<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 81 to 95.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/global-voices-rohith-jyothish-may-31-2017-online-troll-attack-critics-of-indias-aadhaar-state-id-system"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/national-herald-sebastian-pt-april-26-2017-now-aadhaar-details-displayed-in-mizoram-too"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-news-minute-june-4-2021-sreedevi-jayarajan-no-such-rule-but-many-vaccination-centres-are-insisting-on-aadhaar-as-proof"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-guardian-march-21-2017-no-id-no-benefits"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/outlook-arindam-mukherjee-february-20-2017-no-genie-at-your-fingertips"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/livemint-june-2-2017-komal-gupta-new-rules-for-govt-agencies-to-ensure-security-of-personal-data"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/financial-express-october-17-2016-new-regulations-in-place-aadhaar-card-records-to-be-preserved-for-7-yrs-by-centre"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-hindu-yuthika-bhargava-june-9-2017-new-law-to-unlock-data-economy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/digital-policy-portal-july-13-2016-new-approaches-to-information-privacy-revisiting-the-purpose-limitation-principle"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/bloomberg-quint-murali-neelakantan-swaraj-barooah-swagam-dasgupta-torsha-sarkar-august-14-2018-national-health-stack-data-for-datas-sake-a-manmade-health-hazard"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/first-post-march-16-nimish-sawant-nasscom-chief-saying-full-data-protection-isnt-possible-should-wake-us-from-our-digital-slumber"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/hindustan-times-neelam-pandey-aloke-tikku-july-15-2016-mandatory-aadhaar-card-for-govt-scholarships-violates-sc-order"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/ndtv-march-20-2016-making-aadhaar-mandatory-gamechanger-for-governance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-hindu-march-17-2015-aadhaar-an-identity-crisis"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/list-of-recommendations-on-the-aadhaar-bill-2016"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/global-voices-rohith-jyothish-may-31-2017-online-troll-attack-critics-of-indias-aadhaar-state-id-system">
    <title>Online Trolls Attack Critics of India's Aadhaar State ID System </title>
    <link>https://cis-india.org/internet-governance/news/global-voices-rohith-jyothish-may-31-2017-online-troll-attack-critics-of-indias-aadhaar-state-id-system</link>
    <description>
        &lt;b&gt;India's biometric state ID system has been leaking citizens’ data for months. When this information surfaced in April 2017, it stoked fears that the system could be used as an instrument of surveillance against Indian residents.&lt;/b&gt;
        &lt;p&gt;The blog post by Rohith Jyothish was &lt;a class="external-link" href="https://advox.globalvoices.org/2017/05/31/online-trolls-attack-critics-of-indias-aadhaar-state-id-system/"&gt;published by Global Voices&lt;/a&gt; on May 31, 2017.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The &lt;a href="https://uidai.gov.in/about-uidai/about-uidai.html"&gt;Unique Identity Authority of India (UIDAI)&lt;/a&gt;, which administrates the system known as &lt;a href="https://en.wikipedia.org/wiki/Aadhaar"&gt;Aadhaar&lt;/a&gt; (meaning foundation in Hindi) &lt;a href="http://indianexpress.com/article/opinion/columns/criticism-without-aadhaar-4653369/v"&gt;maintains&lt;/a&gt; that it only collects minimal personal data and stores it securely. But critics have firmly expressed &lt;a href="https://advox.globalvoices.org/2017/05/05/is-indias-aadhaar-system-an-instrument-for-surveillance/"&gt;doubts&lt;/a&gt; about these claims.