identification (UID) Project and align their perspectives and develop a shared understanding of the status of the UID Project and its impact. Through this exercise, it was also sought to develop a plan of action to address the welfare exclusion issues that have arisen due to implementation of the UID Project.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Report: &lt;a href="https://cis-india.org/internet-governance/files/report-on-understanding-aadhaar-and-its-new-challenges/at_download/file"&gt;Download&lt;/a&gt; (PDF)&lt;/h4&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;This Report is a compilation of the observations made by participants at the workshop relating to myriad issues under the UID Project and various strategies that could be pursued to address these issues. In this Report we have classified the observations and discussions into following themes:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;1.&lt;/strong&gt; &lt;a href="#1"&gt;Brief Background of the UID Project&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;2.&lt;/strong&gt; &lt;a href="#2"&gt;Legal Status of the UIDAI Project&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="#21"&gt;Procedural issues with passage of the Act&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#22"&gt;Status of related litigation&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;3.&lt;/strong&gt; &lt;a href="#3"&gt;National Identity Projects in Other Jurisdictions&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="#31"&gt;Pakistan&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#32"&gt;United Kingdom&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#33"&gt;Estonia&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#34"&gt;France&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#35"&gt;Argentina&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;4.&lt;/strong&gt; &lt;a href="#4"&gt;Technologies of Identification and Authentication&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="#41"&gt;Use of Biometric Information for Identification and Authentication&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#42"&gt;Architectures of Identification&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#43"&gt;Security Infrastructure of CIDR&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;5.&lt;/strong&gt; &lt;a href="#5"&gt;Aadhaar for Welfare?&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="#51"&gt;Social Welfare: Modes of Access and Exclusion&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#52"&gt;Financial Inclusion and Direct Benefits Transfer&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;6.&lt;/strong&gt; &lt;a href="#6"&gt;Surveillance and UIDAI&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;7.&lt;/strong&gt; &lt;a href="#7"&gt;Strategies for Future Action&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Annexure A&lt;/strong&gt; &lt;a href="#AA"&gt;Workshop Agenda&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Annexure B&lt;/strong&gt; &lt;a href="#AB"&gt;Workshop Participants&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3 id="1" style="text-align: justify;"&gt;&lt;strong&gt;1. Brief Background of the UID Project&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;In the year 2009, the UIDAI was established and the UID project was conceived by the Planning Commission under the UPA government to provide unique identification for each resident in India and to be used for delivery of welfare government services in an efficient and transparent manner, along with using it as a tool to monitor government schemes.&amp;nbsp; The objective of the scheme has been to issue a unique identification number by the Unique Identification Authority of India, which can be authenticated and verified online. It was conceptualized and implemented as a platform to facilitate identification and avoid fake identity issues and delivery of government benefits based on the demographic and biometric data available with the Authority.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Act, 2016 (the “&lt;strong&gt;Act&lt;/strong&gt;”) was passed as a money bill on March 16, 2016 and was notified in the gazette March 25, 2016 upon receiving the assent of the President. However, the enforceability date has not been mentioned due to which the bill has not come into force.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The Act provides that the Aadhaar number can be used to validate a person’s identity, but it cannot be used as a proof of citizenship. Also, the government can make it mandatory for a person to authenticate her/his identity using Aadhaar number before receiving any government subsidy, benefit, or service. At the time of enrolment, the enrolling agency is required to provide notice to the individual regarding how the information will be used, the type of entities the information will be shared with and their right to access their information. Consent of an individual would be obtained for using his/her identity information during enrolment as well as authentication, and would be informed of the nature of information that may be shared. The Act clearly lays that the identity information of a resident shall not be sued for any purpose other than specified at the time of authentication and disclosure of information can be made only pursuant to an order of a court not inferior to that of a District Judge and/or disclosure made in the interest of national security.&lt;/p&gt;
&lt;h3 id="2" style="text-align: justify;"&gt;&lt;strong&gt;2. Legal Status of the UIDAI Project&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;In this section, we have summarised the discussions on the procedural issues with the passage of the Act. The participants had criticised the passage of the Act as a money bill in the Parliament. The participants also assessed the litigation pending in the Supreme Court of India that would be affected by this law. These discussions took place in the session titled, ‘Current Status of Aadhaar’ and have been summarised below.&lt;/p&gt;
&lt;h3 id="21" style="text-align: justify;"&gt;Procedural Issues with Passage of the Act&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The participants contested the introduction of the Act in the form of a money bill. The rationale behind this was explained at the session and is briefly explained here. Article 110 (1) of the Constitution of India defines a money bill as one containing provisions only regarding the matters enumerated or any matters incidental to the following: a) imposition, regulation and abolition of any tax, b) borrowing or other financial obligations of the Government of India, c) custody, withdrawal from or payment into the Consolidated Fund of India (CFI) or Contingent Fund of India, d) appropriation of money out of CFI, e) expenditure charged on the CFI or f) receipt or custody or audit of money into CFI or public account of India. The Act makes references to benefits, subsidies and services which are funded by the Consolidated Fund of India (CFI), however the main objectives of the Act is to create a right to obtain a unique identification number and provide for a statutory mechanism to regulate this process. The Act only establishes an identification mechanism which facilitates distribution of benefits and subsidies funded by the CFI and this identification mechanism (Aadhaar number) does not give it the character of a money bill. Further, money bills can be introduced only in the Lok Sabha, and the Rajya Sabha cannot make amendments to such bills passed by the Lok Sabha. The Rajya Sabha can suggest amendments, but it is the Lok Sabha’s choice to accept or reject them. This leaves the Rajya Sabha with no effective role to play in the passage of the bill.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The participants also briefly examined the writ petition that has been filed by former Union minister Jairam Ramesh challenging the constitutionality and legality of the treatment of this Act as a money bill which has raised the question of judiciary’s power to review the decisions of the speaker. Article 122 of the Constitution of India provides that this power of judicial review can be exercised to look into procedural irregularities. The question remains whether the Supreme Court will rule that it can determine the constitutionality of the decision made by the speaker relating to the manner in which the Act was introduced in the Lok Sabha. A few participants mentioned that similar circumstances had arisen in the case of Mohd. Saeed Siddiqui v. State of U.P. &lt;a href="#ftn1"&gt;[1]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;where the Supreme Court refused to interfere with the decision of the Uttar Pradesh legislative assembly speaker certifying an amendment bill to increase the tenure of the Lokayukta as a money bill, despite the fact that the bill amended the Uttar Pradesh Lokayukta and Up-Lokayuktas Act, 1975, which was passed as an ordinary bill by both houses. The Court in this case held that the decision of the speaker was final and that the proceedings of the legislature being important legislative privilege could not be inquired into by courts. The Court added, “the question whether a bill is a money bill or not can be raised only in the state legislative assembly by a member thereof when the bill is pending in the state legislature and before it becomes an Act.”&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;However, it is necessary to carve a distinction between Rajya Sabha and State Legislature. Unlike the State Legislature, constitution of Rajya Sabha is not optional therefore significance of the two bodies in the parliamentary process cannot be considered the same. Participants also made another significant observation about a similar bill on the UID project (National Identification Authority of India (NIDAI) Bill) that was introduced before by the UPA government in 2010 and was deemed unacceptable by the standing committee on finance, headed by Yashwant Sinha. This bill was subsequently withdrawn.&lt;/p&gt;
&lt;h3 id="22" style="text-align: justify;"&gt;Status of Related Litigation&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;A panellist in this session briefly summarised all the litigation that was related to or would be affected by the Act. The panellist also highlighted several Supreme Court orders in the case of &lt;em&gt;KS Puttuswamy v. Union of India&lt;/em&gt; &lt;a href="#ftn2"&gt;[2]&lt;/a&gt; which limited the use of Aadhaar. We have reproduced the presentation below.&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;&lt;em&gt;KS Puttuswamy v. Union of India&lt;/em&gt; - This petition was filed in 2012 with primary concern about providing Aadhaar numbers to illegal immigrants in India. It was contended that this could not be done without a law establishing the UIDAI and amendment to the Citizenship laws. The petitioner raised concerns about privacy and fallibility of biometrics.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Sudhir Vombatkere &amp;amp; Bezwada Wilson &lt;a href="#ftn3"&gt;[3]&lt;/a&gt; - This petition was filed in 2013 on grounds of infringement of right to privacy guaranteed under Article 21 of the Constitution of India and the security threat on account of data convergence.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Aruna Roy &amp;amp; Nikhil Dey &lt;a href="#ftn4"&gt;[4]&lt;/a&gt; - This petition was filed in 2013 on the grounds of large scale exclusion of people from access to basic welfare services caused by UID. After their petition, no. of intervention applications were filed. These were the following:&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Col. Mathew Thomas &lt;a href="#ftn5"&gt;[5]&lt;/a&gt; - This petition was filed on the grounds of threat to national security posed by the UID project particularly in relation to arrangements for data sharing with foreign companies (with links to foreign intelligence agencies).&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Nagrik Chetna Manch &lt;a href="#ftn6"&gt;[6]&lt;/a&gt; - This petition was filed in 2013 and led by Dr. Anupam Saraph on the grounds that the UID project was detrimental to financial service regulation and financial &lt;em&gt;inclusion.&lt;/em&gt;&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;S. Raju &lt;a href="#ftn7"&gt;[7] &lt;/a&gt; - This petition was filed on the grounds that the UID project had implications on the federal structure of the State and was detrimental to financial inclusion.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;em&gt;Beghar Foundation&lt;/em&gt; - This petition was filed in 2013 in the Delhi High Court on the grounds invasion of privacy and exclusion specifically in relation to the homeless. It subsequently joined the petition filed by Aruna Roy and Nikhil Dey as an intervener.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Vickram Crishna – This petition was originally filed in the Bombay High Court in 2013 on the grounds of surveillance and invasion of privacy. It was later transferred to the Supreme Court.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Somasekhar – This petition was filed on the grounds of procedural unreasonableness of the UID project and also exclusion &amp;amp; privacy. The petitioner later intervened in the petition filed by Aruna Roy and Nikhil Dey in 2013.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Rajeev Chandrashekhar– This petition was filed on the ground of lack of legal sanction for the UID project. He later intervened in the petition filed by Aruna Roy and Nikhil Dey in 2013. His position has changed now.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Further, a petition was filed by Mr. Jairam Ramesh initially challenging the passage of the Act as a money bill but subsequently, it has been amended to include issues of violation of right to privacy and exclusion of the poor and has advocated for five amendments that were suggested to the Aadhaar Bill by the Rajya Sabha.&lt;/li&gt;&lt;/ul&gt;
&lt;h3 id="23" style="text-align: justify;"&gt;Relevant Orders of the Supreme Court&lt;/h3&gt;
