<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 11 to 25.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-news-minute-rakesh-mehar-may-4-2017-why-aadhaar-leaks-should-worry-you-and-is-biometrics-really-safe"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/youth-ki-awaaz-roopa-sudarshan-what-you-need-to-worry-about-before-linking-your-mobile-number-with-aadhaar"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/one-india-may-2-2017-anusha-ravi-what-privacy-13-crore-aadhaar-numbers-accessible-on-governmental-portals"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/business-standard-may-13-2017-alnoor-peermohamed-and-raghu-krishnan-aadhaar-has-become-a-whipping-boy-nandan-nilekani"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/vulnerabilities-in-the-uidai-implementation-not-addressed-by-the-aadhaar-bill-2016"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/hindu-yuthika-bhargava-january-11-2018-virtual-aadhaar-id-too-little-too-late"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/vidhi-doshi-fingerprint-payments-prompt-privacy-fears-in-india-the-guardian"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/understanding-aadhaar-and-its-new-challenges-may-26-27-2016"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/uidais-virtual-id-limited-kyc-does-little-to-protect-aadhaar-data-already-collected-say-critics"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/business-standard-mayank-jain-march-27-2018-uidai-servers-or-third-parties-aadhaar-leaks-are-dangerous-experts"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/newslaundry-shruti-menon-may-2-2017-uidai-remains-silent-on-aadhaar-leaks-of-users-through-govt-portals"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/financial-express-may-19-2017-pti-uidai-puts-posers-to-cis-over-aadhaar-data-leak-claim"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/economic-times-january-11-2018-uidai-introduces-new-two-layer-security-system-to-improve-aadhaar-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/medianama-nikhil-pahwa-may-19-2017-uidai-cis-india-aadhaar"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/livemint-komal-gupta-january-7-2018-uidai-denies-any-breach-of-aadhaar-database"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-news-minute-rakesh-mehar-may-4-2017-why-aadhaar-leaks-should-worry-you-and-is-biometrics-really-safe">
    <title>Why Aadhaar leaks should worry you, and is biometrics really safe?</title>
    <link>https://cis-india.org/internet-governance/news/the-news-minute-rakesh-mehar-may-4-2017-why-aadhaar-leaks-should-worry-you-and-is-biometrics-really-safe</link>
    <description>
        &lt;b&gt;What’s worrying is that the UIDAI seems to always be in denial mode over security concerns. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post was &lt;a class="external-link" href="http://www.thenewsminute.com/article/why-aadhaar-leaks-should-worry-you-and-biometrics-really-safe-61469"&gt;published by the News Minute&lt;/a&gt; on May 4, 2017. Amber Sinha was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;If you’ve paid the slightest bit of attention to news about Aadhaar,  you’ll have heard about a series of leaks of Aadhaar data from multiple  government websites. Some of the latest government websites to leak  Aadhaar and demographic data, were the Jharkhand &lt;a href="http://www.hindustantimes.com/india-news/in-massive-data-breach-over-a-million-aadhaar-numbers-published-on-jharkhand-govt-website/story-EeFlScg5Dn5neLyBzrkw1I.html" target="_blank"&gt;Directorate&lt;/a&gt; of Social Security and the Kerala government’s pension &lt;a href="http://www.livemint.com/Politics/bM6xWCw8rt6Si4seV43C2H/Govt-departments-breach-Aadhaar-Act-leak-details-of-benefic.html" target="_blank"&gt;department&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Shockingly, a &lt;a href="http://cis-india.org/internet-governance/information-security-practices-of-aadhaar-or-lack-thereof-a-documentation-of-public-availability-of-aadhaar-numbers-with-sensitive-personal-financial-information-1" target="_blank"&gt;report&lt;/a&gt; by  The Centre for Internet and Society (CIS) revealed that the Aadhaar  details along with demographic details and financial information of  around 135 million people in the country has been leaked by four  government portals. And this could just be the tip of the iceberg.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, the public response to these revelations has been muted. The  government and the UIDAI, the authority behind Aadhaar, have retreated  behind the defence that only Aadhaar numbers have been leaked, and not  biometric details, and hence there is no major problem.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, experts warn that Aadhaar numbers by themselves pose a  sufficient risk when leaked, and that the UIDAI has been consistently  underplaying the risks of such leaks and overplaying the security of  biometric identification.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Amber Sinha, who co-authored the CIS report, points out that it’s not  just Aadhaar numbers that have been leaked on government websites, but  also demographic information as well as financial details. Various such  bits of data can be aggregated by fraudsters and used to steal  identities and commit financial fraud online or through phones.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We see a lot of examples of social engineering techniques where  fraudsters collect data from various sources and impersonate people,” he  says. The report points out that one of the most common techniques is  to call persons impersonating bank officials requiring sensitive  information, and provide Aadhaar and demographic details to make the bid  for this information convincing.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Amber also points out that in online and phone verifications, it is  possible to impersonate other persons with such information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Somebody can call the bank pretending to be me, and he could also  authenticate himself as me if he has all the data about me. The bank  will ask him some four questions and if he has all that information,  then the bank has no reason to believe that he is not me,” he explains.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Co-Founder of HasGeek, Kiran Jonnalagadda, an active voice on net  neutrality, freedom of speech and privacy, points out that one of the  main problems is that the Aadhaar system assumes biometric verification  in every transaction, but Aadhaar cards are often used as identity  documents without biometrics particularly for many non-financial  transactions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Somebody can apply for a SIM card with your Aadhaar number, and if  the place that is issuing the SIM card didn't do a biometric  verification then your card is good enough, because now they can do  anything they want in your name,” Kiran said. In such cases, he points  out, impersonation is almost ridiculously easy because the Aadhaar card,  just a colour printout with no security features, can be faked by  almost anyone.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He points out that, particularly in cases of online verifications,  the problem of fraud is acutely heightened. “The thing is that if they  have your number and your demographic details, if the government does a  verification online, the details will match. Which means that the ID is  not fake. It's just that you didn't actually authorise any of this. In a  perfect world, everybody would do biometrics. The problem is that that  does not exist right now.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of the major flaws of the current security practices of Aadhaar  is that the UIDAI only takes responsibility for the security of data  stored within its Central Identities Data Repository. However, explains  Amber, over the last five years, the UIDAI has proactively seeded  Aadhaar data across multiple government databases. However, the UIDAI  has not exercised strict disclosure controls on these government  databases, and there are no clear standards for publicity of  information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The CIS report points to the example of the Andhra Pradesh portal of  the NREGA, which carries information on Aadhaar numbers and disbursal  amounts on a simple text file, with no encryption or other security  measures. The report argues that this system could easily be exploited  to transfer illegal sums of money into these accounts, making  beneficiaries liable for them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Importantly, Amber points out that the recent publications of Aadhaar  details cannot properly be called leaks. A leakage occurs, he points  out, when information is treated as secret and stored accordingly and  then breached from the outside or leaked by abusing access.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Here the websites that we looked at are designed in such a way that  anybody without any technical knowledge can access information. They are  available for download as spreadsheets, how much simpler could it get?”  he asks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even with the much-vaunted infallibility of biometric verification,  experts warn, there are some scarily large loopholes present. While the  UIDAI regularly goes to town with the claim that the biometric data  stored in the CIDR is well protected behind multiple firewalls,  detractors point out that biometric data collected at each transaction  point is not similarly secure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Other kinds of financial transactions such as card transactions ,  explains Amber, use two-factor authentication (a physical card and a pin  number or card details and an OTP, for instance). With Aadhaar,  however, authentication is possible with just biometrics.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is risky because biometric data is not duplication-proof. When  biometric data is collected for authentication, he says, there are ways  in which this data can be stored for re-use. “At the end of the day, the  way the biometric authentication works is by comparing two images.  There is a copy of an image which is collected at the time of enrolment  which is stored by the UIDAI, and every time you authenticate yourself  you give a fresh image. As far as the CIDR is concerned, it has nothing  to do with how that image is being created at that stage,” says Amber.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This can and has led to what is called a “replay attack”, where  stored biometric images are used to complete transactions without the  presence of the actual owner of the biometric data. This is what &lt;a href="https://scroll.in/article/830580/security-of-aadhaars-data-is-under-question-but-pointing-to-the-gaps-could-lead-to-a-police-case" target="_blank"&gt;happened&lt;/a&gt; in the case involving Axis Bank, Suvidha Infoserve and eMudhra in February.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Such situations arise, says Kiran, because Aadhaar confuses two very  separate functions–authentication (establishing that I am who I am) and  authorisation (certifying that I want an action done in my name). “It’s  the difference between signing a cheque and showing a photo ID to prove  that you are who you are,” explains Kiran. The problem with biometrics  is that both processes are combined in one, and there is nothing to  verify that the person to whom the biometrics belongs to is actually  present for each transaction.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the UIDAI has now proposed &lt;a href="http://zeenews.india.com/personal-finance/uidai-registration-for-all-aadhaar-authentication-devices-soon_1969917.html" target="_blank"&gt;registered&lt;/a&gt; and encrypted biometric devices to overcome this problem, some detractors &lt;a href="http://www.thenewsminute.com/article/response-nandan-nilekani-s-new-claims-aadhaar-60945" target="_blank"&gt;argue&lt;/a&gt; that a way around this is not impossible to find either.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The larger problem is that the UIDAI constantly plays a game of  denial and catch up. They keep pretending like other people are stupid  and their system will never be broken. And other people keep pointing  out that they've forgotten the most obvious things about security in any  information system. They are currently in denial mode, where they  insist such things are not possible until after it happens, and then  they say oh it's happening, let's go do something to fix it,” Kiran  says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What’s more, Kiran and Amber point out that biometrics can even be  physically duplicated. On iris scans, Amber argues, “Now, with a lot of  CCTV cameras, if their resolution is high enough it is possible to  capture things like an iris scan. So the means for biometric  authentication can be used covertly, and that is a technological truth,”  he asserts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Duplicating fingerprints, says Kiran is even easier, pointing out to  attendance fraud carried out by students of the Institute of Chemical  Technology in Mumbai. These students used a resin adhesive to make  copies of their fingerprints, which their friends used to give them  proxy attendance in the biometric attendance system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Lifting fingerprints is ridiculously easy. Anything you touch will  leave fingerprints on it. All it requires is some cello-tape to make a  copy of your fingerprints. And then you can apply some wax to it and you  get an actual impression of your finger. You can go place that on any  fingerprint reader and it'll be fooled,” says Kiran.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It’s not as if such duplication is not possible with devices like  credit cards. However, says Kiran, there are two key differences.  Firstly, credit card companies have built up elaborate checks and  balances over years to tackle fraud. Secondly, and far more importantly,  credit cards that have been compromised can be cancelled. “Revocability  is a feature in the credit card system. In Aadhaar you can't revoke  anything. If fraud happens, you are stuck with fraud for the rest of  your life,” explains Kiran.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-news-minute-rakesh-mehar-may-4-2017-why-aadhaar-leaks-should-worry-you-and-is-biometrics-really-safe'&gt;https://cis-india.org/internet-governance/news/the-news-minute-rakesh-mehar-may-4-2017-why-aadhaar-leaks-should-worry-you-and-is-biometrics-really-safe&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-05-12T15:48:48Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/youth-ki-awaaz-roopa-sudarshan-what-you-need-to-worry-about-before-linking-your-mobile-number-with-aadhaar">
    <title>What You Need To Worry About Before Linking Your Mobile Number With Aadhaar</title>
    <link>https://cis-india.org/internet-governance/news/youth-ki-awaaz-roopa-sudarshan-what-you-need-to-worry-about-before-linking-your-mobile-number-with-aadhaar</link>
    <description>