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The implications of these leaks, and of any system flaw in Aadhaar  technology, are substantial, especially for Indians who depend on the  Aadhaar system in order to authenticate their identities when they use  any number of government services. The Aadhaar system has become the &lt;a href="https://globalvoices.org/2017/05/02/the-worlds-largest-biometric-database-is-leaking-indian-citizens-data-but-keeps-on-growing/"&gt;gatekeeper of state systems&lt;/a&gt; and services ranging from voting to financial savings to food subsidies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The digital sphere is now starting to see a pushback against Aadhaar  critics through articles and blogposts that describe concerned citizens  and privacy experts as the ‘&lt;a href="https://yourstory.com/2017/05/5-questions-for-the-anti-aadhaar-brigade/"&gt;anti-Aadhaar brigade&lt;/a&gt;‘ and &lt;a href="https://yourstory.com/2017/05/aadhaar-debate-5-more-questions-for-critics/"&gt;accuse them&lt;/a&gt; of publishing “half-truths” and “spread[ing] confusion to advance their own interests.” One such &lt;a href="https://uidai.gov.in/images/news/5_questions_for_the_anti_Aadhaar_brigade_08052017.pdf"&gt;article&lt;/a&gt; was even featured on the UIDAI website.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some of the most &lt;a href="http://cis-india.org/internet-governance/information-security-practices-of-aadhaar-or-lack-thereof-a-documentation-of-public-availability-of-aadhaar-numbers-with-sensitive-personal-financial-information-1"&gt;well-researched critiques&lt;/a&gt; of the system have come from the &lt;a href="http://cis-india.org/"&gt;Centre for Internet and Society&lt;/a&gt; (CIS), an inter-disciplinary research organisation in Bangalore that  has now become a target of the pro-Aadhaar lobby. Shortly after CIS  released a report that pointed out security flaws in the Aadhaar  ecosystem, the UIDAI &lt;a href="http://timesofindia.indiatimes.com/india/provide-hacker-details-outfit-that-claimed-data-leak-told/articleshow/58725132.cms"&gt;accused&lt;/a&gt; the organization of hacking into the Aadhaar system themselves.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In fact, CIS had investigated databases of four specific government websites. Three were available publicly, the fourth one was &lt;a href="https://thewire.in/131698/before-aadhaar-pan-card-verdict-debate-over-bodily-autonomy-and-living-a-dignified-life/"&gt;accessible&lt;/a&gt; by simply changing one of the URL parameters. Following the accusation from UIDAI, CIS &lt;a href="http://tech.firstpost.com/news-analysis/uidais-questioning-of-cis-over-aadhaar-leaks-brings-the-sanctity-of-investigative-activities-into-question-377244.html"&gt;clarified&lt;/a&gt; that  the Aadhaar numbers along with other sensitive personal financial  information like bank account details were made available by government  websites themselves, putting a sizeable portion of Indian citizens at  risk of financial fraud.&lt;/p&gt;
&lt;p&gt;The &lt;a href="https://en.wikipedia.org/wiki/Press_Trust_of_India"&gt;Press Trust of India&lt;/a&gt; (India's largest news agency) &lt;a href="http://www.thehindubusinessline.com/news/national/unique-identification-authority-of-india-puts-posers-to-centre-for-internet-and-society-over-aadhaar-data-leak-claim/article9707647.ece"&gt;referred&lt;/a&gt; to it as a “flip-flop”, which was contested by researchers at CIS.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Independent technology news platform Medianama &lt;a href="http://www.medianama.com/2017/05/223-uidai-cis-india-aadhaar/"&gt;reported&lt;/a&gt; that the accusation by the UIDAI is regrettably consistent with  previous actions in which they filed a case against a journalist for&lt;a href="http://www.medianama.com/2017/03/223-uidai-fir-aadhaar/" rel="bookmark" title="UIDAI files FIR against journalist for exposing flaws in Aadhaar enrolment"&gt; exposing flaws&lt;/a&gt; in Aadhaar's enrollment mechanism.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A website called ‘&lt;a href="http://supportaadhaar.com/"&gt;Support Aadhaar&lt;/a&gt;‘ and its &lt;a href="https://twitter.com/SupportAadhaar"&gt;Twitter handle&lt;/a&gt; sought to collate opinions supporting Aadhaar and quell those speaking against it. However, most of their &lt;a href="http://supportaadhaar.com/facts-myths/"&gt;messages&lt;/a&gt; appear  to evade or deflect the concerns that critics have raised by touting  the benefits of the system and portraying critics as having a poor  understanding of the benefits of technology.&lt;/p&gt;