&lt;p&gt;There are six orders of the Supreme Court which are noteworthy.&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;Order of Sept. 23, 2013 - The Supreme court directed that: 1) no person shall suffer for not having an aadhaar number despite the fact that a circular by an authority makes it mandatory; 2) it should be checked if a person applying for aadhaar number voluntarily is entitled to it under the law; and 3) precaution should be taken that it is not be issued to illegal immigrants.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Order of 26th November, 2013 – Applications were filed by UIDAI, Ministry of Petroleum &amp;amp; Natural Gas, Govt of India, Indian Oil Corporation, BPCL and HPCL for modifying the September 23rd order and sought permission from the Supreme Court to make aadhaar number mandatory. The Supreme Court held that the order of September 23rd would continue to be effective.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Order of 24th March, 2014 – This order was passed by the Supreme Court in a special leave petition filed in the case of &lt;em&gt;UIDAI v CBI&lt;/em&gt; &lt;a href="#ftn8"&gt;[8] &lt;/a&gt; wherein UIDAI was asked to UIDAI to share biometric information of all residents of a particular place in Goa to facilitate a criminal investigation involving charges of rape and sexual assault. The Supreme Court restrained UIDAI from transferring any biometric information of an individual without to any other agency without his consent in writing. The Supreme Court also directed all the authorities to modify their forms/circulars/likes so as to not make aadhaar number mandatory.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Order of 16th March, 2015 - The SC took notice of widespread violations of the order passed on September 23rd, 2013 and directed the Centre and the states to adhere to these orders to not make aadhaar compulsory.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Orders of August 11, 2015 – In the first order, the Central Government was directed to publicise the fact that aadhaar was voluntary. The Supreme Court further held that provision of benefits due to a citizen of India would not be made conditional upon obtaining an aadhaar number and restricted the use of aadhaar to the PDS Scheme and in particular for the purpose of distribution of foodgrains, etc. and cooking fuel, such as kerosene and&amp;nbsp; the LPG Distribution Scheme. The Supreme Court also held that information of an individual that was collected in order to issue an aadhaar number would not be used for any purpose except when directed by the Court for criminal investigations. Separately, the status of fundamental right to privacy was contested and accordingly the Supreme Court directed that the issue be taken up before the Chief Justice of India.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Orders of October 16, 2015 – The Union of India, the states of Gujarat, Maharashtra, Himachal Pradesh and Rajasthan, and authorities including SEBI, TRAI,&amp;nbsp; CBDT, IRDA , RBI applied for a hearing before the Constitution Bench for modification of&amp;nbsp; the order passed by the Supreme Court on August 11 and allow use of aadhaar number schemes like The Mahatma Gandhi National Rural Employment Guarantee Scheme MGNREGS), National Social Assistance Programme (Old Age Pensions, Widow Pensions, Disability Pensions) Prime Minister's Jan Dhan Yojana (PMJDY) and Employees' Providend Fund Organisation (EPFO). The Bench allowed the use of aadhaar number for these schemes but stressed upon the need to keep aadhaar scheme voluntary until the matter was finally decided.&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;Status of these orders&lt;br /&gt;The participants discussed the possible impact of the law on the operation of these orders. A participant pointed out that matters in the Supreme Court had not become infructuous because fundamental issues that were being heard in the Supreme Court had not been resolved by the passage of the Act. Several participants believed that the aforementioned orders were effective because the law had not come into force. Therefore, aadhaar number could only be used for purposes specified by the Supreme Court and it could not be made mandatory.&amp;nbsp; Participants also highlighted that when the Act was implemented, it would not nullify the orders of the Supreme Court unless Union of India asked the Supreme Court for it specifically and the Supreme Court sanctioned that.&lt;/p&gt;
&lt;h3 id="3" style="text-align: justify;"&gt;&lt;strong&gt;3. National Identity Projects in Other Jurisdictions&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;A panellist had provided a brief overview of similar programs on identification that have been launched in other jurisdictions including Pakistan, United Kingdom, France, Estonia and Argentina in the recent past in the session titled ‘Aadhaar - International Dimensions’. This presentation mainly sought to assess the incentives that drove the governments in these jurisdictions to formulate these projects, mandatory nature of their adoption and their popularity. The Report has reproduced the presentation here.&lt;/p&gt;
&lt;h3 id="31" style="text-align: justify;"&gt;Pakistan&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The Second Amendment to the Constitution of Pakistan in 2000 established the National Database and Regulation Authority in the country, which regulates government databases and statistically manages the sensitive registration database of the citizens of Pakistan. It is also responsible for issuing national identity cards to the citizens of Pakistan. Although the card is not legally compulsory for a Pakistani citizen, it is mandatory for:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Voting&lt;/li&gt;
&lt;li&gt;Obtaining a passport&lt;/li&gt;
&lt;li&gt;Purchasing vehicles and land&lt;/li&gt;
&lt;li&gt;Obtaining a driver licence&lt;/li&gt;
&lt;li&gt;Purchasing a plane or train ticket&lt;/li&gt;
&lt;li&gt;Obtaining a mobile phone SIM card&lt;/li&gt;
&lt;li&gt;Obtaining electricity, gas, and water&lt;/li&gt;
&lt;li&gt;Securing admission to college and other post-graduate institutes&lt;/li&gt;
&lt;li&gt;Conducting major financial transactions&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;Therefore, it is pretty much necessary for basic civic life in the country. In 2012, NADRA introduced the Smart National Identity Card, an electronic identity card, which implements 36 security features. The following information can be found on the card and subsequently the central database: Legal Name, Gender (male, female, or transgender), Father's name (Husband's name for married females), Identification Mark, Date of Birth, National Identity Card Number, Family Tree ID Number, Current Address, Permanent Address, Date of Issue, Date of Expiry, Signature, Photo, and Fingerprint (Thumbprint). NADRA also records the applicant's religion, but this is not noted on the card itself. (This system has not been removed yet and is still operational in Pakistan.)&lt;/p&gt;
&lt;h3 id="32" style="text-align: justify;"&gt;United Kingdom&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The Identity Cards Act was introduced in the wake of the terrorist attacks on 11th September, 2001, amidst rising concerns about identity theft and the misuse of public services. The card was to be used to obtain social security services, but the ability to properly identify a person to their true identity was central to the proposal, with wider implications for prevention of crime and terrorism. The cards were linked to a central database (the National Identity Register), which would store information about all of the holders of the cards. The concerns raised by human rights lawyers, activists, security professionals and IT experts, as well as politicians were not to do with the cards as much as with the NIR. The Act specified 50 categories of information that the NIR could hold, including up to 10 fingerprints, digitised facial scan and iris scan, current and past UK and overseas places of residence of all residents of the UK throughout their lives. The central database was purported to be a prime target for cyber attacks, and was also said to be a violation of the right to privacy of UK citizens. The Act was passed by the Labour Government in 2006, and repealed by the Conservative-Liberal Democrat Coalition Government as part of their measures to “reverse the substantial erosion of civil liberties under the Labour Government and roll back state intrusion.”&lt;/p&gt;
&lt;h3 id="33" style="text-align: justify;"&gt;Estonia&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The Estonian i-card is a smart card issued to Estonian citizens by the Police and Border Guard Board. All Estonian citizens and permanent residents are legally obliged to possess this card from the age of 15. The card stores data such as the user's full name, gender, national identification number, and cryptographic keys and public key certificates. The cryptographic signature in the card is legally equivalent to a manual signature, since 15 December 2000. The following are a few examples of what the card is used for:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;As a national ID card for legal travel within the EU for Estonian citizens&lt;/li&gt;
&lt;li&gt;As the national health insurance card&lt;/li&gt;
&lt;li&gt;As proof of identification when logging into bank accounts from a home computer&lt;/li&gt;
&lt;li&gt;For digital signatures&lt;/li&gt;
&lt;li&gt;For i-voting&lt;/li&gt;
&lt;li&gt;For accessing government databases to check one’s medical records, file taxes, etc.&lt;/li&gt;
&lt;li&gt;For picking up e-Prescriptions&lt;/li&gt;
&lt;li&gt;(This system is also operational in the country and has not been removed)&lt;/li&gt;&lt;/ul&gt;
&lt;h3 id="34" style="text-align: justify;"&gt;France&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The biometric ID card was to include a compulsory chip containing personal information, such as fingerprints, a photograph, home address, height, and eye colour. A second, optional chip was to be implemented for online authentication and electronic signatures, to be used for e-government services and e-commerce. The law was passed with the purpose of combating “identity fraud”. It was referred to the Constitutional Council by more than 200 members of the French Parliament, who challenged the compatibility of the bill with the citizens’ fundamental rights, including the right to privacy and the presumption of innocence. The Council struck down the law, citing the issue of proportionality. “Regarding the nature of the recorded data, the range of the treatment, the technical characteristics and conditions of the consultation, the provisions of article 5 touch the right to privacy in a way that cannot be considered as proportional to the meant purpose”.&lt;/p&gt;
&lt;h3 id="35" style="text-align: justify;"&gt;Argentina&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Documento Nacional de Identidad or DNI (which means National Identity Document) is the main identity document for Argentine citizens, as well as temporary or permanent resident aliens. It is issued at a person's birth, and updated at 8 and 14 years of age simultaneously in one format: a card (DNI tarjeta); it's valid if identification is required, and is required for voting. The front side of the card states the name, sex, nationality, specimen issue, date of birth, date of issue, date of expiry, and transaction number along with the DNI number and portrait and signature of the card's bearer. The back side of the card shows the address of the card's bearer along with their right thumb fingerprint. The front side of the DNI also shows a barcode while the back shows machine-readable information. The DNI is a valid travel document for entering Argentina, Bolivia, Brazil, Chile, Colombia, Ecuador, Paraguay, Peru, Uruguay, and Venezuela. (System still operational in the country)&lt;/p&gt;
&lt;h3 id="4" style="text-align: justify;"&gt;&lt;strong&gt;4. Technologies of Identification and Authentication&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The panel in the session titled ‘Aadhaar: Science, Technology, and Security’ explained the technical aspects of use of biometrics and privacy concerns, technology architecture for identification and inadequacy of infrastructure for information security. In this section, we have summarised the presentation and the ensuing discussions on these issues.&lt;/p&gt;
&lt;h3 id="41" style="text-align: justify;"&gt;Use of Biometric Information for Identification and Authentication&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The panelists explained with examples that identification and authentication were different things. Identity provides an answer to the question “who are you?” while authentication is a challenge-response process that provides a proof of the claim of identity. Common examples of identity are User ID (Login ID), cryptographic public keys and ATM or Smart cards while common authenticators are passwords (including OTPs), PINs and cryptographic private keys. Identity is public information but an authenticator must be private and known only to the user. Authentication must necessarily be a conscious process and active participation by the user is a must. It should also always be possible to revoke an authenticator. After providing this understanding of the two processes the panellist then explained if biometric information could be used for identification or authentication under the UID Project. Biometric information is clearly public information and it is questionable if it can be revoked. Therefore it should never be used for authentication, but only for identity verification. There is a possibility of authentication by fingerprints under the UID Project, without conscious participation of the user. One could trace the fingerprints of an individual from any place the individual has been in contact with. Therefore, authentication must certainly be done by other means. The panellist pointed out that there were five kinds of authentication under the UID Project, out of which two-factor authentication and one time password were considered suitable but use of biometric information and demographic information was extremely threatening and must be withdrawn.&lt;/p&gt;