        &lt;b&gt;As part of the directive issued by the Department of Telecommunications (DoT) dated March 23, 2017, major telecom service providers have issued a deadline of February 6, 2018, for linking mobile numbers with Aadhaar as part of the E-KYC verification.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post by Roopa Raju and Shekhar Rai was published in &lt;a class="external-link" href="https://www.youthkiawaaz.com/2017/11/linking-aadhar-with-mobile-number-pros-and-cons/"&gt;Youth Ki Awaaz&lt;/a&gt; on November 8, 2017&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The landmark case referenced by the DoT in the circular was the order  issued by the Supreme Court on February 6, 2017, delivered by Justice  JS Khehar (the erstwhile Chief Justice of India) in the case of &lt;a href="https://thewire.in/109330/aadhaar-phone-legal-battle/" rel="noopener" target="_blank"&gt;Lokniti Foundation vs Union of India&lt;/a&gt;.  The petitioner &lt;a href="http://supremecourtofindia.nic.in/jonew/courtnic/rop/2016/23429/rop_885627.pdf" rel="noopener" target="_blank"&gt;contended&lt;/a&gt; that terrorists, criminals and anti-social elements frequently used SIM  cards to commit atrocious, organised and unorganised crimes across the  country. The petition called for &lt;a href="http://supremecourtofindia.nic.in/jonew/courtnic/rop/2016/23429/rop_885627.pdf" rel="noopener" target="_blank"&gt;ensuring 100% verification&lt;/a&gt; on the identity of telecom service subscribers in public interest under &lt;a href="https://indiankanoon.org/doc/981147/" rel="noopener" target="_blank"&gt;Article 32&lt;/a&gt; of the Constitution of India. The PIL added that unverified SIM cards  pose a serious threat to the country’s security as they are routinely  used  in criminal and terrorist activities, thereby affecting a  citizen’s right (as ensured under &lt;a href="https://indiankanoon.org/doc/1199182/" rel="noopener" target="_blank"&gt;Article 21&lt;/a&gt; of the Constitution). As per the CAG report tabled at the Parliament in 2014, the identities of &lt;a href="https://timesofindia.indiatimes.com/india/Identities-of-4-59-crore-mobile-users-still-unverified-CAG/articleshow/39572824.cms" rel="noopener" target="_blank"&gt;4.59 crore mobile users&lt;/a&gt; still remained unverified.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Article 21 of the Constitution of India, 1949, &lt;a href="https://indiankanoon.org/doc/1199182/" rel="noopener" target="_blank"&gt;states&lt;/a&gt; that – &lt;i&gt;“No person shall be deprived of his life or personal liberty except according to procedure established by law.”&lt;/i&gt; While there is a threat to the common public interest through increased  acts of terrorism and atrocities due to unverified SIM cards, the  safety of information provided and linked to Aadhaar are increasingly  being questioned.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a study dated May 1, 2017, published by the Centre for Internet  and Society (CIS), a Bangalore-based organisation, it was observed that  data of &lt;a href="http://indiatoday.intoday.in/technology/story/aadhaar-data-of-130-millions-bank-account-details-leaked-from-govt-websites-report/1/943632.html" rel="noopener" target="_blank"&gt;over 130 million&lt;/a&gt; Aadhaar card-holders were leaked from just four government portals  dealing with the National Social Assistance programme, the National  Rural Employment Guarantee Scheme, the Chandranna Bima Scheme and the  Daily Online Payment Reports of NREGA.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On October 25, 2017, the chief minister of West Bengal, Mamata Banerjee, also &lt;a href="https://thewire.in/190932/west-bengal-mamata-banerjee-bjp-aadhaar/" rel="noopener" target="_blank"&gt;strongly opposed&lt;/a&gt; the government’s plan to link mobile numbers with Aadhaar cards. She  said that it was a breach of privacy and that the ruling government was  intruding upon the citizen’s right to personal freedom. However, the  Supreme Court &lt;a href="https://www.ndtv.com/india-news/aadhaar-petitions-in-supreme-court-today-including-bengals-10-points-1768703" rel="noopener" target="_blank"&gt;questioned&lt;/a&gt; the state government’s right to challenge the Centre and asked her to file a plea with the court in her individual capacity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As per the data published by Telecom Regulatory Authority of India  (TRAI) on September 14, 2017, India’s telecom subscriber base &lt;a href="http://indianexpress.com/article/technology/tech-news-technology/telecom-subscriber-base-dips-marginally-to-121-crore/" rel="noopener" target="_blank"&gt;dipped by 1.3 lakh&lt;/a&gt; to 121.07 crore in July 2017. Moreover, only three operators – Reliance  Jio, Bharti Airtel and the state-run BSNL – reported additions to their  subscriber base.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;Month&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Telephone subscriber base&lt;br /&gt; (in million)&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Growth rate&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;Mar-17&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;1194.58&lt;/td&gt;
&lt;td&gt;–&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;Apr-17&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;1198.89&lt;/td&gt;
&lt;td&gt;0.36%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;May-17&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;1204.98&lt;/td&gt;
&lt;td&gt;0.51%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;Jun-17&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;1210.84&lt;/td&gt;
&lt;td&gt;0.49%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;Jul-17&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;1210.71&lt;/td&gt;
&lt;td&gt;-0.01%&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(Source: &lt;a href="http://www.trai.gov.in/release-publication/reports/telecom-subscriptions-reports" rel="noopener" target="_blank"&gt;TRAI monthly subscription data&lt;/a&gt;)&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The dip in the subscriber count for various telecom operators can be  accredited to the phasing of registration of SIM cards through E-KYC for  new mobile numbers. While there is a the possibility of addition of  genuine subscribers in the following months, the direct subscriber  acquisition cost (DSAC) has been significantly reduced owing to the  overall reduction in subscriber addition (assuming exclusion of sunk  cost).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prior to the DoT directive, telecom service providers relied heavily  on the documents provided by the subscribers for SIM registration. The  two-fold impact of this was the delay in SIM activation, owing to the  transfer of documents from the retailer to the distributor to the  company and the possibility of documents not matching with the usage  timeline of usage. Additionally, tracking the ever-changing retailers  was difficult for the service providers – and with the subscriber  documents being collected and stored at one location by the service  providers, verification of dummy subscribers was difficult.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With the introduction of Aadhaar linkage for mobile numbers,  subscribers are held accountable for its usage, thereby tagging  responsibility for any acts arising as a result. Savings from the  digitisation of documents and paper should also be considered.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, an increased number of job losses is possible, owing to the  ‘optimisation’ of the process by way of document verification, servicing  costs and reliance on third parties (to name just a few). Increased  compliance costs are also an issue of concern.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The key question that looms prominently with the approaching deadline  is how secure public data will be, given that it may possibly be linked  with bank account numbers and income tax returns. With retailers using  fingerprints of the subscribers to validate Aadhaar numbers with the  mobile numbers at the time of SIM registration, there is an increased  risk of exposure to identity theft.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the government is increasingly trying to bring in a seamless  process to assimilate data for transparency in analysing consumer  patterns, it is suggested that they also allocate funds for enhancing  the cyber-security of the data consolidated from this directive.  Furthermore, cyber security regulations can be strengthened to avoid  data leakages to third party organisations. Severe penalties should also  be implemented to ensure robust compliance to these measures.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/youth-ki-awaaz-roopa-sudarshan-what-you-need-to-worry-about-before-linking-your-mobile-number-with-aadhaar'&gt;https://cis-india.org/internet-governance/news/youth-ki-awaaz-roopa-sudarshan-what-you-need-to-worry-about-before-linking-your-mobile-number-with-aadhaar&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-11-26T05:55:49Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/one-india-may-2-2017-anusha-ravi-what-privacy-13-crore-aadhaar-numbers-accessible-on-governmental-portals">
    <title>What privacy? 13 crore Aadhaar numbers accessible on government portals</title>
    <link>https://cis-india.org/internet-governance/news/one-india-may-2-2017-anusha-ravi-what-privacy-13-crore-aadhaar-numbers-accessible-on-governmental-portals</link>
    <description>
        &lt;b&gt;At least 13 crore Aadhaar numbers and 10 crore bank account numbers are readily accessible on government portals, a report claims.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post by Anusha Ravi was &lt;a href="http://www.oneindia.com/india/what-privacy-13-crore-aadhaar-numbers-accessible-on-government-portals-2422904.html"&gt;published         in Oneindia&lt;/a&gt; on May 2, 2017.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The centre for internet and society, in       its report, has claimed that Aadhaar numbers with sensitive       personal financial information were publicly available on four       government portals built to oversee &lt;a href="http://www.oneindia.com/topic/welfare" title="Topic: welfare schemes"&gt;welfare schemes&lt;/a&gt;. The       report said that the government portals made it easy to access       sensitive details, despite it being &lt;a href="http://www.oneindia.com/topic/illegal" title="Topic: illegal"&gt;illegal&lt;/a&gt;.     "It is extremely irresponsible on the part of       the UIDAI [Unique Identification Authority of India], the sole       governing body for this massive project, to turn a blind eye to       the lack of standards prescribed for how other bodies shall deal       with such data, such cases of massive public disclosures of this       data, and the myriad ways in which it may be used for mischief,"       said Amber Sinha and Srinivas Kodali, the authors of the report.&lt;br /&gt; &lt;br /&gt; Apart from accessing a person's details, the portals made it         possible for anyone to get data on beneficiaries of welfare         schemes. In many cases, it included bank account numbers of         beneficiaries. The report suggests that close to 23 crore         Aadhaar number could have been leaked if most of the government         portals connected to direct benefit transfers used the 'same         negligent standards for storing data as the ones examined'.         "The document shows that the breaches are an indicator of         potentially irreversible privacy harm and the data could be used         for financial fraud," the authors said in the report. The report         was documented after authors studied the National Social         Assistance Programme, National Rural Employment Guarantee         Scheme, Andhra Pradesh government's Chandranna Bima Scheme and         Andhra Pradesh's Daily Online Payment Reports of NREGA.         &lt;br /&gt; &lt;br /&gt; The report said that sensitive personal identity information         such as Aadhaar number, caste, religion, address, photographs         and financial information were easily available with a few         clicks and suggested how poorly conceived these initiatives         were. The report highlights that it was illegal to make personal         data public and also refers to # #AadhaarLeaks, a campaign on         twitter aimed at exposing the loopholes in the Aadhaar system.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/one-india-may-2-2017-anusha-ravi-what-privacy-13-crore-aadhaar-numbers-accessible-on-governmental-portals'&gt;https://cis-india.org/internet-governance/news/one-india-may-2-2017-anusha-ravi-what-privacy-13-crore-aadhaar-numbers-accessible-on-governmental-portals&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-05-03T14:39:46Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/business-standard-may-13-2017-alnoor-peermohamed-and-raghu-krishnan-aadhaar-has-become-a-whipping-boy-nandan-nilekani">
    <title>Watch: Aadhaar has become a whipping boy: Nandan Nilekani </title>
    <link>https://cis-india.org/internet-governance/news/business-standard-may-13-2017-alnoor-peermohamed-and-raghu-krishnan-aadhaar-has-become-a-whipping-boy-nandan-nilekani</link>
    <description>