&lt;p&gt;Many Twitter users have also begun noticing patterns in the pro-Aadhaar posts:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Meanwhile, several critics of Aadhaar have repeatedly been trolled by anonymous handles on Twitter. These ‘sock puppet’ accounts seemed to be targeting those who criticise Aadhaar on social media.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of the most active trolls issued an open challenge to reveal their identity with just their Aadhaar number. Technology entrepreneur Kiran Jonnalagadda accepted the challenge and &lt;a href="https://medium.com/@jackerhack/inside-the-mind-of-indias-chief-tech-stack-evangelist-ca01e7a507a9"&gt;found that&lt;/a&gt; ‘@Confident_India’, one of the many anonymous troll Twitter handles, is Sharad Sharma, the co-founder and director of &lt;a href="http://ispirt.in/"&gt;iSPIRT Foundation&lt;/a&gt; (Indian Software Product Industry Roundtable), the software lobby that built the backbone of the Aadhaar ecosystem.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sharma accidentally tweeted a denial from the troll account which has  since been deleted. He then tweeted again from his personal handle which  was captured.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;iSPIRT &lt;a href="https://medium.com/@mtrajan/ispirt-response-to-kiran-jonnalagadda-3f977fb91df4"&gt;officially denied&lt;/a&gt; allegations  by Jonnalgadda that the “evidence presented is a deliberate misreading  of our intent to engage with those speaking against &lt;a href="https://en.wikipedia.org/wiki/India_Stack"&gt;India Stack&lt;/a&gt;.” India Stack is the digital infrastructure that has been built over Aadhaar.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But several other Twitter users have confirmed that Sharma's phone number is linked to ‘@Confident_India’. By their own admission, iSPIRT seemed to have an &lt;a href="https://thewire.in/137371/aadhaar-ispirt-trolling-sharad-sharma/"&gt;officially sanctioned project&lt;/a&gt; intended  to systematically challenge anti-Aadhaar campaigners in online  platforms. But they refuse to term these actions as “trolling”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, Sharma later &lt;a href="https://thewire.in/139188/sharad-sharma-aadhaar-trolling/"&gt;made an apology for trolling&lt;/a&gt; and called it a “lapse of judgement”. CIS Executive Director Sunil Abraham seemed to appreciate the message. He tweeted: Bravo to &lt;a class="h-card customisable profile PrettyLink" dir="ltr" href="https://twitter.com/sharads"&gt;&lt;span class="PrettyLink-prefix"&gt;@&lt;/span&gt;&lt;span class="PrettyLink-value"&gt;sharads&lt;/span&gt;&lt;/a&gt; for this! All of us at &lt;a class="h-card customisable profile PrettyLink" dir="ltr" href="https://twitter.com/cis_india"&gt;&lt;span class="PrettyLink-prefix"&gt;@&lt;/span&gt;&lt;span class="PrettyLink-value"&gt;cis_india&lt;/span&gt;&lt;/a&gt; look fwd to collaborating with &lt;a class="h-card customisable profile PrettyLink" dir="ltr" href="https://twitter.com/Product_Nation"&gt;&lt;span class="PrettyLink-prefix"&gt;@&lt;/span&gt;&lt;span class="PrettyLink-value"&gt;Product_Nation&lt;/span&gt;&lt;/a&gt; &amp;amp; &lt;a class="h-card customisable profile PrettyLink" dir="ltr" href="https://twitter.com/sharads"&gt;&lt;span class="PrettyLink-prefix"&gt;@&lt;/span&gt;&lt;span class="PrettyLink-value"&gt;sharads&lt;/span&gt;&lt;/a&gt; to serve Indian s/w sector. &lt;a class="customisable link" dir="ltr" href="https://t.co/TEz0fxnloo" rel="nofollow noopener" target="_blank" title="https://twitter.com/sharads/status/866943195678035968"&gt;&lt;span class="u-hiddenVisually"&gt;https://&lt;/span&gt;twitter.com/sharads/status&lt;span class="u-hiddenVisually"&gt;/866943195678035968 &lt;/span&gt;…&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;iSPIRT is an initiative which finds far-reaching support from several IT  industry leaders in India. What is worrying is that there is still no  clarification from iSPIRT on the identities of the other anonymous  trolls and their position on trolling against genuine concerns raised by  citizens.