&lt;h3 id="42" style="text-align: justify;"&gt;Architectures of Identification&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The panelists explained the architecture of the UID Project that has been designed for identification purposes, highlighted its limitations and suggested alternatives. His explanations are reproduced below.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Under the UID Project, there is a centralised means of identification i.e. the aadhaar number and biometric information stored in one place, Central Identification Data Repository (CIDR). It is better to have multiple means of identification than one (as contemplated under the UID Project) for preservation of our civil liberties. The question is what the available alternatives are. Web of trust is a way for operationalizing distributed identification but the challenge is how one brings people from all social levels to participate in it. There is a need for registrars who will sign keys and public databases for this purpose.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The aadhaar number functions as a common index and facilitates correlation of data across Government databases. While this is tremendously attractive it raises several privacy concerns as more and more information relating to an individual is available to others and is likely to be abused.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The aadhaar number is available in human readable form. This raises the risk of identification without consent and unauthorised profiling. It cannot be revoked. Potential for damage in case of identity theft increases manifold.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Under the UID Project, for the purpose of information security, Authentication User Agencies (“&lt;strong&gt;AUA&lt;/strong&gt;”) are required to use local identifiers instead of aadhaar numbers but they are also required to map these local identifiers to the aadhaar numbers. Aadhaar numbers are not cryptographically secured; in fact they are publicly available. Hence this exercise for securing information is useless. An alternative would be to issue different identifiers for different domains and cryptographically embed a “master identifier” (in this case, equivalent of aadhaar number) into each local identifier.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;All field devices (for example POS machines) should be registered and must communicate directly with UIDAI. In fact, UIDAI must verify the authenticity (tamper proof) of the field device during run time and a UIDAI approved authenticity certificate must be issued for field devices. This certificate must be made available to users on demand. Further, the security and privacy frameworks within which AUAs work must be appropriately defined by legal and technical means.&lt;/p&gt;
&lt;h3 id="43" style="text-align: justify;"&gt;Security Infrastructure of CIDR&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The panelists also enumerated the security features of the UID Project and highlighted the flaws in these features. These have been summarised below.&lt;/p&gt;
&lt;p&gt;The security and privacy infrastructure of UIDAI has the following main features:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;2048 bit PKI encryption of biometric data in transit&lt;/li&gt;
&lt;li&gt;End-to-end encryption from enrolment/POS to CIDR&lt;/li&gt;
&lt;li&gt;HMAC based tamper detection of PID blocks&lt;/li&gt;
&lt;li&gt;Registration and authentication of AUAs&lt;/li&gt;
&lt;li&gt;Within CIDR only a SHA 1 Hash of Aadhaar number is stored&lt;/li&gt;
&lt;li&gt;Audit trails are stored SHA 1 encrypted. Tamper detection?&lt;/li&gt;
&lt;li&gt;Only hashes of passwords and PINs are stored. (biometric data stored in original form though!)&lt;/li&gt;
&lt;li&gt;Authentication requests have unique session keys and HMAC&lt;/li&gt;
&lt;li&gt;Resident data stored using 100 way sharding (vertical partitioning). First two digits of Aadhaar number as shard keys&lt;/li&gt;
&lt;li&gt;All enrolment and update requests link to partitioned databases using Ref IDs (coded indices)&lt;/li&gt;
&lt;li&gt;All accesses through a hardware security module&lt;/li&gt;
&lt;li&gt;All analytics carried out on anonymised data&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;The panellists pointed out the concerns about information security on account of design flaws, lack of procedural safeguards, openness of the system and too much trust imposed on multiple players. All symmetric and private keys and hashes are stored somewhere within UIDAI.&amp;nbsp; This indicates that trust is implicitly assumed which is a glaring design flaw.&amp;nbsp; There is no well-defined approval procedure for data inspection, whether it is for the purpose of investigation or for data analytics. There is a likelihood of system hacks, insider leaks, and tampering of authentication records and audit trails. The ensuing discussions highlighted that the UIDAI had admitted to these security risks. The enrolment agencies and the enrolment devices cannot be trusted. AUAs cannot be trusted with biometric and demographic data; neither can they be trusted with sensitive user data of private nature. There is a need for an independent third party auditor for distributed key management, auditing and approving UIDAI programs, including those for data inspection and analytics, whitebox cryptographic compilation of critical parts of the UIDAI programs, issue of cryptographic keys to UIDAI programs for functional encryption, challenge-response for run-time authentication and certification of UIDAI programs. The panellist recommended that there was a need to to put a suitable legal framework to execute this.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The participants also discussed that information infrastructure must not be made of proprietary software (possibility for backdoors for US) and there must be a third party audit with a non-negotiable clause for public audit.&lt;/p&gt;
&lt;h3 id="5" style="text-align: justify;"&gt;&lt;strong&gt;5. Aadhaar for Welfare?&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The Report has summarised the discussions that took place in the sessions on ‘Direct Benefits Transfers’ and ‘Aadhaar: Broad Issues - II’ where the panellists critically analysed the claims of benefits and inclusion of Aadhaar made by the government in light of the ground realities in states where Aadhaar has been adopted for social welfare schemes.&lt;/p&gt;
&lt;h3 id="51" style="text-align: justify;"&gt;Social Welfare: Modes of Access and Exclusion&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Under the Act, a person may be required to authenticate or give proof of the aadhaar number in order to receive subsidy from the government (Section 7). A person is required to punch their fingerprints on POS machines in order to receive their entitlement under the social welfare schemes such as LPG and PDS. It was pointed out in the discussions that various states including Rajasthan and Delhi had witnessed fingerprint errors while doling out benefits at ration shops under the PDS scheme. People have failed to receive their entitled benefits because of these fingerprint errors thus resulting in exclusion of beneficiaries &lt;a href="#ftn9"&gt;[9]&lt;/a&gt;. A panellist pointed out that in Rajasthan, dysfunctional biometrics had led to further corruption in ration shops. Ration shop owners often lied to the beneficiaries about functioning of the biometric machines (POS Machines) and kept the ration for sale in the market therefore making a lot of money at the expense of uninformed beneficiaries and depriving them of their entitlements.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Another participant organisation also pointed out similar circumstances in the ration shops in Patparganj and New Delhi constituencies. Here, the dealers had maintained the records of beneficiaries who had been categorized as follows: beneficiaries whose biometrics did not match, beneficiaries whose biometrics matched and entitlements were provided, beneficiaries who never visited the ration shop. It had been observed that there were no entries in the category of beneficiaries whose biometrics did not match however, the beneficiaries had a different story to tell. They complained that their biometrics did not match despite trying several times and there was no mechanism for a manual override. Consequently, they had not been able to receive any entitlements for months. The discussions also pointed out that the food authorities had placed complete reliance on authenticity of the POS machines and claim that this system would weed out families who were not entitled to the benefits. The MIS was also running technical glitches as a result there was a problem with registering information about these transactions hence, no records had been created with the State authority about these problems. A participant also discussed the plight of 30,000 widows in Delhi, who were entitled to pension and used to collect their entitlement from post offices, faced exclusion due to transition problems under the Jan Dhan Yojana (after the Jandhan was launched the money was transferred to their bank accounts in order to resolve the problem of misappropriation of money at the hands of post office officials). These widows were asked to open bank accounts to receive their entitlements and those who did not open these accounts and did not inform the post office were considered bogus.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In the discussions, the participants also noted that this unreliability of fingerprints as a means of authentication of an individual’s identity was highlighted at the meeting of Empowered Group of Ministers in 2011 by J Dsouza, a biometrics scientist. He used his wife’s fingerprints to demonstrate that fingerprints may change overtime and in such an event, one would not be able to use the POS machine anymore as the machine would continue to identify the impressions collected initially.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The participants who had been working in the field had contributed to the discussions by busting the myth that the UID Project helped to identify who was poor and resolve the problem of exclusion due to leakages in the social welfare programs. These discussions have been summarised below.&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;It is important to understand that the UID Project is merely an identification and authentication system. It only helps in verifying if an individual is entitled to benefits under a social security scheme. It does not ensure plugging of leakages and reducing corruption in social security schemes as has been claimed by the Government. The reduction in leakage of PDS, for instance, should be attributed to digitization and not UID. The Government claims, that it has saved INR 15000 crore in provision of LPG on identification of 3.34 crore inactive accounts on account of the UID Project. This is untrue because the accounts were weeded by using mechanisms completely unrelated to the UID Project. Consequently, the savings on account of UID are only of INR 120 crore and not 15000 crore.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;The UID Project has resulted in exclusion of people either because they do not have an aadhaar number, or they have a wrong identification, or there are errors of classification or wilful misclassification. About 99.7% people who were given aadhaar numbers already had an identification document. In fact, during enrolment a person is required to produce one of 14 identification documents listed under the law in order to get an aadhaar number which makes it very difficult for a person with no identity to become entitled to a social welfare scheme.&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;A participant condemned the Government’s claim that the UID Project had helped in removing fake, bogus and duplicate cards and said that these terms could not be used synonymously and the authorities had no clarity about the difference between the meanings of these terms. The UID Project had only helped in removal of duplicate cards but had not helped in combating the use of fake and bogus cards.&lt;/p&gt;
&lt;h3 id="52" style="text-align: justify;"&gt;Financial Inclusion and Direct Benefits Transfer&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The participants also engaged in the discussions about the impact of the UID project on financial inclusion in India in the sessions titled ‘Aadhaar: Broad Issues - I &amp;amp; II’. We have summarised these discussions below.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The UID Project seeks to directly transfer money to a bank account in order to combat corruption. The discussions highlighted that this was nothing but introducing a neo liberal thrust in social policy and that it was not feasible for various reasons. First, 95% of rural India did not have functioning banks and banks are quite far away. Second, in order to combat this dearth of banks the idea of business correspondents, who handled banking transactions and helped in opening of bank accounts, had been introduced which had created various problems. The Reserve Bank of India reported that there was dearth of business correspondents as there was very little incentive to become one; their salary is merely INR 4000. Third, there were concerns about how an aadhaar number was considered a valid document for Know Your Customer (KYC) checks. There was a requirement for scrutiny and auditing of documents submitted during the time of enrolment which, in the present scheme of things, could not be verified. Fourth, there were no restrictions on number of bank accounts that could be opened with a single aadhaar number which gave rise to a possibility of opening multiple and shell accounts on a single aadhaar number. Therefore, records only showed transactions when money was transferred from an aadhaar number to another aadhaar number as opposed to an account-to-account transfer. The discussion relied on NPCI data which shows which bank an aadhaar number is associated with but does not show if a transaction by an aadhaar number is overwritten by another bank account belonging to the same aadhaar number.&lt;/p&gt;