        &lt;b&gt;India certainly needs a modern data privacy and protection law, Nilekani said in an interview.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The Alnoor Peermohamed and Raghu Krishnan was &lt;a class="external-link" href="http://www.business-standard.com/article/economy-policy/aadhaar-has-become-a-whipping-boy-nandan-nilekani-117051201521_1.html"&gt;published in the Business Standard&lt;/a&gt; on May 13, 2017.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;As debate rages over &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Aadhaar" target="_blank"&gt;Aadhaar &lt;/a&gt;being a &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Privacy" target="_blank"&gt;privacy &lt;/a&gt;and surveillance liability, its architect &lt;b&gt;Nandan Nilekani &lt;/b&gt;says the unique identity programme has become a “whipping ward”.  In an interview with &lt;i&gt;Alnoor Peermohamed &lt;/i&gt;and &lt;i&gt;Raghu Krishnan&lt;/i&gt;, he says we need a data protection and &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Privacy" target="_blank"&gt;privacy &lt;/a&gt;law with adequate judicial and parliamentary oversight. Edited excerpts:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;There is concern we are losing our &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Privacy" target="_blank"&gt;privacy &lt;/a&gt;because of &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Aadhaar" target="_blank"&gt;Aadhaar.&lt;/a&gt;..&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Privacy" target="_blank"&gt;Privacy &lt;/a&gt;is  an issue the whole world is facing, thanks to digitisation. The day you  went from a feature phone to a smartphone the amount of digital  footprint you left behind went up dramatically. The phone records your  messages, it knows what you are saying, it has a GPS so it can tell  anybody where you are, the towers can tell anybody where you are because  they are constantly pinging the phone. There are accelerometers and  gyroscopes in the phone that detect movement.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Internet companies essentially make money from data. They use data to  sell you things or advertisements. And that data is not even in India,  it is in some country in some unaccountable server and accessible to the  government of that foreign country, not ours.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Then increasingly there is the Internet of Things. Your car has so many  sensors, wearables have sensors and all of them are recording data and  beaming it to somebody else. Then there are CCTV cameras everywhere, and  today they are all IP-enabled.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Privacy" target="_blank"&gt;privacy &lt;/a&gt;is a global issue, caused by digitisation. &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Aadhaar" target="_blank"&gt;Aadhaar &lt;/a&gt;is one small part of that. The system is designed not to collect information, because the first risk to &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Privacy" target="_blank"&gt;privacy &lt;/a&gt;is if someone is collecting information. &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Aadhaar" target="_blank"&gt;Aadhaar &lt;/a&gt;is  a passive ID system, it just sits there and when you go somewhere and  invoke it, it authenticates your identity. By design itself, it is built  for &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Privacy" target="_blank"&gt;privacy.&lt;/a&gt; I believe India needs a modern data &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Privacy" target="_blank"&gt;privacy &lt;/a&gt;and &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Protection+Law" target="_blank"&gt;protection law.&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Why is &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Aadhaar" target="_blank"&gt;Aadhaar &lt;/a&gt;being used as a proxy for the &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Privacy" target="_blank"&gt;privacy &lt;/a&gt;and data protection issues?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is a motivated campaign by people who are trying to find different ways to say something about it. &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Privacy" target="_blank"&gt;Privacy &lt;/a&gt;is a much bigger issue. I have been talking about &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Privacy" target="_blank"&gt;privacy &lt;/a&gt;much  before anyone else. In 2010, when it was not such a big issue, I had  written to Prime Minister Manmohan Singh saying we needed a data &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Protection+Law" target="_blank"&gt;protection law.&lt;/a&gt; You could see what was happening, the iPhone came out on June 30, 2007,  Android phones came around the time we started Aadhaar, so we could see  the trend. I asked Rahul Matthan, a top intellectual property and data  lawyer, to help and we worked with the government to come out with a  draft law. And then there was the AP Shah Committee. The UIDAI’s DDG  Ashok Pal Singh was a part of that committee, so we helped shape that  policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When a banking application uses Aadhaar, the system does not know what  the bank does. It is deliberately designed so that data is kept away  from the core system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I am all for a data &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Protection+Law" target="_blank"&gt;protection law &lt;/a&gt;but we should look at it in context, look at the big picture. If people want to work together to create a data &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Privacy" target="_blank"&gt;privacy &lt;/a&gt;law then it is a great thing. But if they want to use it to just attack Aadhaar, then there is some other interest at work.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Now that the government is linking &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Aadhaar" target="_blank"&gt;Aadhaar &lt;/a&gt;to PAN and driver’s licences, will that not lead to &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Aadhaar" target="_blank"&gt;Aadhaar &lt;/a&gt;being used as a surveillance tool?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Surveillance is conducted through a 24x7 system that knows what you are  doing, so from a technology perspective the best surveillance device is  your phone. The phone is the device you should worry about.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Aadhaar" target="_blank"&gt;Aadhaar &lt;/a&gt;is  not a 24x7 product. I buy one SIM card a year and do an e-KYC, the  driver’s licence sits in my pocket and only sometimes someone asks for  it. With the PAN card I file my returns only once a year.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;But with all that data being linked, can the government not use it?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is a valid concern and has to be addressed through a legal and oversight process. &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Aadhaar" target="_blank"&gt;Aadhaar &lt;/a&gt;is just one technology. You do not attack the technology, you look at the overall picture.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The US has the Foreign Intelligence Surveillance Act under which  special courts issue warrants to the FBI for surveillance. This is  absolutely required and it should be a part of the data &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Protection+Law" target="_blank"&gt;protection law &lt;/a&gt;(in India) which says under what circumstances the government can authorise surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Today mobile phones are being tapped by so many agencies. In the US,  the FBI is under the oversight of the Senate. In India, Parliament does  not have oversight of any intelligence agency. I remember (former Union  minister) Manish Tewari had introduced a Bill six or seven years ago  saying Intelligence agencies needed to be under the oversight of the  Parliament, but nothing happened.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Is there any way to stop &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Aadhaar" target="_blank"&gt;Aadhaar &lt;/a&gt;being used as a surveillance tool?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Today a person can be identified with or without &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Aadhaar" target="_blank"&gt;Aadhaar.&lt;/a&gt; US systems can identify a person in a few milliseconds using big data. All that is part of what we have to protect. &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Aadhaar" target="_blank"&gt;Aadhaar &lt;/a&gt;by  itself is not going to add anything to that. What is important is that  the infrastructure of surveillance comes under judicial oversight as  well as parliamentary oversight.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Would the &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Aadhaar" target="_blank"&gt;Aadhaar &lt;/a&gt;narrative have been different if this were a Congress-led government?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I think most people making this noise are against the government, so it is a political argument and &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Aadhaar" target="_blank"&gt;Aadhaar &lt;/a&gt;has  become a convenient whipping ward. Lots of different agendas are at  work here. But my understanding is this - whether it is data protection  and privacy, surveillance or security, these are all broad issues that  apply to technology in general and if you are serious about solving the  issues you should fix it at the highest level and have a data protection  and &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Privacy" target="_blank"&gt;privacy &lt;/a&gt;law which includes, mobile phones, CCTV cameras and &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Aadhaar" target="_blank"&gt;Aadhaar.&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A report by the Centre for Internet and Society says 130 million &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Aadhaar" target="_blank"&gt;Aadhaar &lt;/a&gt;identities have been leaked...&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is because of the transparency movement in the last 10 years. In  2006, we passed the RTI Act and MNREGA Act. Section 4 of the RTI Act  says that data about benefits should be made public. At that time it was  all about transparency. Since then, governments have been publishing  lists of MNREGA beneficiaries and how much money is being put into their  bank accounts. At that time it was applauded. Now the same thing is  coming back as &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Privacy" target="_blank"&gt;privacy &lt;/a&gt;being affected.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These are not leaks; governments have been consciously putting out the  data in the interest of transparency. The message from this is we have  to strike a balance between transparency and &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Privacy" target="_blank"&gt;privacy.&lt;/a&gt; And that is a difficult balance because Section 4 of the RTI Act says  if a benefit is provided by the government it is public information, so  the names of beneficiaries should be published because it is taxpayers’  money.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is something called personally identifiable information. You  should strike a balance between transparency and not revealing  personally identifiable information. That is a delicate balance, and  people will have to figure this out. The risk you have now is  governments will stop publishing data - look, you guys have made a big  fuss about privacy, we will not publish. In fact, the transparency guys  are now worried that all the gains are being lost.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;If &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Aadhaar" target="_blank"&gt;Aadhaar &lt;/a&gt;is voluntary, why is the government forcing it on to various schemes?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are two things, benefits and entitlements and government-issued documents. There the government has passed a law, the &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Aadhaar" target="_blank"&gt;Aadhaar &lt;/a&gt;Bill of 2016, which is signed by the President. In that, there is a clear protocol that the government can use &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Aadhaar" target="_blank"&gt;Aadhaar &lt;/a&gt;for benefits and what process they should follow.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The second thing is &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Aadhaar" target="_blank"&gt;Aadhaar &lt;/a&gt;for government documents. There are three examples - PAN cards, driver’s licences and SIM cards.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government has modified the Finance Bill and made &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Aadhaar" target="_blank"&gt;Aadhaar &lt;/a&gt;mandatory  for a PAN card. Why has it done that? Because India has a large number  of duplicate PAN cards. India has something like over 250 million PAN  cards and only 40 million taxpayers. Some of those may be people who  have taken PAN cards just as ID but not for tax purposes, but frankly it  is also because a lot of people have duplicate PAN cards. Why do people  have duplicates?  That is a way of tax evasion. The only way you can  eliminate duplicate PAN cards is by having &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Aadhaar" target="_blank"&gt;Aadhaar &lt;/a&gt;as a way of establishing uniqueness.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The second thing is mobile phones. Here the mobile phone requirement  came from the Supreme Court, where somebody filed a PIL saying so many  mobile phones are being given to terrorists and therefore you need to do  an e-KYC when the SIM is cut and the government said they would use &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Aadhaar" target="_blank"&gt;Aadhaar &lt;/a&gt;and they have been asked to do it by 2018.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The third thing is driver’s licences. As (Union Transport Minister  Nitin Gadkari has said, 30 per cent of all driver’s licences are fakes.  Now why is this important? Because when you have fake driver’s licences  or multiple drivers’ licences, even if you are caught, you can give your  fake licence and continue to drive. Today India is the country with the  largest number of deaths on highways. Lack of enforcement, fake  licences are all a problem.  So in the latest Motor Vehicle Bill which  was passed the government said &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Aadhaar" target="_blank"&gt;Aadhaar &lt;/a&gt;was  necessary to get a licence. So that you have just one driver’s licence,  whether it is issued in Karnataka or Bihar, you have just one.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The government is also talking about using &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Aadhaar" target="_blank"&gt;Aadhaar &lt;/a&gt;for the mid-day meal scheme...&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If you talk to people on the ground, and I have spoken to people on the  ground, a big part of the leakage is mid-day meals. It is not reaching  children. So it is important that all this has to happen so children get  what they need.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;You engaged with governments and civil servants when you initiated the &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Aadhaar" target="_blank"&gt;Aadhaar &lt;/a&gt;process. In hindsight, would you say you should have also engaged with civil society?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I do not think there is any other programme in history which reached out to every stakeholder in the country. When we started &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Aadhaar" target="_blank"&gt;Aadhaar &lt;/a&gt;we  met governments, regulators and even parliamentarians. I gave a talk in  Parliament and we engaged deeply with civil society. In fact, we had  one volunteer only to engage with civil society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;You said you were engaged with the previous government about the data &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Protection+Law" target="_blank"&gt;protection law.&lt;/a&gt; Are you engaging with the current one too?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I am not really engaging. I know that people are working on it and  recently the attorney-general has made a statement in the Supreme Court  that the government will bring in a data &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Protection+Law" target="_blank"&gt;protection law &lt;/a&gt;by Diwali.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;We have heard of several instances of people not being able to get their biometric authentication done. Is there a problem with &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Aadhaar" target="_blank"&gt;Aadhaar?&lt;/a&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The seeding of data in the &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Aadhaar" target="_blank"&gt;Aadhaar &lt;/a&gt;database  has to be done properly and that is a process. Authentication has been  proven at scale in Andhra Pradesh. Millions of people receive food with &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Aadhaar" target="_blank"&gt;Aadhaar &lt;/a&gt;authentication  in 29,000 PDS outlets. In fact, now they have portability -- a person  from Guntur can go to Vijayawada and get his rations. It is empowering.  