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;More than a week after the trolling revelations, iSPIRT announced on its website, the results of an investigation carried out by an Internal Guidelines and Compliance Committee over the allegations against Sharma of operating the anonymous handles, ‘@Confident_India’ and ‘@Indiaforward2′. Jonnalgadda was one of the trolling victims who testified in the internal meeting. A summary of the investigation was posted bafflingly by the accused himself in which he says that project Sudham has been dissolved and that he has been told to not make public appearances on behalf of iSPIRT for four months while he remains Director and the face of the organisation. FactorDaily reported that iSPIRT members on the condition of anonymity said that Pallav Nadhani (Founder, Chief Executive, FusionCharts) and Naveen Tewari (Co-founder, InMobi) who quit iSPIRT were upset with their excessive focus on India Stack.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One wonders whether this kind of behavior would be treated differently if it took place offline. Is intimidating those who appear to be ‘detractors’ the most effective way of dealing with criticism? Why is a software lobby taking it upon themselves to defend the idea of Aadhaar and India Stack through such means?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Many are hoping that experts on both sides of the issue can find a way to debate questions around the privacy and security of Aadhaar's technology — that affect some 1.3 billion people — in a more democratic way.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/global-voices-rohith-jyothish-may-31-2017-online-troll-attack-critics-of-indias-aadhaar-state-id-system'&gt;https://cis-india.org/internet-governance/news/global-voices-rohith-jyothish-may-31-2017-online-troll-attack-critics-of-indias-aadhaar-state-id-system&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-06-07T13:34:00Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/national-herald-sebastian-pt-april-26-2017-now-aadhaar-details-displayed-in-mizoram-too">
    <title>Now, Aadhaar details displayed in Mizoram too</title>
    <link>https://cis-india.org/internet-governance/news/national-herald-sebastian-pt-april-26-2017-now-aadhaar-details-displayed-in-mizoram-too</link>
    <description>
        &lt;b&gt;Contrary to the Centre’s assurances, government websites are revealing digital details of the poor, leaving them vulnerable to financial frauds and identity theft.&lt;/b&gt;
        &lt;p&gt;The article by Sebastian PT was &lt;a class="external-link" href="https://www.nationalheraldindia.com/news/2017/04/26/aadhaar-details-displayed-in-mizoram-jharkhand-chandigarh-financial-fraud-violating-supreme-court-order"&gt;published in the National Herald&lt;/a&gt; on April 26, 2017. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Could there be a method to the madness? Or is it just carelessness? From the Jharkhand Government to the Union Territory of Chandigarh to the Union Ministry of Water and Sanitation to even Mizoram’s Food and Civil Supplies Department, government websites are found to have displayed Aadhaar details of citizens, a crime under the law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In Jharkhand, details of 16 lakh beneficiaries – their bank account details, ration card and the 12-digit Aadhaar number – were displayed on the website of the Directorate of Social Security. Similar blunders were witnessed from different corners of the country from Chandigarh to Kerala, where details of 35 lakh people have been breached. This flies in the face of the Government’s repeated claims on data privacy, that Aadhaar details are completely safe.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The law doesn’t allow this. The displaying of the Aadhaar data, for instance, is in clear violation of Section 29 of the Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Act, 2016. The provision clearly says that “no” Aadhaar number or core biometric information of an Aadhaar number holder shall be “published, displayed or posted publicly”.&lt;br /&gt;&lt;br /&gt;“There appears to be no regulation worth the name as far as the Aadhaar project is concerned,” says economist Reetika Khera from IIT Delhi.&lt;br /&gt;&lt;br /&gt;So, will these officials responsible be punished according to the Act? More importantly, what about the damage of leaking such sensitive, apparently confidential data?&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Irreparable Damage&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Several cyber security experts have been warning of the possibility of precisely such leaks and Opposition parties were vociferously pointing this out while the Centre was brazenly violating the Supreme Court’s orders and forcibly extending Aadhaar to almost everything – including it being linked to one’s Permanent Account Number (PAN), used for filing income tax.