&lt;h3 id="6" style="text-align: justify;"&gt;&lt;strong&gt;6. Surveillance and UIDAI&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The participants had discussed the possibility of an alternative purpose for enrolling Aadhaar in the session titled ‘Privacy, Surveillance, and Ethical Dimensions of Aadhaar’. The discussion traced the history of this project to gain insight on this issue. We have summarised below the key take aways from this discussion.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;There are claims that the main objective of launching the UID Project is not to facilitate implementation of social security schemes but to collect personal (financial and non-financial) information of the citizens and residents of the country to build a data monopoly. For this purpose, PDS was chosen as a suitable social security scheme as it has the largest coverage. Several participants suggested that numerous reports authored by FICCI, KPMG and ASSOCHAM contained proposals for establishing a national identity authority which threw some light on the commercial intentions behind information collection under the UID Project.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;It was also pointed out that there was documented proof that information collected under the UID Project might have been shared with foreign companies. There are suggestions about links established between proponents of the UID Project and companies backed by CIA or the French Government which run security projects and deal in data sharing in several jurisdictions.&lt;/p&gt;
&lt;h3 id="7" style="text-align: justify;"&gt;&lt;strong&gt;7. Strategies for Future Action&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;The participants laid down a list of measures that must be taken to take the discussions forward. We have enumerated these recommendations below.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Prepare and compile an anthology of articles as an output of this workshop. &lt;/li&gt;
&lt;li&gt;Prepare position papers on specific issues related to the UID Project &lt;/li&gt;
&lt;li&gt;Prepare pamphlets/brochures on issues with the UID Project for public consumption &lt;/li&gt;
&lt;li&gt;Prepare counter-advertisements for Aadhaar&lt;/li&gt;
&lt;li&gt;Publish existing empirical evidence on the flaws in Aadhaar.&lt;/li&gt;
&lt;li&gt;Set up an online portal dedicated to providing updates on the UID Project and allows discussions on specific issues related to Aadhaar.&lt;/li&gt;
&lt;li&gt;Use Social Media to reach out to the public. Regularly track and comment on social media pages of relevant departments of the government.&lt;/li&gt;
&lt;li&gt;Create groups dedicated to research and advocacy of specific aspects of the UID Project. &lt;/li&gt;
&lt;li&gt;Create a Coordination Committee preferably based in Delhi which would be responsible for regularly holding meetings and for preparing a coordinated plan of action. Employ permanent to staff to run the Committee.&lt;/li&gt;
&lt;li&gt;Organise an advocacy campaign against use of Aadhaar in collaboration with other organisations and build public domain acceptance. &lt;/li&gt;
&lt;li&gt;The campaign must specifically focus on the unfettered scope of UID and expanse, misrepresentation of the success of Aadhaar by highlighting real savings, technological flaws, status of pilot programs and increasing corruption on account of the UID Project&lt;/li&gt;
&lt;li&gt;Prepare a statement of public concern regarding the UID Project and collect signatures from eminent persons including academics, technical experts, civil society groups and members of parliament.&lt;/li&gt;
&lt;li&gt;Organise events and discussions on issues relating to Aadhaar and invite members og government departments to speak and discuss the issues. &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Write to Members of Parliament and Members of Legislative Assemblies raising questions on their or their parties’ support for Aadhaar and silence on the problems created by the UID Project. &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Organise public hearings in states like Rajasthan to observe and document ground realities of the UID Project and share these outcomes with the state government and media. &lt;/li&gt;
&lt;li&gt;Plan a national social audit and public hearing on the working of UID Project in the country. &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;File Contempt Petitions in the Supreme Court and High Courts against mandatory use of Aadhaar number for services not allowed by the Supreme Court. &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Reach out to and engage with various foreign citizens and organisations that have been fighting on similar issues. The organisations and individuals who could be approached would include EPIC, Electronic Frontier foundation, David Moss, UK, Roger Clarke, Australia, Prof. Ian Angel, Snowden, Assange and Chomsky.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Work towards increasing awareness about the UID Project and gaining support from the student and research community, student organisations, trade unions, and other associations and networks in the unorganised sector.&lt;/li&gt;&lt;/ul&gt;
&lt;h3 id="AA" style="text-align: justify;"&gt;&lt;strong&gt;Annexure A – Workshop Agenda&lt;/strong&gt;&lt;/h3&gt;
&lt;h4&gt;May 26, 2016&lt;/h4&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;9:00-9:30&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Registration&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;9:30-10:00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Prof. Dinesh Abrol - &lt;em&gt;Welcome&lt;/em&gt;&lt;br /&gt; 
&lt;em&gt;Self-introduction and expectations of participants&lt;/em&gt;&lt;br /&gt;
Dr. Usha Ramanathan - &lt;em&gt;Overview of the Workshop&lt;/em&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;10:00-11:00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Session 1: Current Status of Aadhaar&lt;/strong&gt;&lt;br /&gt;
Dr. Usha Ramanathan, Legal Researcher, New Delhi - &lt;em&gt;What the 2016 Law Says, and How it Came into Being&lt;/em&gt;&lt;br /&gt;
S. Prasanna, Advocate, New Delhi - &lt;em&gt;Status and Force of Supreme Court Orders on Aadhaar&lt;/em&gt;&lt;br /&gt; &lt;em&gt;Discussion&lt;/em&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;11:00-11:30&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Tea Break&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;11:30-13:30&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Session 2: Direct Benefits Transfers&lt;/strong&gt;&lt;br /&gt;
Prof. Reetika Khera, Indian Institute of Technology, Delhi - &lt;em&gt;Welfare Needs Aadhaar like a Fish Needs a   Bicycle&lt;/em&gt;&lt;br /&gt;
Prof. R. Ramakumar, Tata Institute of Social Sciences, Mumbai - &lt;em&gt;Aadhaar and the Social Sector: A critical   analysis of the claims of benefits and inclusion&lt;/em&gt;&lt;br /&gt;
Ashok Rao, Delhi Science Forum - &lt;em&gt;Cash Transfers Study&lt;/em&gt;&lt;br /&gt;
&lt;em&gt;Discussion&lt;/em&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;13:30-14:30&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Lunch&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;14:30-16:00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Session 3: Aadhaar: Science, Technology, and Security&lt;/strong&gt;&lt;br /&gt;
Prof. Subashis Banerjee, Dept of Computer Science &amp;amp; Engineering, IIT,   Delhi - &lt;em&gt;Privacy and Security   Issues Related to the Aadhaar Act&lt;/em&gt;&lt;br /&gt;
Pukhraj Singh, Former National Cyber Security Manager, Aadhaar, New Delhi - &lt;em&gt;Aadhaar: Security and   Surveillance Dimensions&lt;/em&gt;&lt;br /&gt;
&lt;em&gt;Discussion&lt;/em&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;16:00-16:30&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Tea Break&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;16:30-17:30&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Session 4: Aadhaar - International Dimensions&lt;/strong&gt;&lt;br /&gt; 
Joshita Pai, Center for Communication Governance, National Law University, Delhi - &lt;em&gt;Biometrics and Mandatory IDs in Other Parts of the World&lt;/em&gt;&lt;br /&gt;
Dr. Gopal Krishna, Citizens Forum for Civil Liberties - &lt;em&gt;International Dimensions of Aadhaar&lt;/em&gt;&lt;br /&gt;
&lt;em&gt;Discussion&lt;/em&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;17:30-18:00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;High Tea&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h4&gt;May 27, 2016&lt;/h4&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;9:30-11:00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Session 5: Privacy, Surveillance and Ethical Dimensions of Aadhaar&lt;/strong&gt;&lt;br /&gt;
Prabir Purkayastha, Free Software Movement of India, New Delhi - &lt;em&gt;Surveillance Capitalism and the Commodification of Personal Data&lt;/em&gt;&lt;br /&gt;
Arjun Jayakumar, SFLC - &lt;em&gt;Surveillance Projects Amalgamated&lt;/em&gt;&lt;br /&gt;
Col Mathew Thomas, Bengaluru - &lt;em&gt;The Deceit of Aadhaar&lt;em&gt;&lt;/em&gt;&lt;br /&gt;
&lt;em&gt;Discussion&lt;/em&gt;&lt;/em&gt;&lt;/p&gt;
&lt;em&gt;
&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;11:00-11:30&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Tea Break&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;em&gt;11:30-13:00&lt;/em&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Session 6: Aadhaar - Broad Issues I&lt;/strong&gt;&lt;br /&gt;
Prof. G Nagarjuna, Homi Bhabha Center for Science Education, Tata Institute of Fundamental Research, Mumbai - &lt;em&gt;How to prevent linked data in the context of Aadhaar&lt;/em&gt;&lt;br /&gt;
Dr. Anupam Saraph, Pune - &lt;em&gt;Aadhaar and Moneylaundering&lt;/em&gt;&lt;br /&gt;
&lt;em&gt;Discussion&lt;/em&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;13:00-14:00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Lunch&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;14:00-15:30&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Session 7: Aadhaar - Broad Issues II&lt;/strong&gt;&lt;br /&gt;
Prof. MS Sriram, Visiting Faculty, Indian Institute of Management, Bangalore - &lt;em&gt;Financial lnclusion&lt;/em&gt;&lt;br /&gt;
Nikhil Dey, MKSS, Rajasthan - &lt;em&gt;Field witness: Technology on the Ground&lt;/em&gt;&lt;br /&gt;
Prof. Himanshu, Centre for Economic Studies &amp;amp; Planning, JNU - &lt;em&gt;UID Process and Financial Inclusion&lt;/em&gt;&lt;br /&gt;
&lt;em&gt;Discussion&lt;/em&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;15:30-16:00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Session 8: Conclusion&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;16:00-18:00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Informal Meetings&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 id="AB" style="text-align: justify;"&gt;&lt;strong&gt;Annexure B – Workshop Participants&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Anjali Bhardwaj, Satark Nagrik Sangathan&lt;/p&gt;
&lt;p&gt;Dr. Anupam Saraph&lt;/p&gt;
&lt;p&gt;Arjun Jayakumar, Software Freedom Law Centre&lt;/p&gt;
&lt;p&gt;Ashok Rao, Delhi Science Forum&lt;/p&gt;
&lt;p&gt;Prof. Chinmayi Arun, National Law University, Delhi&lt;/p&gt;
&lt;p&gt;Prof. Dinesh Abrol, Jawaharlal Nehru University&lt;/p&gt;
&lt;p&gt;Prof. G Nagarjuna, Homi Bhabha Center for Science Education, Tata Institute of Fundamental Research, Mumbai&lt;/p&gt;
&lt;p&gt;Dr. Gopal Krishna, Citizens Forum for Civil Liberties&lt;/p&gt;
&lt;p&gt;Prof. Himanshu, Jawaharlal Nehru University&lt;/p&gt;
&lt;p&gt;Japreet Grewal, the Centre for Internet and Society&lt;/p&gt;
&lt;p&gt;Joshita Pai, National Law University, Delhi&lt;/p&gt;
&lt;p&gt;Malini Chakravarty, Centre for Budget and Governance Accountability&lt;/p&gt;
&lt;p&gt;Col. Mathew Thomas&lt;/p&gt;
&lt;p&gt;Prof. MS Sriram, Indian Institute of Management, Bangalore&lt;/p&gt;
&lt;p&gt;Nikhil Dey, Mazdoor Kisan Shakti Sangathan&lt;/p&gt;
&lt;p&gt;Prabir Purkayastha, Knowledge Commons and Free Software Movement of India&lt;/p&gt;
&lt;p&gt;Pukhraj Singh, Bhujang&lt;/p&gt;
&lt;p&gt;Rajiv Mishra, Jawaharlal Nehru University&lt;/p&gt;
&lt;p&gt;Prof. R Ramakumar, Tata Institute of Social Sciences, Mumbai&lt;/p&gt;
&lt;p&gt;Dr. Reetika Khera, Indian Institute of Technology, Delhi&lt;/p&gt;
&lt;p&gt;Dr. Ritajyoti Bandyopadhyay, Indian Institute of Science Education and Research, Mohali&lt;/p&gt;
&lt;p&gt;S. Prasanna, Advocate&lt;/p&gt;
&lt;p&gt;Sanjay Kumar, Science Journalist&lt;/p&gt;
&lt;p&gt;Sharath, Software Freedom Law Centre&lt;/p&gt;
&lt;p&gt;Shivangi Narayan, Jawaharlal Nehru University&lt;/p&gt;
&lt;p&gt;Prof. Subhashis Banerjee, Indian Institute of Technology, Delhi&lt;/p&gt;
&lt;p&gt;Sumandro Chattapadhyay, the Centre for Internet and Society&lt;/p&gt;
&lt;p&gt;Dr. Usha Ramanathan, Legal Researcher&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Note: This list is only indicative, and not exhaustive.&lt;/em&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;a name="ftn1"&gt;&lt;strong&gt;[1]&lt;/strong&gt;&lt;/a&gt; Civil Appeal No. 4853 of 2014&lt;/p&gt;
&lt;p&gt;&lt;a name="ftn2"&gt;&lt;strong&gt;[2]&lt;/strong&gt;&lt;/a&gt; WP(C) 494/2012&lt;/p&gt;
&lt;p&gt;&lt;a name="ftn3"&gt;&lt;strong&gt;[3]&lt;/strong&gt; &lt;/a&gt;. WP(C) 829/2013&lt;/p&gt;
&lt;p&gt;&lt;a name="ftn4"&gt;&lt;strong&gt;[4]&lt;/strong&gt;&lt;/a&gt; WP(C) 833/2013&lt;/p&gt;
&lt;p&gt;&lt;a name="ftn5"&gt;&lt;strong&gt;[5]&lt;/strong&gt;&lt;/a&gt; WP (C) 37/2015; (Earlier intervened in the Aruna Roy petition in 2013)&lt;/p&gt;
&lt;p&gt;&lt;a name="ftn6"&gt;&lt;strong&gt;[6]&lt;/strong&gt;&lt;/a&gt; WP (C) 932/2015&lt;/p&gt;
&lt;p&gt;&lt;a name="ftn7"&gt;&lt;strong&gt;[7]&lt;/strong&gt;&lt;/a&gt; Transferred from Madras HC 2013.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="ftn8"&gt;&lt;strong&gt;[8]&lt;/strong&gt;&lt;/a&gt; SLP (Crl) 2524/2014 filed against the order of the Goa Bench of the Bombay HC in CRLWP 10/2014 wherein the High Court had directed UIDAI to share biometric information held by them of all residents of a particular place in Goa to help with a criminal investigation in a case involving charges of rape and sexual assault.&lt;/p&gt;
&lt;p&gt;&lt;a name="ftn9"&gt;&lt;strong&gt;[9]&lt;/strong&gt;&lt;/a&gt; See :http://scroll.in/article/806243/rajasthan-presses-on-with-aadhaar-after-fingerprint-readers-fail-well-buy-iris-scanners&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/report-on-understanding-aadhaar-and-its-new-challenges'&gt;https://cis-india.org/internet-governance/blog/report-on-understanding-aadhaar-and-its-new-challenges&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Japreet Grewal, Vanya Rakesh, Sumandro Chattapadhyay, and Elonnai Hickock</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Data Systems</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Welfare Governance</dc:subject>
    
    