We keep forgetting about the empowering value.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What has the Andhra Pradesh government done? They have used  fingerprints, but they also have used iris scans, OTP on phone, and they  have a village revenue officer if none of the above works. When you  design the system, you have to design it in a way that 100 per cent of  the beneficiaries genuinely get the benefit.  Andhra Pradesh has shown  it can be done.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government needs to package the learning and best practices of  Andhra Pradesh and take it to every other state. It is an execution  issue.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Activists have raised concerns over the centralised &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Aadhaar" target="_blank"&gt;Aadhaar &lt;/a&gt;database...&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;How else would you establish uniqueness? If you are going to give a  billion people a number, how else would you do it? Is there any other  way of doing it? Every cloud is centralised, then we should not have  cloud systems.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;How do you ensure security standards and software are updated?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are very good people there. The CEO is very good. There is a  three-member executive board with chairman Satyanarayana and two  members, Anand Deshpande and Rajesh Jain. I have no doubt that they will  continue to improve things.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On security, you keep improving. It is a constant race everywhere in  the world. They are now coming out with registered devices that will  make it more difficult to spoof.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But without a centralised database, how do you establish that an  identity is not two people? If you look at the team that designed this,  cumulatively they have a few hundred years of experience of designing  large systems around the world. Every design decision has been taken  consciously looking at the pros and cons. Why did we have both  fingerprints and iris scans? There are two reasons. One is to ensure  uniqueness. The second is inclusion. We knew that fingerprints in India  do not work all the time because of age and manual labour. So we  included iris scans. I can give you a document from 2009 that says all  of this. All of these things were thought through.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;If you are given a chance to design &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Aadhaar" target="_blank"&gt;Aadhaar &lt;/a&gt;today what would you do differently?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I would do exactly the same thing. Go back and look at the design  document. Every design has been articulated, the pros and cons are  written down, published on our website, and it is a highly transparent  exercise. It is the appropriate design for the problem we are trying to  solve. We are forgetting about the huge benefits people are getting.  Crores of people are getting direct benefit transfer without hassle.  They can go to a village business correspondent and withdraw money using  &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Aadhaar" target="_blank"&gt;Aadhaar.&lt;/a&gt; They can get their SIM card and open a bank account using e-KYC.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;You are also forgetting that people are getting empowered. That  portability has ensured the bargaining power has shifted from the PDS  shop owner to the individual. If a PDS guy treats him badly, the  individual can choose another shop, earlier he could not do that. The  empowerment of millions of people to buy rations at the shop of their  choice is extraordinary.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/business-standard-may-13-2017-alnoor-peermohamed-and-raghu-krishnan-aadhaar-has-become-a-whipping-boy-nandan-nilekani'&gt;https://cis-india.org/internet-governance/news/business-standard-may-13-2017-alnoor-peermohamed-and-raghu-krishnan-aadhaar-has-become-a-whipping-boy-nandan-nilekani&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-05-19T09:54:52Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/vulnerabilities-in-the-uidai-implementation-not-addressed-by-the-aadhaar-bill-2016">
    <title>Vulnerabilities in the UIDAI Implementation Not Addressed by the Aadhaar Bill, 2016</title>
    <link>https://cis-india.org/internet-governance/blog/vulnerabilities-in-the-uidai-implementation-not-addressed-by-the-aadhaar-bill-2016</link>
    <description>
        &lt;b&gt;In this infographic, we document the various issues in the Aadhaar enrolment process implemented by the UIDAI, and highlight the vulnerabilities that the Aadhaar Bill, 2016 does not address. The infographic is based on Vidushi Marda’s article 'Data Flow in the Unique Identification Scheme of India,' and is designed by Pooja Saxena, with inputs from Amber Sinha.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Download the infographic: &lt;a href="https://github.com/cis-india/website/raw/master/infographics/CIS_Aadhaar-2016-Enrolment-Vulnerabilities_v.1.0.pdf"&gt;PDF&lt;/a&gt; and &lt;a href="https://github.com/cis-india/website/raw/master/infographics/CIS_Aadhaar-2016-Enrolment-Vulnerabilities_v.1.0.png"&gt;PNG&lt;/a&gt;.&lt;/h4&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Credits:&lt;/strong&gt; The illustration uses the following icons from The Noun Project - &lt;a href="https://thenounproject.com/term/fingerprint/231547/"&gt;Thumpbrint&lt;/a&gt; created by Daouna Jeong, Duplicate created by Pham Thi Dieu Linh, &lt;a href="https://thenounproject.com/term/copy/377777/"&gt;Copy&lt;/a&gt; created by Mahdi Ehsaei.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;License:&lt;/strong&gt; It is shared under Creative Commons &lt;a href="https://creativecommons.org/licenses/by/4.0/"&gt;Attribution 4.0 International&lt;/a&gt; License.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;img src="https://github.com/cis-india/website/raw/master/infographics/CIS_Aadhaar-2016-Enrolment-Vulnerabilities_v.1.0.png" alt="Vulnerabilities in the UIDAI Implementation Not Addressed by the Aadhaar Bill, 2016" /&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/vulnerabilities-in-the-uidai-implementation-not-addressed-by-the-aadhaar-bill-2016'&gt;https://cis-india.org/internet-governance/blog/vulnerabilities-in-the-uidai-implementation-not-addressed-by-the-aadhaar-bill-2016&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Pooja Saxena and Amber Sinha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Infographic</dc:subject>
    
    
        <dc:subject>Digital India</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Biometrics</dc:subject>
    

   <dc:date>2016-03-21T08:33:53Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/hindu-yuthika-bhargava-january-11-2018-virtual-aadhaar-id-too-little-too-late">
    <title>Virtual Aadhaar ID: too little, too late?</title>
    <link>https://cis-india.org/internet-governance/news/hindu-yuthika-bhargava-january-11-2018-virtual-aadhaar-id-too-little-too-late</link>
    <description>
        &lt;b&gt;Problems persist as many have already shared their 12-digit number with various entities, say experts&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Yuthika Bhargava was &lt;a class="external-link" href="http://www.thehindu.com/news/national/virtual-aadhaar-id-too-little-too-late/article22423218.ece"&gt;published in the Hindu&lt;/a&gt; on January 11, 2018&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The move to introduce an “untested” virtual ID to address security concerns over Aadhaar database is a step in the right direction, but may be a case of too little, too late, according to experts, as many of the 119 crore Aadhaar holders have already shared their 12-digit numbers with various entities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“What about all the databases that are already linked up with our Aadhaar number? Virtual ID will therefore not attack the root of the problem. At best, it is band-aid,” said Reetika Khera, faculty, Indian Institute of Technology-Delhi.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Can we realistically expect rural folks to use this to protect themselves? Or are we pushing the barely literate into the hands of middlemen who will ‘help’ them navigate it?” she questioned.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Unique Identification Authority of India (UIDAI) on Wednesday introduced the concept of a virtual ID that can be used in lieu of the Aadhaar number at the time of authentication, thus eliminating the need to share and store Aadhaar numbers. It can be generated only by the Aadhaar number-holder via the UIDAI website, Aadhaar enrolment centre, or its mobile application.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Experts pointed out that the virtual ID is voluntary and the Aadhaar number will still need to be used at some places.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Unless all entities are required to use virtual IDs or UID tokens, and are barred from storing Aadhaar numbers, the new measures won’t really help,” said Pranesh Prakash, Policy Director, Centre for Internet and Society, Bengaluru.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Kiran Jonnalagadda, co-founder of the Internet Freedom Foundation, agreed. “The idea is good but it should have been done in 2010, as now all the data is already out. Now, what can be done is revoke everybody’s Aadhaar and give new IDs.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Jonnalagadda added that Authentication User Agencies (AUAs) categorised as ‘global AUAs’ by the UIDAI will be exempted from using the virtual IDs. “These are likely to be entities which require de-duplication for subsidy transfer, such as banks and government agencies. All the leaks have happened till now from these entities. So, basically, the move will exempt the parties that are the problem,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Vipin Nair, one of the advocates representing the petitioners who have challenged the Aadhaar Act in the Supreme Court said, “It is potentially a case of unmitigated chaos purely from an Information Technology perspective.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/hindu-yuthika-bhargava-january-11-2018-virtual-aadhaar-id-too-little-too-late'&gt;https://cis-india.org/internet-governance/news/hindu-yuthika-bhargava-january-11-2018-virtual-aadhaar-id-too-little-too-late&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-01-16T23:59:21Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/vidhi-doshi-fingerprint-payments-prompt-privacy-fears-in-india-the-guardian">
    <title>Vidhi Doshi - Fingerprint Payments Prompt Privacy Fears in India (The Guardian)</title>
    <link>https://cis-india.org/internet-governance/news/vidhi-doshi-fingerprint-payments-prompt-privacy-fears-in-india-the-guardian</link>
    <description>
        &lt;b&gt;This article by Vidhi Doshi on the use of Aadhaar-based payments by private companies in India was published by The Guardian on February 09, 2017. Sumandro Chattapadhyay is quoted in the article.&lt;/b&gt;
        
&lt;p&gt;Originally published by &lt;a href="https://www.theguardian.com/sustainable-business/2017/feb/09/fingerprint-payments-privacy-fears-india-banknotes"&gt;The Guardian&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;For two years, Indian officials have been trawling the country, from city slums to unelectrified villages, zapping eyeballs, scanning fingerprints and taking photographs.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Last month, Indian shoppers started to see the results. With the launch of a government-backed fingerprint payment system, tied to India’s growing biometric data bank, registered citizens can – in theory at least – now pay for things with the touch of a finger.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;India’s extraordinary biometric database, named Aadhaar after a Hindi word for ‘foundation’, is the biggest of its kind in the world. It was initially sold to the public as a welfare delivery mechanism that would ensure the country’s 1.25bn citizens were each receiving the right quantity of subsidised rice or cooking fuel, while weeding out fraudsters.&lt;/p&gt;
&lt;p&gt;But now this pool of more than a billion people’s biometric data is being used by banks, credit checking firms and other private companies to identify customers, raising questions about privacy and security.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;As one of his flagship policies, prime minister Narendra Modi pledged to create a “digital India” in which the country’s cash-centric economy would switch to credit and debit cards, squeezing the parallel economy of untaxed cash transactions and giving more citizens access to digital financial services.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In a surprise television announcement last November, Modi announced the demonetisation of 500 and 1,000 rupee notes (around £6 and £12), wiping out 85% of the country’s circulating currency overnight.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Two days later, when the banks reopened, long queues snaked around almost every branch, with millions lining up to open bank accounts for the first time. Many used their 12-digit Aadhaar number, linked to their biometric profile, to sign up. Within three weeks, 3m bank accounts had been opened using fingerprint verification, according to estimates.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The moment marked a radical change for India’s banking system, under which applicants were traditionally required to file photocopies of passports or voter IDs. Banks could take weeks, sometimes months, to verify them. Now applicants’ encrypted biometric data can be sent to the Unique Identification Authority of India (UIDAI), a government agency, to be matched against their Aadhaar data, re-encrypted and sent back to the bank.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Despite technical teething problems, the system is designed to allow very fast authorisation. “All this happens in a matter or two or three seconds,” explains Ajay Bhushan Pandey, UIDAI’s director general.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;For Pandey, the benefits are clear: paper documents are easy to forge and hard to verify, especially in India where until recently thousands of people still used handwritten passports. Not so biometric data.&lt;/p&gt;
&lt;h4&gt;Privacy fears&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;Pandey emphasises that private banks and companies aren’t able to access the entire Aadhaar database, only to use the government interface, which allows them to verify identities.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Nonetheless, many Indians are worried about the privacy implications. Sumandro Chattapadhyay, a director at the Centre for Internet and Society thinktank, is one of them.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;For starters, says Chattapadhyay, the law governing use of the biometric database, fast-tracked through parliament last year, is flimsy when it comes to the private sector. Since India lacks a general privacy or data protection law, this leaves corporate use of Aadhaar services effectively unregulated, he says.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This is particularly worrying, says Chattapadhyay, because of the data-sharing possibilities opened up by Aadhaar. It makes it easier for companies not only to share information on individuals’ consumption and mobility habits, but also to link this data up with public records like the electoral register, he says. “Both lead to significant threats to privacy of individuals.”&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Chattapadhyay’s fear is that private companies could eventually gain access to government-held personal data, such as income or medical records, while the government could use company data like phone records to target specific individuals in political campaigns.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Already companies are linking Aadhaar numbers with collected metadata. Credit-checking startup CreditVidya, for example, identifies clients using their biometric ID in combination with their internet browsing history and other data, to assign credit scores for users who have no record of loan repayments. Banks then store this processed metadata, for example whether or not someone’s Facebook name is consistent with the name on their bank account.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Its founder Abhishek Agarwal admits there are risks for users: “[I]f someone managed to hack the bank’s security system, as well as the Aadhaar database, they could potentially be able to link your Facebook or LinkedIn data with your biometric information.” But he says this would be hard to do.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Pandey insists the companies are carefully vetted before they can use Aadhaar authentication. But, like Agarwal, he acknowledges the system can never be 100% secure: ““I wouldn’t say it is impossible to break the system, but it is very, very difficult.”&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/vidhi-doshi-fingerprint-payments-prompt-privacy-fears-in-india-the-guardian'&gt;https://cis-india.org/internet-governance/news/vidhi-doshi-fingerprint-payments-prompt-privacy-fears-in-india-the-guardian&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Vidhi Doshi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Demonetisation</dc:subject>
    
    
        <dc:subject>Digital Payment</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Biometrics</dc:subject>
    

   <dc:date>2017-02-13T09:21:42Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/understanding-aadhaar-and-its-new-challenges-may-26-27-2016">
    <title>Understanding Aadhaar and its New Challenges, May 26-27, 2016</title>
    <link>https://cis-india.org/internet-governance/events/understanding-aadhaar-and-its-new-challenges-may-26-27-2016</link>
    <description>
        &lt;b&gt;A workshop on “Understanding Aadhaar and its New Challenges” is being organised by the Centre for Studies in Science Policy, Jawaharlal Nehru University, and the Centre for Internet and Society, during May 26-27. It is also supported by the Centre for Communication Governance at NLU Delhi, Free Software Movement of India, Knowledge Commons, PEACE, and Center for Advancement of Public Understanding of Science &amp; Technology. This is a legal and technical workshop to be attended by various key researchers and practitioners to discuss the current status of the implementation of the project, in the context of the passing of the Act and the various ongoing cases.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h1&gt;Workshop Programme&lt;/h1&gt;
&lt;h3&gt;First Day, May 26&lt;/h3&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;9:00-9:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Registration&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;9:30-10:00&lt;/td&gt;
&lt;td&gt;Prof. Dinesh Abrol - &lt;em&gt;Welcome&lt;/em&gt;&lt;br /&gt;Self-introduction and expectations of participants&lt;br /&gt;Dr. Usha Ramanathan - &lt;em&gt;Overview of the Workshop&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10:00-11:00&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Current Status of Aadhaar&lt;/strong&gt;&lt;br /&gt;Dr. Usha Ramanathan, Legal Researcher, New Delhi - &lt;em&gt;What the 2016 Law Says, and How it Came into Being&lt;/em&gt;&lt;br /&gt;S. Prasanna, Advocate, New Delhi - &lt;em&gt;Status and Force of Supreme Court Orders on Aadhaar&lt;/em&gt;&lt;br /&gt;Discussion&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:00-11:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Tea Break&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:30-13:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Direct Benefits Transfers&lt;/strong&gt;&lt;br /&gt;Prof. Reetika Khera, Indian Institute of Technology, Delhi - &lt;em&gt;Welfare Needs Aadhaar like a Fish Needs a Bicycle&lt;/em&gt;&lt;br /&gt;Prof. Ram Kumar, Tata Institute of Social Sciences, Mumbai - &lt;em&gt;Aadhaar and the Social Sector: A critical analysis of the claims of benefits and inclusion&lt;/em&gt;&lt;br /&gt;Ashok Rao, Delhi Science Forum - &lt;em&gt;Cash Transfers Study&lt;/em&gt;&lt;br /&gt;Discussion&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13:30-14:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Lunch&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14:30-16:00&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Aadhaar: Science, Technology, and Security&lt;/strong&gt;&lt;br /&gt;Prof. Subashis Banerjee, Deptt of Computer Science &amp;amp; Engineering, IIT, Delhi - &lt;em&gt;Privacy and Security Issues Related to the Aadhaar Act&lt;/em&gt;&lt;br /&gt;Pukhraj Singh, former National Cyber Security Manager, Aadhaar, New Delhi - &lt;em&gt;Aadhaar: Security and Surveillance Dimensions&lt;/em&gt;&lt;br /&gt;Discussion&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;16:00-16:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Tea Break&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;16:30-17:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Aadhaar - International Dimensions&lt;/strong&gt;&lt;br /&gt;Prof. Chinmayi Arun, Center for Communication Governance, National Law University, Delhi - &lt;em&gt;Biometrics and Mandatory IDs in other parts of the world&lt;/em&gt;&lt;br /&gt;Dr. Gopal Krishna, Citizens Forum for Civil Liberties - &lt;em&gt;International Dimensions of Aadhaar
&lt;/em&gt;&lt;br /&gt;Discussion&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;17:30-18:00&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;High Tea&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;18:00-19:00&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Video Presentations&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;tbody&gt;&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Second Day, May 27&lt;/h3&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;9:30-11:00&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Privacy, Surveillance, and Ethical Dimensions of Aadhaar&lt;/strong&gt;&lt;br /&gt;Prabir Purkayastha, Free Software Movement of India, New Delhi - &lt;em&gt;Surveillance Capitalism and the Commodification of Personal Data&lt;/em&gt;&lt;br /&gt;Arjun Jayakumar, SFLC - &lt;em&gt;Surveillance Projects Amalgamated&lt;/em&gt;&lt;br /&gt;Col Mathew Thomas, Bengaluru
 - &lt;em&gt;The Deceit of Aadhaar&lt;/em&gt;&lt;br /&gt;Discussion&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:00-11:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Tea Break&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:30-10:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Aadhaar: Broad Issues - I&lt;/strong&gt;&lt;br /&gt;Prof. G Nagarjuna, Homi Bhabha Center for Science Education, Tata Institute of Fundamental Research, Mumbai - &lt;em&gt;How to prevent linked data in the context of Aadhaar&lt;/em&gt;&lt;br /&gt;Dr. Anupam Saraph, Pune - &lt;em&gt;Aadhaar and Moneylaundering&lt;/em&gt;&lt;br /&gt;Discussion&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13:00-13:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Video Presentations&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13:30-14:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Lunch&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14:30-15:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Aadhaar: Broad Issues - II&lt;/strong&gt;&lt;br /&gt;Prof. MS Sriram, Visiting Faculty, Indian Institute of Management, Bangalore - &lt;em&gt;Financial lnclusion&lt;/em&gt;&lt;br /&gt;Nikhil Dey, MKSS, Rajasthan (TBC) - &lt;em&gt;Field witness: Technology on the Ground&lt;/em&gt;&lt;br /&gt;Prof. Himanshu, Centre for Economic Studies &amp;amp; Planning, JNU - &lt;em&gt;UID Process and Financial Inclusion&lt;/em&gt;&lt;br /&gt;Discussion&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15:30-16:00&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Conclusion&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;tbody&gt;&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/understanding-aadhaar-and-its-new-challenges-may-26-27-2016'&gt;https://cis-india.org/internet-governance/events/understanding-aadhaar-and-its-new-challenges-may-26-27-2016&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Biometrics</dc:subject>
    

   <dc:date>2016-05-26T10:29:43Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/uidais-virtual-id-limited-kyc-does-little-to-protect-aadhaar-data-already-collected-say-critics">
    <title>UIDAI's Virtual ID, limited KYC does little to protect Aadhaar data already collected, say critics</title>
    <link>https://cis-india.org/internet-governance/news/uidais-virtual-id-limited-kyc-does-little-to-protect-aadhaar-data-already-collected-say-critics</link>
    <description>
        &lt;b&gt;Aadhaar-issuing body, Unique Identification Authority of India (UIDAI), had barely started patting itself on the back for introducing the Virtual ID concept, what CEO Ajay Bhushan Pandey called "one of biggest recent innovations in this field", when detractors came crawling out of the woodwork, all guns blazing.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in &lt;a class="external-link" href="http://www.businesstoday.in/current/economy-politics/uidais-virtual-id-limited-kyc-little-protect-aadhaar-data-collected-critics/story/267924.html"&gt;Business Today&lt;/a&gt; on January 12, 2018.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;"Under compulsion, millions of persons have already shared Aadhaar number with many service providers. New security layer is like locking the stable after horses have bolted," tweeted P. Chidambaram, Congress veteran and former finance minister. This is not just an opposition party member taking potshots at the government. As of last month, close to 14 crore out of about 30 crore Permanent Account Numbers (PANs) had already been linked to Aadhaar and 70% of the estimated 100 crore bank accounts had been seeded. This will be the case for insurance policies as well as all government-sponsored welfare schemes and services since the Supreme Court ruling to extend the deadline for mandatory Aadhaar linking came just a fortnight before the government's December 21 deadline. So how does the new two-tier security system protect all that Aadhaar data already collected by sundry agencies?&lt;/span&gt;&lt;/p&gt;
&lt;div id="_mcePaste" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p id="_mcePaste" style="text-align: justify; "&gt;The short answer is that it does not. According to media reports, banks and other service providers have not been asked to delete stored Aadhaar data from their databases. The only directive is to enforce the new security system within the June 1 deadline. In the absence of a legal mandate, agencies can very well choose to retain any Aadhaar data previously collected on their servers, leaving it open to any number of security breaches in the future.&lt;/p&gt;
&lt;div id="_mcePaste" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;div id="_mcePaste" style="text-align: justify; "&gt;So, it would appear that the new VID and limited KYC norms are good ideas, just too late in arriving. Only procrastinators putting off linking Aadhaar to essential services stand to gain, unless the government decides to revoke all existing Aadhaar cards and issue fresh 12-digit unique identification numbers post June 1.&lt;/div&gt;
&lt;div id="_mcePaste" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p id="_mcePaste" style="text-align: justify; "&gt;Where the new security system definitely scores is on the privacy front. To remind you, VID a temporary, 16-digit, randomly-generated number that an Aadhaar holder can use for authentication or KYC services along with his/her fingerprint instead in lieu of the Aadhaar number. The VID together with biometrics of the user would give any authorized agency, say, a mobile company, limited details like name, address and photograph, which are enough for any verification. You can generate/replace Virtual IDs on the UIDAI website, Aadhaar mobile app and at enrolment centres.&lt;/p&gt;
&lt;div id="_mcePaste" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p id="_mcePaste" style="text-align: justify; "&gt;Since the system-generated VID will be mapped to an individual's Aadhaar number at the back end, it will do away with the need for the user to share Aadhaar number with sundry service agencies. This will, in turn, reduce the collection of Aadhaar numbers by various agencies. VIDs being temporary cannot be de-duplicated and as an added precaution, agencies that undertake authentication will not be allowed to generate VIDs on behalf of Aadhaar holders.&lt;/p&gt;
&lt;div id="_mcePaste" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p id="_mcePaste" style="text-align: justify; "&gt;Furthermore, under limited KYC, UIDAI will evaluate all Authentication User Agencies (AUAs) and split them into two categories: Global AUAs and Local AUAs. Only agencies whose services, by law, require them to store the Aadhaar number-qualified as Global AUAs-will enjoy access to full demographic details of an individual. All the remaining AUAs will be branded as Local AUAs and will neither get access to full KYC, nor can they store the Aadhaar number on their systems. Instead, they will get a tokenised number issued by UIDAI to identify their customers. The 72 character alphanumeric 'UID Token' for your Aadhaar number will reportedly be different for every authentication body you approach so agencies will no longer be able to merge databases, thus enhancing privacy substantially.&lt;/p&gt;
&lt;div id="_mcePaste" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p id="_mcePaste" style="text-align: justify; "&gt;However, there's a problem here, too. As Pranesh Prakash, Policy Director of Bengaluru-based Centre for Internet and Society, told The Hindu, "unless all entities are required to use VIDs or UID tokens, and are barred from storing Aadhaar numbers, the new measures won't really help."&lt;/p&gt;