        <dc:subject>Biometrics</dc:subject>
    
    
        <dc:subject>Big Data for Development</dc:subject>
    
    
        <dc:subject>UID</dc:subject>
    

   <dc:date>2019-03-16T04:42:52Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/gov-now-pratap-vikram-singh-17032016-why-aadhaar-is-baseless">
    <title>Pratap Vikram Singh - Why Aadhaar is Baseless?</title>
    <link>https://cis-india.org/internet-governance/news/gov-now-pratap-vikram-singh-17032016-why-aadhaar-is-baseless</link>
    <description>
        &lt;b&gt;This article by Pratap Vikram Singh, Governance Now, discusses the problems emerging out of the UIDAI project due to its lack of mechanisms for informed and granular consent, and for seeking recourse in the case of denial of service. The article quotes Sumandro Chattapadhyay and mentions Hans Varghese Mathew's work on the biometric basis of UIDAI. It was written before the Aadhaar bill was passed in Lok Sabha.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Cross-posted from &lt;a class="external-link" href="http://www.governancenow.com/news/regular-story/baseless-aadhaar"&gt;Governance Now&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;It was no less than a roller-coaster ride for Aadhaar, a programme formulated by the UPA government to assign a 12-digit unique number to every Indian resident. From the time it came into being in 2009, Aadhaar drew a volley of criticism, thanks to the misgivings and apprehensions that various critics and civil society organisations had. It was criticised for lack of a clear purpose, degree of effectiveness and absence of a privacy law and was virtually thrown into the bin by a parliamentary panel headed by BJP’s Yashwant Sinha in December 2011.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;When the finance minister Arun Jaitley, in his budget speech, announced that the government would introduce the Aadhaar bill during the budget session, expectations were already set high. The bill, giving statutory backing to the unique identification authority of India (UIDAI), the implementing authority, was passed by the Lok Sabha on March 11. While the privacy and voluntary versus mandatory provisions are under the consideration of the supreme court, the bill makes way for linking Aadhaar with all government subsidies, benefits and services. The law on Aadhaar, former UIIDAI chairman Nandan Nilekani wrote in the Indian Express, will help the government in going paperless, presence-less and cashless. The legislation, however, fails to deliver on several counts.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;However, prior to evaluating the bill (yet to be passed by the Rajya Sabha at the time of this writing though it is a money bill), let us take a look at its major aspects. For those, who always wondered whether Aadhaar is mandatory or voluntary, the bill 2016 makes it mandatory to avail subsidy, benefit or a service from the government.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The bill has provisions related to information security and confidentiality (section 28) which not only extend to employees of the UIDAI but also consultants and external agencies working with the authority.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The proposed law restricts information sharing. It bars UIDAI from sharing core biometric information – the bill defines it as fingerprints and iris scan – with “anyone for any reason whatsoever” or “used for any purpose other than generation of Aadhaar numbers and authentication under this Act”. The section 32 of the bill entitles Aadhaar number holders to access her or his authentication record. It also bars the authority from collecting, keeping or maintaining information about the purpose of authentication.&lt;/p&gt;
&lt;h3&gt;Odd Drives the Bill&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;While the intent is clear and is aimed at streamlining welfare schemes to ensure it reaches the bottom of the pyramid, cutting through the long chain of pilferage and subversion, the bill, however, has several shortcomings. To begin with, the government should not have taken the money bill route to pass the legislation – tactfully avoiding any conclusive discussion and debate in the Rajya Sabha, where it is in minority.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The bill assumes that the technology and the biometric system used by the UIDAI are flawless and it doesn’t provide any recourse in case of denial of a service. “If your fingerprint is not matching and you lose out on service, then what is the alternative mechanism you have,” asks Sumandro Chattapadhyay, research director, centre for internet and society (CIS). The bill doesn’t provide for recourse. “What if the scanning machine fails? What if the identifiers of two people match?”&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Based on experiments conducted in the initial days of the Aadhaar programme, Hans Verghese Mathews, another CIS researcher, did a study on the probability of matching of identifiers of two persons. “For the current population of 1.2 billion the expected proportion of duplicands (users whose identifiers match) is 1/121, a ratio which is far too high,” Mathews wrote in the Economic and Political Weekly in February.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;“It is like putting the technology in a black box – which can’t be reviewed,” says Chattapadhyay. The bill doesn’t talk about setting up an independent body to review the logs and keep an eye on wrong and duplicate matches.&lt;/p&gt;
&lt;h3&gt;Who Defines National Security?&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;According to public policy experts, it is an attempt to seek “minimal legitimacy” from parliament and further adds to the unbridled power of the executive.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Although the bill restricts information sharing in section 29, sections 33 and 48 provide exemption in cases of national security and public emergency, respectively. The legislation, nevertheless, doesn’t elaborate on what constitutes national security and public emergency, leaving it to the executives. The section 33 reads: “Nothing contained in… shall apply in respect of any disclosure of information, including identity information or authentication records, made in the interest of national security….”&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Similarly, section 48 states that if, at any time, the central government is of the opinion that a public emergency exists, “the central government may, by notification, supersede the Authority for such period, not exceeding six months, as may be specified in the notification and appoint a person or persons as the president may direct to exercise powers and discharge functions under this Act”.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Says Jayati Ghosh, professor, centre for economic studies and planning, Jawaharlal Nehru University, “National security is a very opaque term. Who decides what national security is? Today, the whole JNU is being projected as a threat to national security.” Swagato Sarkar, associate professor and executive director, Jindal school of government and public policy, OP Jindal Global University, says, “The bill has provisions for oversight on the use of Aadhaar, but then it suspends those provisions in case of emergency in the later sections, giving the state the power to use biometric information for whatever it deems fit.”&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Sarkar adds, “It seems the bill is simply an instrument for seeking minimum legitimacy from parliament. The bill tries to address the concern of privacy minimally and it hardly serves any purpose.” He believes that there is a need to define the broader contours of democratic control of the state and reassess the changing state-citizen relationship, instead of rejecting the whole idea on the basis of surveillance and privacy. In other words, there is a need for strong parliamentary oversight, and that the Aadhaar related matters shouldn’t be completely delegated to the executive.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In its recommendations on formulating Privacy Act, the justice AP Shah committee in 2012 provided for establishing the office of privacy commissioner at the regional and central levels, defining the role of self-regulating organisations and co-regulation, and creating a system of complaints and redressal for aggrieved individuals. Since the country still doesn’t have any legislation on privacy, people are left on their own in case of an infringement or violation of privacy. Moreover, section 47 states, “No court shall take cognizance of any offence punishable under this Act, save on a complaint made by the Authority or any officer or person authorised by it.”&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In its report, the parliamentary committee headed by Yashwant Sinha notes that “enactment of national data protection law… is a prerequisite for any law that deals with large scale collection of information from individuals and its linkages across separate databases”. The committee notes that in absence of data protection legislation, it would be difficult to deal with issues of access, misuse of personal information, surveillance, profiling, linking and matching of databases and securing confidentiality of information.&lt;/p&gt;
&lt;h3&gt;Subsidy-Aadhaar Linkage&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The Sinha committee also takes a cautious view of the role of Aadhaar in curbing leakages in subsidy distribution, as beneficiary identification is done by states. It notes, “Even if the Aadhaar number links entitlements to targeted beneficiaries, it may not even ensure that beneficiaries have been correctly identified. Thus, the present problem of proper identification would persist.”&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;According to Ghosh, the biggest danger in using Aadhaar for social welfare programmes is that the fingerprints of the rural working class is not always in good shape and hence Aadhaar will not be the best way of identification. “If I am misidentified, I can go to so many places for recourse. But what if a labourer in a remote Jharkhand village is misidentified? Where and whether he would go?” the economist asks. Besides, the bill doesn’t limit the use of Aadhaar and defines areas where it can be used. Section 57 says that the law will not prevent the use of Aadhaar number for establishing the identity of an individual for any purpose, “whether by the state or anybody corporate or person, pursuant to any law, for the time being in force or any contract to this effect.”&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;According to a PRS Legislative review, since the bill also allows private persons to use Aadhaar as a proof of identity for any purpose, the provision will open a floodgate and enable private entities such as airlines, telecom, insurance and real estate companies to mandate Aadhaar as a proof of identity for availing their services.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Since the bill doesn’t restrict its application, people will not have a choice to identify themselves other than using Aadhaar when corporate organisations make it mandatory, says Chattapadhyay of the CIS. Adds Sarkar, “The bill should clearly mention sectors or services where Aadhaar will be potentially used (or made mandatory). Every time a new sector or service is added to the list, it is done after parliamentary approval.”&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;So far, 98 crore people have been assigned Aadhaar number. So far the project has costed Rs 8,000 crore.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/gov-now-pratap-vikram-singh-17032016-why-aadhaar-is-baseless'&gt;https://cis-india.org/internet-governance/news/gov-now-pratap-vikram-singh-17032016-why-aadhaar-is-baseless&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital India</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Biometrics</dc:subject>
    

   <dc:date>2016-04-02T05:31:30Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/aadhaar-project-and-bill-faq">
    <title>FAQ on the Aadhaar Project and the Bill</title>
    <link>https://cis-india.org/internet-governance/blog/aadhaar-project-and-bill-faq</link>
    <description>
        &lt;b&gt;This FAQ attempts to address the key questions regarding the Aadhaar/UIDAI project and the Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Bill, 2016 (henceforth, Bill). This is neither a comprehensive list of questions, nor does it contain fully developed answers. We will continue to add questions to this list, and edit/expand the answers, based on our ongoing research. We will be grateful to receive your comments, criticisms, evidences, edits, suggestions for new answers, and any other responses. These can either be shared as comments in the document hosted on Google Drive, or via tweets sent to the information policy team at @CIS_InfoPolicy. &lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;To comment on and/or download the file, click &lt;a href="https://docs.google.com/document/d/1ib5bQUgZZ7PABurMHlzmfwZK6932DFQI6hUlad-vwfI/edit?usp=sharing" target="_blank"&gt;here&lt;/a&gt;.&lt;/h4&gt;
&lt;hr /&gt;
&lt;iframe src="https://docs.google.com/document/d/1ib5bQUgZZ7PABurMHlzmfwZK6932DFQI6hUlad-vwfI/pub?embedded=true" height="500" width="100%"&gt;&lt;/iframe&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/aadhaar-project-and-bill-faq'&gt;https://cis-india.org/internet-governance/blog/aadhaar-project-and-bill-faq&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Elonnai Hickok, Vanya Rakesh, and Vipul Kharbanda</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Digital India</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Biometrics</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2016-04-13T14:06:43Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/aadhaar-act-and-its-non-compliance-with-data-protection-law-in-india">
    <title>Aadhaar Act and its Non-compliance with Data Protection Law in India</title>
    <link>https://cis-india.org/internet-governance/blog/aadhaar-act-and-its-non-compliance-with-data-protection-law-in-india</link>
    <description>