&lt;div id="_mcePaste" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p id="_mcePaste" style="text-align: justify; "&gt;In a recent online survey, conducted by social engagement platform LocalCircles, 52% of 15,000 respondents said they feared that their Aadhaar data might not be safe from unauthorised access by hackers and information sellers. The UIDAI's latest move does little to allay this doubt.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Under compulsion, millions of persons have already shared Aadhaar number with many service providers. New security layer is like locking the stable after horses have bolted," tweeted P. Chidambaram, Congress veteran and former finance minister. This is not just an opposition party member taking potshots at the government. As of last month, close to 14 crore out of about 30 crore Permanent Account Numbers (PANs) had already been linked to Aadhaar and 70% of the estimated 100 crore bank accounts had been seeded. This will be the case for insurance policies as well as all government-sponsored welfare schemes and services since the Supreme Court ruling to extend the deadline for mandatory Aadhaar linking came just a fortnight before the government's December 21 deadline. So how does the new two-tier security system protect all that Aadhaar data already collected by sundry agencies?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The short answer is that it does not. According to media reports, banks and other service providers have not been asked to delete stored Aadhaar data from their databases. The only directive is to enforce the new security system within the June 1 deadline. In the absence of a legal mandate, agencies can very well choose to retain any Aadhaar data previously collected on their servers, leaving it open to any number of security breaches in the future.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So, it would appear that the new VID and limited KYC norms are good ideas, just too late in arriving. Only procrastinators putting off linking Aadhaar to essential services stand to gain, unless the government decides to revoke all existing Aadhaar cards and issue fresh 12-digit unique identification numbers post June 1.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Where the new security system definitely scores is on the privacy front. To remind you, VID a temporary, 16-digit, randomly-generated number that an Aadhaar holder can use for authentication or KYC services along with his/her fingerprint instead in lieu of the Aadhaar number. The VID together with biometrics of the user would give any authorized agency, say, a mobile company, limited details like name, address and photograph, which are enough for any verification. You can generate/replace Virtual IDs on the UIDAI website, Aadhaar mobile app and at enrolment centres.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since the system-generated VID will be mapped to an individual's Aadhaar number at the back end, it will do away with the need for the user to share Aadhaar number with sundry service agencies. This will, in turn, reduce the collection of Aadhaar numbers by various agencies. VIDs being temporary cannot be de-duplicated and as an added precaution, agencies that undertake authentication will not be allowed to generate VIDs on behalf of Aadhaar holders.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Furthermore, under limited KYC, UIDAI will evaluate all Authentication User Agencies (AUAs) and split them into two categories: Global AUAs and Local AUAs. Only agencies whose services, by law, require them to store the Aadhaar number-qualified as Global AUAs-will enjoy access to full demographic details of an individual. All the remaining AUAs will be branded as Local AUAs and will neither get access to full KYC, nor can they store the Aadhaar number on their systems. Instead, they will get a tokenised number issued by UIDAI to identify their customers. The 72 character alphanumeric 'UID Token' for your Aadhaar number will reportedly be different for every authentication body you approach so agencies will no longer be able to merge databases, thus enhancing privacy substantially.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, there's a problem here, too. As Pranesh Prakash, Policy Director of Bengaluru-based Centre for Internet and Society, told The Hindu, "unless all entities are required to use VIDs or UID tokens, and are barred from storing Aadhaar numbers, the new measures won't really help."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a recent online survey, conducted by social engagement platform LocalCircles, 52% of 15,000 respondents said they feared that their Aadhaar data might not be safe from unauthorised access by hackers and information sellers. The UIDAI's latest move does little to allay this doubt.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/uidais-virtual-id-limited-kyc-does-little-to-protect-aadhaar-data-already-collected-say-critics'&gt;https://cis-india.org/internet-governance/news/uidais-virtual-id-limited-kyc-does-little-to-protect-aadhaar-data-already-collected-say-critics&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-01-16T23:51:44Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/business-standard-mayank-jain-march-27-2018-uidai-servers-or-third-parties-aadhaar-leaks-are-dangerous-experts">
    <title>UIDAI servers or third parties, Aadhaar leaks are dangerous: Experts</title>
    <link>https://cis-india.org/internet-governance/news/business-standard-mayank-jain-march-27-2018-uidai-servers-or-third-parties-aadhaar-leaks-are-dangerous-experts</link>
    <description>
        &lt;b&gt;Even though the UIDAI has denied these reports, its arguments rest on shaky grounds, according to experts.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Mayank Jain was published in &lt;a class="external-link" href="http://www.business-standard.com/article/current-affairs/uidai-servers-or-third-parties-aadhaar-leaks-are-dangerous-experts-118032601008_1.html"&gt;Business Standard&lt;/a&gt; on March 27, 2018. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The government has told the Supreme Court that the Aadhaar data “remains safely behind 13-feet high walls” and it will take “the age of the universe” to break one key in the Unique Identification Authority of India’s (UIDAI’s) encryption.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even if this claim is taken at face value, experts suggest leaks from third-party databases seeded with Aadhaar numbers are equally dangerous and the UIDAI is responsible for the damage. &lt;span&gt;The most recent case came from a report published online and it said random numbers could provide access to the Aadhaar data, which also includes people’s financial information, from a state-owned company’s database. &lt;/span&gt;&lt;span&gt;Even though the UIDAI has denied these reports, its arguments rest on shaky grounds, according to experts.“There is no truth in this story as there has been absolutely no breach of the UIDAI’s Aadhaar database.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aadhaar remains safe and secure,” the UIDAI said on Twitter shortly after the story broke on ZDNet.The authority added even if the report was taken to be true, “it would raise security concerns on the database of that Utility Company and has nothing to do with the security of the UIDAI’s Aadhaar database”.This has been the authority’s defence in several such cases but those in the know of things say it doesn’t hold water simply because the Aadhaar data is not concentrated in the UIDAI’s complexes anymore and has spread across various databases.“Publishing this by the state entities is a violation under the Aadhaar Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even if you publish your Aadhaar number, it is a violation of the law,” said Pranesh Prakash, policy director at the Centre for Internet and Society.“Saying that the UIDAI has not been compromised is thoroughly insufficient because for customers, it doesn’t matter if the leak comes from servers operated by the UIDAI or from others holding copies of the UIDAI database.”Prakash said it should be the authority’s responsibility to help others comply with the law and prevent data leaks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He gave the example of biometric leaks from Gujarat government servers and how criminals used them to forge fingerprints.The possibility of data leaks was demonstrated when Robert Baptiste, purportedly a French app developer, announced on Twitter how he got access to thousands of scanned Aadhaar card copies through simple Google searches.In an interview to Business Standard, Baptiste said the major threat was data handling by third parties, which could lead to identity theft.Even the Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Act, 2016, has provisions that debar making public citizens’ Aadhaar-related information public unless required for certain purposes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Whoever intentionally discloses, transmits, copies or otherwise disseminates any identity information collected in the course of enrolment or authentication to any person not authorised under this Act” can be in jail for three years and pay a fine of ~10,000 under the Act.A lawyer appearing on the petitioners’ side in the ongoing Supreme Court case on the constitutional validity of Aadhaar said only the UIDAI had the powers to file cases against people who published Aadhaar information. Hence everyone else is helpless despite the leaks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UIDAI’s argument that Aadhaar information can’t be misused is duplicitous because the regulations under the Aadhaar Act assure individuals that if biometric authentication fails, they should have other means of identifying themselves, says Kiran Jonnalagadda, founder of HasGeek.“So the regulations guarantee that anyone in possession of stolen identity information will be able to misuse it without biometric authentication,” he said.Prakash agreed with this. He said demographic authentication, which is an acceptable authentication method under the Aadhaar Act, was prone to misuse as long as Aadhaar numbers remained public.“Aadhaar is used as just a piece of paper, unlike security features embedded in passports or even permanent account number cards. Thus, demographic authentication merely involves providing Aadhaar numbers and details like addresses, which can be used even for things like getting entry into an airport by just printing a ticket and having a fake Aadhaar,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;em&gt;Queries sent to the UIDAI were not answered till the time of going to press&lt;/em&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/business-standard-mayank-jain-march-27-2018-uidai-servers-or-third-parties-aadhaar-leaks-are-dangerous-experts'&gt;https://cis-india.org/internet-governance/news/business-standard-mayank-jain-march-27-2018-uidai-servers-or-third-parties-aadhaar-leaks-are-dangerous-experts&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-03-27T02:16:55Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/newslaundry-shruti-menon-may-2-2017-uidai-remains-silent-on-aadhaar-leaks-of-users-through-govt-portals">
    <title>UIDAI remains silent on #Aadhaarleaks of 13 crore users through government portals</title>
    <link>https://cis-india.org/internet-governance/news/newslaundry-shruti-menon-may-2-2017-uidai-remains-silent-on-aadhaar-leaks-of-users-through-govt-portals</link>
    <description>
        &lt;b&gt;As the arguments for making Aadhaar mandatory go on, is there any way to stem the leaks and identify who exactly has all this information.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post by Shruti Menon was &lt;a class="external-link" href="https://www.newslaundry.com/2017/05/02/uidai-remains-silent-on-aadhaarleaks-of-13-crore-users-through-government-portals"&gt;published by Newslaundry&lt;/a&gt; on May 2, 2017&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The verdict on linking Aadhaar with Permanent Account Number (PAN) and  making it mandatory for filing income tax returns (ITRs) will be out  soon. Attorney General Mukul Rohatgi had a tough challenge ahead of him  in the Supreme Court as the state presented its argument today. Rohatgi  defended the &lt;a href="http://www.livemint.com/Politics/3FcQ9lHm7TWX5B0Hn7ZXiO/Aadhaar-to-be-mandatory-for-income-tax-returns-getting-PAN.html" target="_blank"&gt;amendment in income tax law&lt;/a&gt; allowing this after senior lawyer Shyam Divan made a &lt;a href="http://www.livemint.com/Politics/sN0S5mYYx641tgrctGf03H/Shyam-Divan-concludes-arguments-in-Aadhaar-case-in-Supreme-C.html" target="_blank"&gt;strong case&lt;/a&gt; against  it on April 26 and 27. Divan became a hero to many overnight after he  presented compelling arguments against the amendment citing facets of  right to privacy - informational self-determination, personal autonomy,  and bodily integrity - as he did so. Though the court has &lt;a href="https://www.thequint.com/opinion/2017/05/01/aadhaar-case-privacy-and-bodily-integrity" target="_blank"&gt;refused to entertain&lt;/a&gt; arguments pertaining to privacy, he managed to argue these concerns without couching them under right to privacy laws.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Advocate Gautam Bhatia posted &lt;a href="https://barandbench.com/aadhar-hearing-number-tagging-nazi-concentration-camps/" target="_blank"&gt;minute-by-minute developments from the courtroom&lt;/a&gt;, and soon, #ThankYouMrDivan became one of the top trends on Twitter.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A day before the state presented its arguments, the Centre for Internet and Society (CIS) published a &lt;a href="http://cis-india.org/internet-governance/information-security-practices-of-aadhaar-or-lack-thereof-a-documentation-of-public-availability-of-aadhaar-numbers-with-sensitive-personal-financial-information-1" target="_blank"&gt;report &lt;/a&gt;titled  “Information, Security Practices of Aadhaar (or lack thereof): A  documentation of public availability of Aadhaar numbers with sensitive  personal financial information” late on Monday. Authored by Amber Sinha  and Srinivas Kodali, the report documents the leaks of over 13 crore  Aadhaar numbers and resulting information of beneficiaries through four  government portals-two at the centre and two at the state. “We are  primarily talking of lack of standards and data fact-checking, storage  and how all of this information- account numbers, phone numbers plus,  Aadhaar numbers- in public domain increases the nature of risk of the  backbone of digital payments,” Kodali told &lt;i&gt;Newslaundry. &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The four portals studied by the two are National Social Assistance  Programme (NSAP), National Rural Employment Guarantee Act (NREGA) and  two databases of Andhra Pradesh- NREGA and their scheme called Chandranna Bima.  The report claims that the aforementioned public portals compromised  personally identifiable information (PII) including “Aadhaar numbers and  financial details such as bank account numbers” of 13 crore people due  to a lack of security controls.