        &lt;b&gt;This post compares the provisions of the Aadhaar Act, 2016, with India's data protection regime as articulated in the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Download the file: &lt;a href="https://cis-india.org/internet-governance/blog/aadhaar-act-43a-it-rules" class="internal-link"&gt;PDF&lt;/a&gt;.&lt;/h4&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;Amidst all the hue and cry, the Aadhaar Act 2016, which was introduced with the aim of providing statutory backing to the use of Aadhaar, was passed in the Lok Sabha in its original form on March 16, 2016, after rejecting the recommendations made by Rajya Sabha &lt;a name="_ftnref1"&gt;&lt;/a&gt; . Though the Act has been vehemently opposed on several grounds, one of the concerns that has been voiced is regarding privacy and protection of the 	demographic and biometric information collected for the purpose of issuing the Aadhaar number.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In India, for the purpose of data protection, a body corporate is subject to section 43A of the Information Technology Act, 2000 ("&lt;strong&gt;IT Act&lt;/strong&gt; ") and subsequent Rules, i.e. -The Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 	2011 ("&lt;strong&gt;IT Rules&lt;/strong&gt;"). Section 43A of the IT Act, 2000 &lt;a name="_ftnref2"&gt;&lt;/a&gt; holds a body corporate, which is possessing, dealing or handling any sensitive personal data or information, and is negligent in implementing and maintaining reasonable security practices resulting in wrongful loss or wrongful gain to any person, liable to compensate the affected person and pay damages.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Rule 3 of the IT Rules enlists personal information that would amount to Sensitive personal data or information of a person and includes the biometric information. Even the Aadhaar Act states under section 30 that the biometric information collected shall be deemed as "sensitive personal data or information", which shall have the same meaning as assigned to it in clause (iii) of the Explanation to section 43A of the IT Act; this reflects that biometric data collected in the Aadhaar scheme will receive the same level of protection as is provided to other sensitive personal data under Indian law. This implies that, the agencies contracted by the UIDAI (and not the UIDAI itself) to perform functions like collection, authentication, etc. like the 	Registrars, Enrolling Agencies and Requesting Entities, which meet the criteria of being a 'body corporate' as defined in section 43A, &lt;a name="_ftnref3"&gt;&lt;/a&gt; could be held responsible under this provision, as well as the Rules, to ensure security of the data and information of Aadhaar holder and could potentially be held liable for breach of information that results in loss to an individual if it can be proven that they failed to implement reasonable 	security practices and procedures.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In light of the fact that some actors in the Aadhaar scheme could be held accountable and liable under section 43A and associated Rules, this article compares the regulations regarding data security as found in section 43A and IT Rules 2011 with the provisions of Aadhaar Act 2016, and discusses the 	implications of the differences, if any.&lt;/p&gt;
&lt;h3&gt;1. Compensation and Penalty&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 43A:&lt;/strong&gt; Section 43A of the IT Act, 2000 (Amended in 2008) provides for compensation for failure to protect data. It states that a body corporate, which is 	possessing, dealing or handling any sensitive personal data or information, and is negligent in implementing and maintaining reasonable security practices 	resulting in wrongful loss or wrongful gain to any person, is liable to compensate the affected person and pay damages not exceeding five crore rupees.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Aadhaar&lt;/strong&gt; &lt;strong&gt;Act :&lt;/strong&gt; Chapter VII of the Act provides for offences and penalties, but does not talk about damages to the affected party.&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;Section 37 states that intentional disclosure or dissemination of identity information, to any person not authorised under the Aadhaar Act, or in violation of any agreement entered into under the Act, will be punishable with imprisonment up to three years or a fine up to ten thousand rupees (in case of an individual), and fine up to one lakh rupees (in case of a company). &lt;/li&gt;
&lt;li&gt;Section 38 prescribes penalty with imprisonment up to three years and a fine not less than ten lakh rupees in case any of the acts listed under the provision are performed without authorisation from the UIDAI. &lt;/li&gt;
&lt;li&gt;Section 39 prescribes penalty with imprisonment for a term which may extend to three years and fine which may extend to ten thousand rupees for tampering with data in Central Identities Data Repository. &lt;/li&gt;
&lt;li&gt;Section 40 holds a requesting entity liable for penalty for use of identity information in violation of Section 8 (3) with imprisonment up to three years and/or a fine up to ten thousand rupees (in case of an individual), and fine up to one lakh rupees (in case of a company). &lt;/li&gt;
&lt;li&gt;Section 41 holds a requesting entity or enrolling agency liable for penalty for violation of Section 8 (3) or Section 3 (2) with imprisonment up to one year and/or a fine up to ten thousand rupees (in case of an individual), and fine up to one lakh rupees (in case of a company). &lt;/li&gt;
&lt;li&gt;Section 42 provides general penalty for any offence against the Act or regulations made under it, for which no specific penalty is provided, with imprisonment up to one year and/or a fine up to twenty five thousand rupees (in case of an individual), and fine up to one lakh rupees (in case of a company). &lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;Though the Aadhaar Act prescribes penalty in case of unauthorised access, use or any other act contravening the Regulations, it fails to guarantee protection to the information and does not provide for compensation in case of violation of the provisions.&lt;/p&gt;
&lt;h3&gt;2. Privacy Policy&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;IT Rules:&lt;/strong&gt; Rule 4 requires a body corporate to provide a privacy policy on their website, which is easily accessible, provides for the type and purpose of 	personal, sensitive personal information collected and used, and Reasonable security practices and procedures.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Aadhaar Act:&lt;/strong&gt; Though in practise the contracting agencies (the body corporates under the Aadhaar ecosystem) may maintain a privacy policy on their website, 	the Aadhaar Act does not require a privacy policy for the UIDAI or other actors.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Implications:&lt;/strong&gt; Because contracting agencies will be covered by the IT Rules if they are 'body corporates', the requirement to maintain a privacy policy will be applicable to them.&lt;/p&gt;
&lt;h3&gt;3. Consent&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;IT Rules:&lt;/strong&gt; Rule 5 requires that prior to the collection of sensitive personal data, the body corporate must obtain consent, either in writing or through fax regarding 	the purpose of usage before collection of such information.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Aadhaar Act: &lt;/strong&gt; The Act is silent regarding consent being acquired in case of the enrolling agency or registrars. However, section 8 provides that any requesting entity 	will take consent from the individual before collecting his/her Aadhaar information for authentication purposes, though it does not specify the nature (written/through fax).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Implications:&lt;/strong&gt; If the enrolling agency is a body corporate, they will also be required to take consent prior to collecting and processing biometrics. It is possible that since the Aadhaar Act envisages a scheme which is quasi-compulsory in nature, a consent provision was deliberately left out. This 	circumstance would give the enrolling agencies an argument against taking consent, by saying that the Aadhaar Act is a specific legislation which is also later in point of time than the IT Rules, and a deliberate omission of consent coupled with the compulsory nature of the Aadhaar scheme would mean that they are not required to take consent of the individuals before enrolment.&lt;/p&gt;
&lt;h3&gt;4. Collection Limitation&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;IT Rules: &lt;/strong&gt; Rule 5 (2) requires that a body corporate should only collect sensitive personal data if it is connected to a lawful purpose and is considered necessary for that purpose.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Aadhaar Act:&lt;/strong&gt; Section 3(1) of the Act states that every resident shall be entitled to obtain an aadhaar number by submitting his demographic information and biometric 	information by undergoing the process of enrolment.&lt;/p&gt;
&lt;h3&gt;5. Notice&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;IT Rules: &lt;/strong&gt; Rule 5(3) requires that while collecting information directly from an individual, the body corporate must provide the following information:&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;The fact that information is being collected&lt;/li&gt;
&lt;li&gt;The purpose for which the information is being collected&lt;/li&gt;
&lt;li&gt;The intended recipients of the information&lt;/li&gt;
&lt;li&gt;The name and address of the agency that is collecting the information&lt;/li&gt;
&lt;li&gt;The name and address of the agency that will retain the information&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Aadhaar Act:&lt;/strong&gt; Section 3 of the Act states that at the time of enrolment and collection of information, the enrolling agency shall notify the individual as to how their 	information will be used; what type of entities the information will be shared with; and that they have a right to see their information and also tell them 	how they can see their information. However, the Act is silent regarding notice of name and address of the agency collecting and retaining the information.&lt;/p&gt;
&lt;h3&gt;6. Retention Limitation&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;IT Rules:&lt;/strong&gt; Rule 5(4) requires that body corporate must retain sensitive personal data only for as long as it takes to fulfil the stated purpose or otherwise required 	under law.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Aadhaar Act:&lt;/strong&gt; The Act is silent regarding this and does not mention the duration for which the personal information of an individual shall be retained by the 	bodies/organisations contracted by UIDAI.&lt;/p&gt;
&lt;h3&gt;7. Purpose Limitation&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;IT Rules:&lt;/strong&gt; Rule 5(5) requires that information must be used for the purpose that it was collected for.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Aadhaar Act&lt;a name="move447203643"&gt;&lt;/a&gt;&lt;/strong&gt; Section 57 contravenes this and states that the Act will not prevent use of Aadhaar number for other purposes under law by the State or other bodies. 	Section 8 of the Act states that for the purpose of authentication, a requesting entity is required to take consent before collection of Aadhaar 	information and use it only for authentication with the CIDR. Section 29 of the Act states that the core biometric information collected will not be shared 	with anyone for any reason, and must not be used for any purpose other than generation of Aadhaar numbers and authentication. Also, the Identity information available with a requesting entity will not be used for any purpose other than what is specified to the individual, nor will it be shared 	further without the individual's consent.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="move4472036436"&gt;&lt;/a&gt; Act will not prevent use of Aadhaar number for other purposes under law by the State or other bodies.&lt;/p&gt;
&lt;h3&gt;8. Right to Access and Correct&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;IT Rules :&lt;/strong&gt; Rule 5(6) requires a body corporate to provide individuals with the ability to review the information they have provided and access and correct their 	personal or sensitive personal information.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Aadhaar Act :&lt;/strong&gt; The Act provides under section 3 that at the time of enrolment, the individual needs to be informed about the existence of a right to access information, the procedure for making requests for such access, and details of the person or department in-charge to whom such requests can be made. Section 28 of the Act provides that every aadhaar number holder may access his identity information except core biometric information. Section 32 provides that every Aadhaar number holder may obtain his authentication record. Also, if the demographic or biometric information about any Aadhaar number holder changes, is lost or is found to be incorrect, they may request the UIDAI to make changes to their record in the CIDR.&lt;/p&gt;
&lt;h3&gt;9. Right to 'Opt Out' and Withdraw Consent&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;IT Rules:&lt;/strong&gt; Rule 5(7) requires that the individual must be provided with the option of 'opting out' of providing data or information sought by the body corporate. 	Also, they must have the right to withdraw consent at any point of time.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Aadhaar Act:&lt;/strong&gt; The Aadhaar Act does not provide an opt- out provision and also does not provide an option to withdraw consent at any point of time. Section 7 of the 	Aadhaar Act actually implies that once the Central or State government makes aadhaar authentication mandatory for receiving a benefit then the individual has no other option but to apply for an Aadhaar number. The only concession that is made is that if an Aadhaar number is not assigned to an individual then s/he would be offered some alternative viable means of identification for receiving the benefit.&lt;/p&gt;