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“While the details were masked for public view, someone with login  access could get the details,” the report read. “When one of the url  query parameters of the website showing the masked personal details was  modified from ‘nologin’ to ‘login’, that is, control access to login  based pages were allowed providing unmasked details without the need for  a password.” What this essentially means is that these portals allow  people to explore lists organised by states, districts, area,  sub-district, and municipalities which contain the personal information  of the people who are enrolled into the schemes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The report also  cites legal framework under the Aadhaar Act that allows the government  or private entities to store Aadhaar numbers on the grounds that they  won’t be used for purposes other than those listed in the act. CIS’s  study, however, reveals that information pertaining to religion, caste,  race, tribe or even income is sometimes collected and published on such  portals with little in the way of security checks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Speaking to &lt;i&gt;Newslaundry,&lt;/i&gt; Anupam Saraph, professor and former governance and IT advisor to Goa’s  Chief Minister, Manohar Parrikar, said that the data exposed could be  significantly more than what the report shows. “Many more Aadhaar  numbers have been exposed on websites relating to Pension Schemes, PDS,  Ministry of Water and Sanitation, Ministry of Human Resource  Development, Scholarships, Schools, Colleges, Universities, Kendriya  Sainik board, PM Avas Yojana to name a few,” he said. “Besides this  Registrars to the UIDAI (State Governments and various ministries of the  Central government, some Public Sector undertakings) were allowed to  retain the Aadhaar number, demographic and biometric data (associated  with the Aadhaar number). While this may not be exposed on websites, it  is unsecured and possibly accessible to data brokers within and outside  government,” said Saraph who has designed delivery channels and ID  schemes for better governance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What’s worth noting is that the  people whose data has been breached are unaware that their information  is available on public platforms and vulnerable to data theft. “It is  UIDAI’s [Unique Identification Authority of India] job to investigate  and inform them,” Kodali told &lt;i&gt;Newslaundry. “&lt;/i&gt;At some point of time, everybody is going to have everybody’s information,” he added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Currently, the government has an &lt;a href="https://data.gov.in/" target="_blank"&gt;open data portal&lt;/a&gt;. It  describes itself as a platform “intended to be used by Government  Ministries/Departments and their organisation to publish datasets,  documents, services, tools and applications collected by them for public  use”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So is it feasible to have open data portals for  transparency and accountability? “Having certain government data being  publicly accessible is certainly desirable.” Saraph continued that the  problem was, data on public expenditure should ideally be openly  accessible but it’s also where the most leakage occurs. “Making Aadhaar  mandatory is meaningless,” he said, as India does not have a policy on  open data portals yet, which can subject Aadhaar data to “misuse”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Given  that the UIDAI is responsible for investigating and making people aware  of any data breach or theft, they have remained silent for an oddly  long time. It is unclear whether the UIDAI is itself aware of who has  accessed the data that is insecurely published on these government  portals. “They’re letting everybody collect this information but they  were not aware themselves that who had access to this information,  that’s the main problem,” Kodali said. While the Aadhaar ecosystem was  to ensure social inclusion and transparency, in its current form, the  system looks so opaque that the people who are running it may not be  aware themselves of what is going on.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What does it mean to have access to someone else’s Aadhaar?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With  an increasing number of social welfare schemes being linked to Aadhaar,  it was touted as an attempt to remove the middlemen, frauds and  corruption with the government. According to the report, "A cumulative  amount of Rs 1,78,694.75 has been transferred using DBT for 138 schemes  under 27 ministries since 2013. Various financial frameworks like  Aadhaar Payments Bridge (APB) and Aadhaar Enabled Payment Systems (AePS)  have been built by National Payment Corporation of India to support DBT  and also to allow individuals use Aadhaar for payments."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Given  that such systems are in place to ensure easier and accessible banking,  research shows that the Aadhaar seeding process led to government  portals putting personal information of so many people under various  schemes in the "absence of information security practices to handle so  much PII", as per the research. This is not only a breach of privacy but  also makes a person vulnerable to financial fraud in cases where their  bank details are public. "One of the prime examples is individuals  receiving phone calls from someone claiming to be from the bank. Aadhaar  data makes this process much easier for fraud and increases the risk  around transactions," the report reads.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;UIDAI on silent mode&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unfortunately,  UIDAI has not addressed this concern, let alone acknowledge it. It has  been cracking down on people by filing first information reports (FIRs)  against those tracking and exposing the vulnerabilities of the Aadhaar  system. Recently, UIDAI’s Chief Executive Officer (CEO), ABP Pandey was  accused of blocking twitter handles of prominent security researchers  and analysts who have been extensively reporting about vulnerabilities  in the Aadhaar system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of the handles was blocked was Saraph’s. “I do not know why they  blocked me. I have been vocal about the problems associated with the UID  and its use,” he said&lt;i&gt;. &lt;/i&gt;He added that he served several &lt;a href="http://www.moneylife.in/article/resisting-violations-of-the-supreme-court-orders-on-aadhaar/49121.html," target="_blank"&gt;notices&lt;/a&gt; of  contempt of court to the CEO of UIDAI and has been questioning the  verification and audit of UID database. “Perhaps [he] was annoyed with  my efforts to make them accountable and responsible,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On  April 18, however, in a response to Right to Information (RTI) query  filed by Sushil Kambampati, UIDAI denied having blocked any twitter  handles. Almost immediately, it was called out on twitter for ‘lying’ in  the RTI response as many users claimed it had.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Saraph declared that such a move, the blocking of users asking  questions, was indicative of UIDAI’s cluelessness. Apar Gupta, a  Delhi-based lawyer working on cyber security, had told &lt;i&gt;Newslaundry &lt;/i&gt;that  it was unethical and unconstitutional of government bodies (such as the  UIDAI) to block people. He reiterated that in one of his tweets  recently.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Today, however, the Pandey’s individual twitter profile no longer  exists. It has now been changed to “ceo_office”. CIS’s report states  that the UIDAI has been pushing for more databases to get in sync with  Aadhaar, but with little or no accountability. “While the UIDAI has been  involved in proactively pushing for other databases to get seeded with  Aadhaar numbers, they take a little responsibility in ensuring the  security and privacy of such data,” the report reads. Kodali, however,  told &lt;i&gt;Newslaundry &lt;/i&gt;that the report was not aimed at questioning the  security of such seeding. “We’re not saying it is not really secure but  we’re just saying it increases the risk factors,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;UIDAI has also not responded to several queries filed by vulnerability testers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Newslaundry &lt;/i&gt;reached out to the UIDAI with the following questions:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;p&gt; &lt;/p&gt;
&lt;li&gt;&lt;i&gt; According to the report published, four government portals have  personally identifiable information of about 13 crore people including  their Aadhaar numbers and bank account details. What is being done about  this?&lt;/i&gt;&lt;/li&gt;
&lt;p&gt; &lt;/p&gt;
&lt;li&gt;&lt;i&gt; If a person's privacy has been breached, what are the steps UIDAI would take for redressal?&lt;/i&gt;&lt;/li&gt;
&lt;p&gt; &lt;/p&gt;
&lt;li&gt;&lt;i&gt; Is UIDAI investigating the 13 crore Aadhaar leaks?&lt;/i&gt;&lt;/li&gt;
&lt;p&gt; &lt;/p&gt;
&lt;li&gt;&lt;i&gt; The report states "When one of the url query parameters of website  showing the masked personal details was modified from “nologin” to  “login”, that is control access to login based pages were allowed  providing unmasked details without the need for a password." Is this  true, and if so, what is your statement?&lt;/i&gt;&lt;/li&gt;
&lt;p&gt; &lt;/p&gt;
&lt;li&gt;&lt;i&gt; How do you ensure data security on open data portals?&lt;/i&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;This piece will be updated if and when they respond.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While  UIDAI remains silent, A-G Rohatgi argued today that close to 10 lakh  PAN cards were found to be fake. "Are they propagating a general public  interest or propagating the fraud (fake PANs) which is going in," he  said at the court today while suggesting that Aadhaar was the only way  of preventing fake or duplicate cards.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Senior advocate Arvind  Datar, who is also appearing for one of the three petitioners in the  case said that the government could not take away his right to chose  whether or nor to have an Aadhaar. "The Supreme Court had directed them  that they cannot make it mandatory. The mandate of the Supreme Court can  not be undone. My right of not to have an Aadhaar can not be taken away  indirectly."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though there are problems with the Aadhaar system  and apparently very little redressal at the citizen’s end, Aadhaar is  here to stay. As Divan and Rohatgi argue the constitutionality of making  Aadhaar mandatory at the Supreme Court, the pertinent question that  only the UIDAI can answer is whether they are technologically capable of  keeping data secure given how aggressively Aadhaar linkage is being  promoted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, Rohatgi's argument in court today, according to  a Business Standard report was that the government cannot destroy the  Aadhaar cards of people even after their death. Instead of being  reassuring, this only seems to increase the possibilities for identity  theft, as if there is little in the way of redressal mechanisms in life,  what choices do the dead have?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The author can be contacted on Twitter &lt;a href="https://twitter.com/shrutimenon10" target="_blank"&gt;@shrutimenon10&lt;/a&gt;.&lt;/b&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/newslaundry-shruti-menon-may-2-2017-uidai-remains-silent-on-aadhaar-leaks-of-users-through-govt-portals'&gt;https://cis-india.org/internet-governance/news/newslaundry-shruti-menon-may-2-2017-uidai-remains-silent-on-aadhaar-leaks-of-users-through-govt-portals&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-05-20T11:06:16Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/financial-express-may-19-2017-pti-uidai-puts-posers-to-cis-over-aadhaar-data-leak-claim">
    <title>UIDAI puts posers to CIS over Aadhaar data leak claim</title>
    <link>https://cis-india.org/internet-governance/news/financial-express-may-19-2017-pti-uidai-puts-posers-to-cis-over-aadhaar-data-leak-claim</link>
    <description>
        &lt;b&gt;Aadhaar-issuing authority UIDAI has asked research firm Centre for Internet and Society (CIS) to explain its sensational claim that 13 crore Aadhaar numbers were "leaked" and provide details of servers where they are stored.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article originally published by PTI was also &lt;a class="external-link" href="http://www.financialexpress.com/economy/uidai-puts-posers-to-cis-over-aadhaar-data-leak-claim/675814/"&gt;published by the Financial Express&lt;/a&gt; on May 19, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Aadhaar-issuing authority UIDAI has asked research firm Centre for  Internet and Society (CIS) to explain its sensational claim that 13  crore Aadhaar numbers were “leaked” and provide details of servers where  they are stored. In a precursor to initiating a probe into the matter,  the Unique Identification Authority of India (UIDAI) also wants CIS to  clarify just how much of such “sensitive data” are still with it or  anyone else. The UIDAI — which has vehemently denied any breach of its  database — shot off a letter to CIS yesterday asking for the details,  including the servers where the downloaded “sensitive data” are residing  and information about usage or sharing of such data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Underscoring the importance of bringing to justice those involved in  “hacking such sensitive information”, the UIDAI sought CIS’ “assistance”  in this regard and has given it time till May 30 to revert on the  issue. “Your report mentions 13 crore people’s data have been leaked.  Please specify how much (of) this data have been downloaded by you or  are in your possession, or in the possession of any other persons that  you know,” the UIDAI said in its communication to CIS.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Interestingly, in what market watchers described as an apparent  flip-flop, CIS has now clarified that there was no leak’ or ‘breach’ of  Aadhaar numbers, but rather ‘public disclosure’. Meanwhile, the UIDAI  has quoted sections of the Information Technology Act, 2000, and the  Aadhaar Act to emphasise that violation of the clauses are punishable  with rigorous imprisonment of up to 10 years. “While your report  suggests that there is a need to strengthen IT security of the  government websites, it is also important that persons involved in  hacking such sensitive information are brought to justice for which your  assistance is required under the law,” it said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UIDAI has  also sought technical details on how access was gained for the National  Social Assistance Programme (NSAP) site — one of the four portals where  the alleged leak happened. When contacted, UIDAI CEO Ajay Bhushan Pandey  said, “We do not comment on individual matters.” The UIDAI has also  asked for details of systems that were involved in downloading and  storing of the sensitive data so that forensic examination of such  machines can be conducted to assess the quantum and extent of damage to  privacy of data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UIDAI letter comes after a CIS’ report early this month which  claimed that Aadhaar numbers and personal information of as many as 135  million Indians could have been leaked from four government portals due  to lack of IT security practices. “Based on the numbers available on the  websites looked at, estimated number of Aadhaar numbers leaked through  these four portals could be around 130-135 million,” the report had  said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, in a apparent course correction on May 16, a day before the  UIDAI’s letter went out — CIS updated its report and clarified that  although the term ‘leak’ was originally used 22 times in its report, it  is “best characterised as an illegal data disclosure or publication and  not a breach or a leak”. CIS has also claimed that some of its findings  were “misunderstood or misinterpreted” by the media, and that it never  suggested that the biometric database had been breached. “We completely  agree with both Dr Pandey (UIDAI CEO) and Sharma (Trai Chairman R S  Sharma) that CIDR (Aadhaar central repository) has not been breached,  nor is it suggested anywhere in the report,” CIS said in its latest  update.&lt;/p&gt;