&lt;h3&gt;10. Grievance Officer&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;IT Rules:&lt;/strong&gt; Rule 5(9) requires that body corporate must designate a grievance officer for redressal of grievances, details of which must be posted on the body corporate's website and grievances must be addressed within a month of receipt.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Aadhaar Act&lt;/strong&gt;: The Aadhaar Act does not provide for any such mechanism for grievance redressal by the registrars, enrolling agencies or the requesting entities. However, since the contracting agencies will also get covered by the IT Rules if they are 'body corporates', the requirement to designate a 	grievance officer would be applicable to them as well due to the IT Rules.&lt;/p&gt;
&lt;h3&gt;11. Disclosure with Consent, Prohibition on Publishing and Further Disclosure&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;IT Rules:&lt;/strong&gt; Rule 6 requires that body corporate must have consent before disclosing sensitive personal data to any third person or party, except in the case with Government agencies for the purpose of verification of identity, prevention, detection, investigation, on receipt of a written request. Also, the body corporate or any person on its behalf shall not publish the sensitive personal information and the third party receiving the sensitive personal information from body corporate or any person on its behalf shall not disclose it further.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Aadhaar Act:&lt;/strong&gt; Regarding the requesting entities, the Act provides that they shall not disclose the identity information except with the prior consent of the individual 	to whom the information relates. The Act also states that the Authority shall take necessary measures to ensure confidentiality of information against 	disclosures. However, as an exception under section 33, the UIDAI may reveal identity information, authentication records or any information in the CIDR following a court order by a District Judge or higher. The Act also allows disclosure made in the interest of national security following directions by a 	Joint Secretary to the Government of India, or an officer of a higher rank, authorised for this purpose. The Act is silent on the issue of obtaining consent of the individual under these exceptions. Additionally, the Act also states that the Aadhaar number or any core biometric information collected or 	created regarding an individual under the Act shall not be published, displayed or posted publicly, except for the purposes specified by regulations.&lt;/p&gt;
&lt;h3&gt;12. Requirements for Transfer of Sensitive Personal Data&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;IT Rules :&lt;/strong&gt; Rule 7 requires that body corporate may transfer sensitive personal data into another jurisdiction only if the country ensures the same level of protection and may be allowed only if it is necessary for the performance of the lawful contract between the body corporate or any person on its behalf and provider 	of information or where such person has consented to data transfer.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Aadhaar Act :&lt;/strong&gt; The Act is silent regarding transfer of personal data into another jurisdiction by the any of the contracting bodies like the Registrar, Enrolling agencies or the requesting entities. However, if these agencies satisfy the requirement of being "body corporates" as defined under section 43A, then the above 	requirement regarding transfer of data to another jurisdiction under IT Rules would be applicable to them. However, considering the sensitive nature of the data involved, the lack of a prohibition of transferring data to another jurisdiction under the Aadhaar Act appears to be a serious lacuna.&lt;/p&gt;
&lt;h3&gt;13. Security of Information&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;IT Rules:&lt;/strong&gt; Rule 8 requires that the body corporate must secure information in accordance with the ISO 27001 standard or any other best practices notified by Central 	Government. These practices must be audited annually or when the body corporate undertakes a significant up gradation of its process and computer resource.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Aadhaar Act:&lt;/strong&gt; Section 28 of the Act states that the UIDAI must ensure the security and confidentiality of identity information and authentication records. It also states 	that the Authority shall adopt and implement appropriate technical and organisational security measures, and ensure the same are imposed through agreements/arrangements with its agents, consultants, advisors or other persons. However, it does not mention which standards/measures have to be adopted by all the actors in Aadhaar ecosystem for ensuring the security of information, though it can be argued that if the contractors employed by the UIDAI are body corporate then the standards prescribed under the IT Rules would be applicable to them.&lt;/p&gt;
&lt;h3&gt;Implications of the Differences for Body Corporates in Aadhaar Ecosystem&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;An analysis of the Rules in comparison to the data protection measures under the Aadhaar Act shows that the requirements regarding protection of personal or sensitive personal information differ and are not completely in line with each other. &lt;a name="move446519928"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Though the Aadhaar Act takes into account the provisions regarding consent of the individual, notice, restriction on sharing, etc., the Act is silent regarding many core measures like sharing of information across jurisdictions, taking consent before collection of information, adoption of security 	measures for protection of information, etc. which a body corporate in the Aadhaar ecosystem must adopt to be in compliance with section 43A of the IT Act. It is therefore important that the bodies collecting, handling, sharing the personal information and are governed by the Aadhaar Act, must adhere to section 43A and the IT Rules 2011. However, applicability of Aadhaar Act as well as section 43A and IT Rules 2011 would lead to ambiguity regarding interpretation and implementation of the Law. The differences must be duly taken into account and more clarity is required to make all the bodies under 	this Legislation like the enrolling agencies, Registrars and the Requesting Entities accountable under the correct provisions of Law. However, having two separate legislations governing the data protection standards in the Aadhaar scheme seems to have been overlooked. A harmonized and overarching privacy legislation is critical to avoid unclarity in the applicability of data protection standards and would also address many privacy concerns associated to the scheme.&lt;/p&gt;
&lt;h3&gt;Appendix I&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The Rajya Sabha had proposed five amendments to the Aadhaar Act 2016, which are as follows:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;i. Opt-out clause:&lt;/strong&gt; A provision to allow a person to "opt out" of the Aadhaar system, even if already enrolled.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;ii. Voluntary:&lt;/strong&gt; To ensure that if a person chooses not to be part of the Aadhaar system, he/she would be provided "alternate and viable" means of identification for purposes of delivery of government subsidy, benefit or service.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;iii.&lt;/strong&gt; Amendment restricting the use of Aadhaar numbers only for targeting of government benefits or service and not for any other purpose.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;iv.&lt;/strong&gt; Amendment seeking change of the term "national security" to "public emergency or in the interest of public safety" in the provision specifying situations in which disclosure of identity information of an individual to certain law enforcement agencies can be allowed.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;v. Oversight Committee:&lt;/strong&gt; The oversight committee , which would oversee the possible disclosure of information, should include either the Central Vigilance Commissioner or the Comptroller and Auditor-General.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sources:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; &lt;a href="http://indianexpress.com/article/india/india-news-india/rajya-sabha-returns-aadhar-bill-to-lok-sabha-with-oppn-amendments/"&gt; http://indianexpress.com/article/india/india-news-india/rajya-sabha-returns-aadhar-act-to-lok-sabha-with-oppn-amendments/ &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; &lt;a href="http://thewire.in/2016/03/16/three-rajya-sabha-amendments-that-will-shape-the-aadhaar-debate-24993/"&gt; http://thewire.in/2016/03/16/three-rajya-sabha-amendments-that-will-shape-the-aadhaar-debate-24993/&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;Appendix II - Section 43A: Compensation for Failure to Protect Data&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Where a body corporate, possessing, dealing or handling any sensitive personal data or information in a computer resource which it owns, controls or operates, is negligent in implementing and maintaining reasonable security practices and procedures and thereby causes wrongful loss or wrongful gain to any person, such body corporate shall be liable to pay damages by way of compensation to the person so affected.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;For the purposes of this section:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;"body corporate" means any company and includes a firm, sole proprietorship or other association of individuals engaged in commercial or professional activities;&lt;/li&gt;
&lt;li&gt;"reasonable security practices and procedures" means security practices and procedures designed to protect such information from unauthorised access, damage, use, modification, disclosure or impairment, as may be specified in an agreement between the parties or as may be specified in any law for the time being in force and in the absence of such agreement or any law, such reasonable security practices and procedures, as may be prescribed by the Central Government in consultation with such professional bodies or associations as it may deem fit;&lt;/li&gt;
&lt;li&gt;"sensitive personal data or information" means such personal information as may be prescribed by the Central Government in consultation with such professional bodies or associations as it may deem fit.'.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;The term 'body corporate' has been defined under section 43A as "any company and includes a firm, sole proprietorship or other association of individuals &lt;em&gt;engaged in commercial or professional activities&lt;/em&gt;"&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/aadhaar-act-and-its-non-compliance-with-data-protection-law-in-india'&gt;https://cis-india.org/internet-governance/blog/aadhaar-act-and-its-non-compliance-with-data-protection-law-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vanya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital India</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Biometrics</dc:subject>
    

   <dc:date>2016-04-18T11:43:02Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-last-chance-for-a-welfare-state-doesnt-rest-in-the-aadhaar-system">
    <title>The Last Chance for a Welfare State Doesn’t Rest in the Aadhaar System</title>
    <link>https://cis-india.org/internet-governance/blog/the-last-chance-for-a-welfare-state-doesnt-rest-in-the-aadhaar-system</link>
    <description>
        &lt;b&gt;Boosting welfare is the message, which is how Aadhaar is being presented in India. The Aadhaar system as a medium, however, is one that enables tracking, surveillance, and data monetisation. This piece by Sumandro Chattapadhyay was published in The Wire on April 19, 2016.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Originally published in and cross-posted from &lt;a href="http://thewire.in/2016/04/19/the-last-chance-for-a-welfare-state-doesnt-rest-in-the-aadhaar-system-30256/"&gt;The Wire&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Once upon a time, a king desired that his parrot should be taught all the ancient knowledge of the kingdom. The priests started feeding the pages of the great books to the parrot with much enthusiasm. One day, the king asked the priests if the parrot’s education has completed. The priests poked the belly of the parrot but it made no sound. Only the rustle of undigested pages inside the belly could be heard. The priests declared that the parrot is indeed a learned one now.&lt;/p&gt;
&lt;p&gt;The fate of the welfare system in our country is quite similar to this parrot from Tagore’s parable. It has been forcefully fed identification cards and other official documents (often four copies of the same) for years, and always with the same justification of making it more effective and fixing the leaks. These identification regimes are in effect killing off the welfare system. And some may say that that has been the actual plan in any case.&lt;/p&gt;
&lt;p&gt;The Aadhaar number has been recently offered as &lt;a href="http://indianexpress.com/article/opinion/columns/aadhaar-project-uidai-last-chance-for-a-welfare-state/"&gt;the ‘last chance’ for the ailing welfare system&lt;/a&gt; – a last identification regime that it needs to gulp down to survive. This argument wilfully overlooks the acute problems with the Aadhaar project.&lt;/p&gt;
&lt;p&gt;Firstly, the ‘last chance’ for a welfare state in India is not provided by implementing a new and improved identification regime (Aadhaar numbers or otherwise), but by enabling citizens to effectively track, monitor, and ensure delivery of welfare, services, and benefits. This ‘opening up’ of the welfare bureaucracy has been most effectively initiated by the Right to Information Act. Instead of a centralised biometrics-linked identity verification platform, which gives the privilege of tracking and monitoring welfare flows only to a few expert groups, an effective welfare state requires the devolution of such privilege and responsibility.&lt;/p&gt;
&lt;p&gt;We should harness the tracking capabilities of electronic financial systems to disclose how money belonging to the Consolidated Fund of India travel around state agencies and departmental levels. Instead, the Aadhaar system effectively stacks up a range of entry barriers to accessing welfare – from malfunctioning biometric scanners, to connectivity problems, to the burden of keeping one’s fingerprint digitally legible under all labouring and algorithmic circumstances.&lt;/p&gt;
&lt;p&gt;Secondly, authentication of welfare recipients by Aadhaar number neither make the welfare delivery process free of techno-bureaucratic hurdles, nor does it exorcise away corruption. Anumeha Yadav has recently documented the emerging &lt;a href="http://scroll.in/article/805909/in-rajasthan-there-is-unrest-at-the-ration-shop-because-of-error-ridden-aadhaar"&gt;‘unrest at the ration shop’ across Rajasthan&lt;/a&gt;, as authentication processes face technical and connectivity delays, people get ‘locked out’ of public services for not having or having Aadhaar number with incorrect demographic details, and no mechanisms exist to provide rapid and definitive recourse.&lt;/p&gt;
&lt;p&gt;RTI activists at the &lt;a href="http://www.snsindia.org/"&gt;Satark Nagrik Sangathan&lt;/a&gt; have highlighted that the Delhi ration shops, using Aadhaar-based authentication, maintain only two columns of data to describe people who have come to the shop – those who received their ration, and those who did not (without any indication of the reason). This leads to erasure-by-design of evidence of the number of welfare-seekers who are excluded from welfare services when the Aadhaar-based authentication process fails (for valid reasons, or otherwise).&lt;/p&gt;
&lt;p&gt;Reetika Khera has made it very clear that using Aadhaar Payments Bridge to directly transfer cash to a beneficiary’s account, in the best case scenario, &lt;a href="http://www.epw.in/journal/2013/05/commentary/cost-benefit-analysis-uid.html"&gt;may only take care of one form of corruption&lt;/a&gt;: deception (a different person claiming to be the beneficiary). But it does not address the other two common forms of public corruption: collusion (government officials approving undue benefits and creating false beneficiaries) and extortion (forceful rent seeking after the cash has been transferred to the beneficiary’s account). Evidently, going after only deception does not make much sense in an environment where collusion and extortion are commonplace.&lt;/p&gt;
&lt;p&gt;Thirdly, the ‘relevant privacy question’ for Aadhaar is not limited to how UIDAI protects the data collected by it, but expands to usage of Aadhaar numbers across the public and private sectors. The privacy problem created by the Aadhaar numbers does begin but surely not end with internal data management procedures and responsibilities of the UIDAI.&lt;/p&gt;
&lt;p&gt;On one hand, the Aadhaar Bill 2016 has reduced the personal data sharing restrictions of the NIAI Bill 2010, and &lt;a href="http://scroll.in/article/806297/no-longer-a-black-box-why-does-the-revised-aadhar-bill-allow-sharing-of-identity-information"&gt;has allowed for sharing of all data except core biometrics (fingerprints and iris scan)&lt;/a&gt; with all agencies involved in authentication of a person through her/his Aadhaar number. These agencies have been asked to seek consent from the person who is being authenticated, and to inform her/him of the ways in which the provided data (by the person, and by UIDAI) will be used by the agency. In careful wording, the Bill only asks the agencies to inform the person about “alternatives to submission of identity information to the requesting entity” (Section 8.3) but not to provide any such alternatives. This facilitates and legalises a much wider collection of personal demographic data for offering of services by public agencies “or any body corporate or person” (Section 57), which is way beyond the scope of data management practices of UIDAI.&lt;/p&gt;
&lt;p&gt;On the other hand, the Aadhaar number is being seeded to all government databases – from lists of HIV patients, of rural citizens being offered 100 days of work, of students getting scholarships meant for specific social groups, of people with a bank account. Now in some sectors, such as banking, inter-agency sharing of data about clients is strictly regulated. But we increasingly have non-financial agencies playing crucial roles in the financial sector – from mobile wallets to peer-to-peer transaction to innovative credit ratings. Seeding of Aadhaar into all government and private databases would allow for easy and direct joining up of these databases by anyone who has access to them, and not at all by security agencies only.&lt;/p&gt;
&lt;p&gt;When it becomes publicly acceptable that &lt;a href="http://indianexpress.com/article/opinion/columns/aadhaar-project-uidai-last-chance-for-a-welfare-state/"&gt;the &lt;em&gt;money bill route&lt;/em&gt; was a ‘remedial’ instrument to put the Rajya Sabha ‘back on track’&lt;/a&gt;, one cannot not wonder about what was being remedied by avoiding a public debate about the draft bill before it was presented in Lok Sabha. The answer is simple: &lt;em&gt;welfare is the message, surveillance is the medium&lt;/em&gt;.&lt;/p&gt;
&lt;p&gt;Acceptance and adoption of all medium requires a message, a content. The users are interested in the message. The message, however, is not the business. Think of Free Basics. Facebook wants people with none or limited access to internet to enjoy parts of the internet at zero data cost. Facebook does not provide the content that the users consume on such internet. The content is created by the users themselves, and also provided by other companies. Facebook own and control the medium, and makes money out of all content, including interactions, passing through it.&lt;/p&gt;
&lt;p&gt;The UIDAI has set up a biometric data bank and related infrastructure to offer authentication-as-a-service. As the Bill clarifies, almost all agencies (public or private, national or global) can use this service to verify the identity of Indian residents. Unlike Facebook, the content of these services do not flow through the Aadhaar system. Nonetheless, Aadhaar keeps track of all ‘authentication records’, that is records of whose identity was authenticated by whom, when, and where. This database is gold (data) mine for security agencies in India, and elsewhere. Further, as more agencies use authentication based on Aadhaar numbers, it becomes easier for them to combine and compare databases with other agencies doing the same, by linking each line of transaction across databases using Aadhaar numbers.&lt;/p&gt;
&lt;p&gt;Welfare is the message that the Aadhaar system is riding on. The message is only useful for the medium as far as it ensures that the majority of the user population are subscribing to it. Once the users are enrolled, or on-boarded, the medium enables flow of all kinds of messages, and tracking and monetisation (perhaps not so much in the case of UIDAI) of all those flows. It does not matter if the Aadhaar system is being introduced to remedy the broken parliamentary process, or the broken welfare distribution system. What matters is that the UIDAI is establishing the infrastructure for a universal surveillance system in India, and without a formal acknowledgement and legal framework for the same.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-last-chance-for-a-welfare-state-doesnt-rest-in-the-aadhaar-system'&gt;https://cis-india.org/internet-governance/blog/the-last-chance-for-a-welfare-state-doesnt-rest-in-the-aadhaar-system&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Data Systems</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital India</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Biometrics</dc:subject>
    

   <dc:date>2016-04-19T13:18:42Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/understanding-aadhaar-and-its-new-challenges-may-26-27-2016">
    <title>Understanding Aadhaar and its New Challenges, May 26-27, 2016</title>
    <link>https://cis-india.org/internet-governance/events/understanding-aadhaar-and-its-new-challenges-may-26-27-2016</link>
    <description>
        &lt;b&gt;A workshop on “Understanding Aadhaar and its New Challenges” is being organised by the Centre for Studies in Science Policy, Jawaharlal Nehru University, and the Centre for Internet and Society, during May 26-27. It is also supported by the Centre for Communication Governance at NLU Delhi, Free Software Movement of India, Knowledge Commons, PEACE, and Center for Advancement of Public Understanding of Science &amp; Technology. This is a legal and technical workshop to be attended by various key researchers and practitioners to discuss the current status of the implementation of the project, in the context of the passing of the Act and the various ongoing cases.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h1&gt;Workshop Programme&lt;/h1&gt;
&lt;h3&gt;First Day, May 26&lt;/h3&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;9:00-9:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Registration&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;9:30-10:00&lt;/td&gt;
&lt;td&gt;Prof. Dinesh Abrol - &lt;em&gt;Welcome&lt;/em&gt;&lt;br /&gt;Self-introduction and expectations of participants&lt;br /&gt;Dr. Usha Ramanathan - &lt;em&gt;Overview of the Workshop&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10:00-11:00&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Current Status of Aadhaar&lt;/strong&gt;&lt;br /&gt;Dr. Usha Ramanathan, Legal Researcher, New Delhi - &lt;em&gt;What the 2016 Law Says, and How it Came into Being&lt;/em&gt;&lt;br /&gt;S. Prasanna, Advocate, New Delhi - &lt;em&gt;Status and Force of Supreme Court Orders on Aadhaar&lt;/em&gt;&lt;br /&gt;Discussion&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:00-11:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Tea Break&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:30-13:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Direct Benefits Transfers&lt;/strong&gt;&lt;br /&gt;Prof. Reetika Khera, Indian Institute of Technology, Delhi - &lt;em&gt;Welfare Needs Aadhaar like a Fish Needs a Bicycle&lt;/em&gt;&lt;br /&gt;Prof. Ram Kumar, Tata Institute of Social Sciences, Mumbai - &lt;em&gt;Aadhaar and the Social Sector: A critical analysis of the claims of benefits and inclusion&lt;/em&gt;&lt;br /&gt;Ashok Rao, Delhi Science Forum - &lt;em&gt;Cash Transfers Study&lt;/em&gt;&lt;br /&gt;Discussion&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13:30-14:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Lunch&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14:30-16:00&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Aadhaar: Science, Technology, and Security&lt;/strong&gt;&lt;br /&gt;Prof. Subashis Banerjee, Deptt of Computer Science &amp;amp; Engineering, IIT, Delhi - &lt;em&gt;Privacy and Security Issues Related to the Aadhaar Act&lt;/em&gt;&lt;br /&gt;Pukhraj Singh, former National Cyber Security Manager, Aadhaar, New Delhi - &lt;em&gt;Aadhaar: Security and Surveillance Dimensions&lt;/em&gt;&lt;br /&gt;Discussion&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;16:00-16:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Tea Break&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;16:30-17:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Aadhaar - International Dimensions&lt;/strong&gt;&lt;br /&gt;Prof. Chinmayi Arun, Center for Communication Governance, National Law University, Delhi - &lt;em&gt;Biometrics and Mandatory IDs in other parts of the world&lt;/em&gt;&lt;br /&gt;Dr. Gopal Krishna, Citizens Forum for Civil Liberties - &lt;em&gt;International Dimensions of Aadhaar
&lt;/em&gt;&lt;br /&gt;Discussion&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;17:30-18:00&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;High Tea&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;18:00-19:00&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Video Presentations&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;tbody&gt;&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Second Day, May 27&lt;/h3&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;9:30-11:00&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Privacy, Surveillance, and Ethical Dimensions of Aadhaar&lt;/strong&gt;&lt;br /&gt;Prabir Purkayastha, Free Software Movement of India, New Delhi - &lt;em&gt;Surveillance Capitalism and the Commodification of Personal Data&lt;/em&gt;&lt;br /&gt;Arjun Jayakumar, SFLC - &lt;em&gt;Surveillance Projects Amalgamated&lt;/em&gt;&lt;br /&gt;Col Mathew Thomas, Bengaluru
 - &lt;em&gt;The Deceit of Aadhaar&lt;/em&gt;&lt;br /&gt;Discussion&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:00-11:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Tea Break&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:30-10:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Aadhaar: Broad Issues - I&lt;/strong&gt;&lt;br /&gt;Prof. G Nagarjuna, Homi Bhabha Center for Science Education, Tata Institute of Fundamental Research, Mumbai - &lt;em&gt;How to prevent linked data in the context of Aadhaar&lt;/em&gt;&lt;br /&gt;Dr. Anupam Saraph, Pune - &lt;em&gt;Aadhaar and Moneylaundering&lt;/em&gt;&lt;br /&gt;Discussion&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13:00-13:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Video Presentations&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13:30-14:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Lunch&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14:30-15:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Aadhaar: Broad Issues - II&lt;/strong&gt;&lt;br /&gt;Prof. MS Sriram, Visiting Faculty, Indian Institute of Management, Bangalore - &lt;em&gt;Financial lnclusion&lt;/em&gt;&lt;br /&gt;Nikhil Dey, MKSS, Rajasthan (TBC) - &lt;em&gt;Field witness: Technology on the Ground&lt;/em&gt;&lt;br /&gt;Prof. Himanshu, Centre for Economic Studies &amp;amp; Planning, JNU - &lt;em&gt;UID Process and Financial Inclusion&lt;/em&gt;&lt;br /&gt;Discussion&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15:30-16:00&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Conclusion&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;tbody&gt;&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/understanding-aadhaar-and-its-new-challenges-may-26-27-2016'&gt;https://cis-india.org/internet-governance/events/understanding-aadhaar-and-its-new-challenges-may-26-27-2016&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Biometrics</dc:subject>
    

   <dc:date>2016-05-26T10:29:43Z</dc:date>
   <dc:type>Event</dc:type>
   </item>




</rdf:RDF>