&lt;div class="youmaylike" style="text-align: justify; "&gt;&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/financial-express-may-19-2017-pti-uidai-puts-posers-to-cis-over-aadhaar-data-leak-claim'&gt;https://cis-india.org/internet-governance/news/financial-express-may-19-2017-pti-uidai-puts-posers-to-cis-over-aadhaar-data-leak-claim&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UIDAI</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-05-19T09:28:33Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/economic-times-january-11-2018-uidai-introduces-new-two-layer-security-system-to-improve-aadhaar-privacy">
    <title>UIDAI introduces new two-layer security system to improve Aadhaar privacy</title>
    <link>https://cis-india.org/internet-governance/news/economic-times-january-11-2018-uidai-introduces-new-two-layer-security-system-to-improve-aadhaar-privacy</link>
    <description>
        &lt;b&gt;The Unique Identification Authority of India (UIDAI) has introduced a system of virtual authentication for citizens enrolled on its database and limited the access available to service providers in a move aimed at allaying widespread concern over security breaches that have dogged the world's largest repository of citizen data. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in &lt;a class="external-link" href="https://economictimes.indiatimes.com/news/economy/policy/uidai-introduces-new-two-layer-security-system-to-improve-aadhaar-privacy/articleshow/62442873.cms"&gt;Economic Times&lt;/a&gt; on January 11, 2018.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;In one of the most significant security upgrades by the eightyear old agency, the UIDAI announced the creation of a "virtual ID" which can be used in lieu of the 12-digit Aadhaar number at the time of authentication for any service.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UIDAI has also limited access to stored personal information and mandated the use of unique tokens through which authenticating agencies can access required data. It claims that the measures will strengthen privacy and also prevent combining of databases linked to Aadhaar.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ET was the first to report about the UIDAI plan to introduce virtual numbers to address security concerns in its November 20 edition last year.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A top government official told ET that UIDAI has been working on this technology since July of 2016. "This is going to be one of the biggest innovations ever, people can change their virtual ID whenever they want or after every authentication or every 10 seconds." He added that this will silence most critics of Aadhaar.&lt;/p&gt;
&lt;div id="_mcePaste" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p id="_mcePaste" style="text-align: justify; "&gt;"The Aadhaar number being the permanent ID for life, there is need to provide a mechanism to ensure its continued use while optimally protecting the collection and storage in many databases," the UIDAI said in a notification on Wednesday while announcing the new measures.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;More Needed to be Done: Experts&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;"The collection and storage of Aadhaar number by various entities has heightened privacy concerns," it stated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under the new regime, for every Aadhaar number, the authority will issue a 16-digit virtual identity number which will be "temporary and revocable at any time."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This virtual ID can be generated only by the individual Aadhaar holder and can be replaced by a new one after a minimum validity period.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition, while some Authentication User Agencies (AUA) — categorised by the UIDAI as 'Global' — will have access to all the details or the e-KYC of a specific Aadhaar number, all other agencies will only have access to limited data through the virtual identity number.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"So this is a very very significant thing and I think this is a great step forward," said Nandan Nilekani, former chairman of UIDAI, in an interview to television channel ET Now on Wednesday.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nilekani, widely regarded as the architect of Aadhaar, said that through these new security measures the possibility of the Aadhaar number being stored in many databases also goes away.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It will make a huge difference in allaying the concerns and it really "eliminates all the arguments against Aadhaar," he told ET Now.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Last week, Chandigarh-based daily The Tribune reported that demographic data from the Aadhaar database could be accessed for as little as Rs 500. The expose led to the UIDAI barring over 5,000 officials from accessing its portal through login ids and passwords. It also introduced biometric authentication for future access, as reported by ET on Tuesday.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The widespread fear of misuse of demographic data is heightened by the fact that India still does not have a data protection legislation. The country's apex court is scheduled to resume its hearing on the validity of the Aadhaar scheme next week on January 17.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Kamlesh Bajaj, former CEO of the Data Security Council of India said by limiting access to only those agencies mandated by law, the UIDAI has ensured that "someone will not be able to combine database. It's a positive development in my view and technologically feasible," he said&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Expert Views&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Privacy experts and activists were of the view that more needs to be done to ensure foolproof security for critical personal information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Bengaluru-based research organisation Centre for Internet and Society has suggested that all the Aadhaar seeding with all the existing databases should be revoked. "Until then, it is one step ahead and but not enough," said Sunil Abraham, executive director of CIS.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To enable a speedy rollout of the new safety standards, the UIDAI plans to release the required technical updates by March 1, 2018 and all the Authentication agencies using the Aadhaar database will need to upgrade their systems latest by June 1, 2018.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In its circular, UIDAI has also said that agencies not allowed to use or store the Aadhaar number should make changes inside their systems to replace Aadhaar number within their databases with UID Token.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Unless there is complete revocation, some database with Aadhaar numbers will still float around and secondly there is no reason why some data controllers should be trusted, the tokenisation should be implemented for everyone," said CIS's Abraham.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The circular said that authentication using virtual ID will be performed in the same manner as the Aadhaar number and people can generate or retrieve their virtual numbers (in case they forget) at the UIDAI's resident portal, Aadhaar Enrolment Centers, or through the Aadhaar mobile application.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition to the virtual numbers, UIDAI will also provide "unique tokens" to each agency against an Aadhaar number to ensure that they are to establish the uniqueness of beneficiaries in their database such as for distributing government subsidies under cooking gas or scholarships.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Activists argue that most service providers — even digital ones — work with a paper ID card system. "They don't cross-check it with the UIDAI database. UIDAI is not issuing virtual ids for paper cards, and a new category of so called Global AUAs are exempted from using the virtual ids, so citizens are not protected almost anywhere that they need to use Aadhaar," said Kiran Jonnalagadda, co-founder of the Internet Freedom Foundation, who said the change doesn't help enough to secure the ecosystem.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/economic-times-january-11-2018-uidai-introduces-new-two-layer-security-system-to-improve-aadhaar-privacy'&gt;https://cis-india.org/internet-governance/news/economic-times-january-11-2018-uidai-introduces-new-two-layer-security-system-to-improve-aadhaar-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-01-16T23:08:34Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/medianama-nikhil-pahwa-may-19-2017-uidai-cis-india-aadhaar">
    <title>UIDAI goes after org that disclosed government departments were releasing Aadhaar data</title>
    <link>https://cis-india.org/internet-governance/news/medianama-nikhil-pahwa-may-19-2017-uidai-cis-india-aadhaar</link>
    <description>
        &lt;b&gt;If there was ever a case of shoot the messenger, it is this. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post by Nikhil Pahwa was published by &lt;a class="external-link" href="http://www.medianama.com/2017/05/223-uidai-cis-india-aadhaar/"&gt;Medianama&lt;/a&gt; on May 19, 2017. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The UIDAI, the body which runs the Aadhaar project in India, has written to the Centre for Internet &amp;amp; Society suggesting that &lt;a href="http://www.medianama.com/2017/05/223-aadhaar-numbers-data-leak/"&gt;their disclosure of the fact that the data of 130 million Aadhaar users is being publicly disclosed on the Internet&lt;/a&gt; is owed to a hack-attack, &lt;a href="http://timesofindia.indiatimes.com/india/provide-hacker-details-outfit-that-claimed-data-leak-told/articleshow/58725132.cms?from=mdr" rel="noopener noreferrer"&gt;reports the Times of India&lt;/a&gt;.  On being contacted by MediaNama, Pranesh Prakash, Policy Director at  CIS told MediaNama that “We are waiting for an official copy of the  letter, and once we receive it we will decide on our future course of  action.” The UIDAI told MediaNama that they’ll get back to us, and  declined to share a copy of the letter with MediaNama.&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.medianama.com/2017/05/223-uidai-cis-india-aadhaar/"&gt;Read the full story on Medianama&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/medianama-nikhil-pahwa-may-19-2017-uidai-cis-india-aadhaar'&gt;https://cis-india.org/internet-governance/news/medianama-nikhil-pahwa-may-19-2017-uidai-cis-india-aadhaar&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Nikhil Pahwa</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UIDAI</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-05-20T10:46:36Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/livemint-komal-gupta-january-7-2018-uidai-denies-any-breach-of-aadhaar-database">
    <title>UIDAI denies any breach of Aadhaar database</title>
    <link>https://cis-india.org/internet-governance/news/livemint-komal-gupta-january-7-2018-uidai-denies-any-breach-of-aadhaar-database</link>
    <description>
        &lt;b&gt;Personal data, including biometric information, of citizens safe and secure, says UIDAI on Aadhaar data breach.
&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Komal Gupta was published by &lt;a class="external-link" href="http://www.livemint.com/Politics/bw5gRWcZoFYOjixGVVSqiP/UIDAI-says-Aadhaar-misuse-traceable-system-secure.html"&gt;Livemint&lt;/a&gt; on January 7, 2018&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The Unique Identification Authority of India (UIDAI) on Thursday clarified that there has not been any breach in the Aadhaar database and the personal data of citizens, including biometric information, is safe and secure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The clarification comes in response to a news report titled ‘Rs 500, 10 minutes, and you have access to a billion Aadhaar details’ published in The Tribune on Thursday. The report claims that a WhatsApp group sold all Aadhaar data available with UIDAI for a sum of Rs. 500.&lt;/p&gt;
&lt;p id="_mcePaste" style="text-align: justify; "&gt;UIDAI maintained that the reported case appeared to be an instance of misuse of the grievance redressal search facility. As UIDAI maintains complete logs and traceability of the facility, legal action including lodging of FIR against the persons involved in the case is being undertaken.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;div id="_mcePaste" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;UIDAI maintained that the reported case appeared to be an instance of misuse of the grievance redressal search facility. As UIDAI maintains complete logs and traceability of the facility, legal action including lodging of FIR against the persons involved in the case is being undertaken. UIDAI maintained that the reported case appeared to be an instance of misuse of the grievance redressal search facility. As UIDAI maintains complete logs and traceability of the facility, legal action including lodging of FIR against the persons involved in the case is being undertaken. UIDAI clarified in a press statement that displayed demographic information cannot be misused; it would need to be paired with an individual’s biometrics.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are more than 1.19 billion Aadhaar card holders in the country.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;“If it is not a data breach, then this means that some people who have legitimate access to the data are selling it illegitimately. This poses a greater problem,” said Pranesh Prakash, policy director at the Centre for Internet and Society, a Bengaluru-based think tank.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/livemint-komal-gupta-january-7-2018-uidai-denies-any-breach-of-aadhaar-database'&gt;https://cis-india.org/internet-governance/news/livemint-komal-gupta-january-7-2018-uidai-denies-any-breach-of-aadhaar-database&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-01-07T12:03:13Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