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“What has been broken through technology, can’t be fixed with the law,” says Sunil Abraham, Executive Director of Bangalore-based research organisation, the Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The data breach just made it easy for players in the black market for ID (identification) documents to be lapped up to create false ID cards, for instance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When demonetisation was being implemented, sources say that black money hoarders apparently bought fake IDs which were made from stolen Aadhaar details to get the old notes exchanged – one way for doing this was perhaps by opening new bank accounts or to, say, utilise unused Jan Dhan accounts to deposit the money. Now, one can only imagine what terrorists can do with these details.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So far, perhaps, the only solace is that the biometric details of the beneficiaries weren’t leaked. But, in the backdrop of the lax attitude of the various government departments, even that too is just waiting to happen, fear experts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Abraham warns that Aadhaar was always a risky proposition as it was based on biometrics, which “made it very insecure”. He terms it as a “mass surveillance technology” – that too a poorly-designed technology – which, in fact, “undermines security”. Once biometric data are compromised, it cannot be secured again. Instead of biometrics, he suggests the UIDAI shift to using smart cards.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The unfettered forcible linking of almost everything – from bank accounts to one’s PAN card – to Aadhaar only makes things worse. “The Centre is ‘seeding’ the various data bases with the Aadhaar number, which is a very bad move. And, involving various private and public agencies in this only makes the entire thing very precarious,” warns Abraham. He points out that, for instance, when the PAN cards are linked with the Aadhaar number, breach made possible.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Instead, he says, the government should adopt the ‘tokenisation approach’, instead of the ‘seeding approach’. What this means is that, say, if the PAN card is to be linked to Aadhaar, then UIDAI issues a token number and not the original 12-digit Aadhaar number. So, even if a breach happens, the hacker will not be able to get all the Aadhaar details, he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, the government does not seem to be taking the issue of privacy very seriously. What perhaps is not being understood is that this is not just a privacy issue, but making the masses vulnerable to frauds. Instead of treading cautiously in implementing Aadhaar, the government seems to be in a hurry to extend it to almost every possible silo in an individual’s life.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Given the callous attitude of central and state governments, I hope that the Supreme Court will stop the government from a forced linking of Aadhaar, on the one hand, and bank accounts and PAN numbers on the other hand,” says Khera.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/national-herald-sebastian-pt-april-26-2017-now-aadhaar-details-displayed-in-mizoram-too'&gt;https://cis-india.org/internet-governance/news/national-herald-sebastian-pt-april-26-2017-now-aadhaar-details-displayed-in-mizoram-too&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-04-27T16:59:37Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-news-minute-june-4-2021-sreedevi-jayarajan-no-such-rule-but-many-vaccination-centres-are-insisting-on-aadhaar-as-proof">
    <title>No such rule, but many vaccination centres are insisting on Aadhaar as proof</title>
    <link>https://cis-india.org/internet-governance/news/the-news-minute-june-4-2021-sreedevi-jayarajan-no-such-rule-but-many-vaccination-centres-are-insisting-on-aadhaar-as-proof</link>
    <description>
        &lt;b&gt;Radhika Radhakrishnan saw three words swimming before her as she inched closer to the hospital lobby. &lt;/b&gt;
        &lt;p&gt;The blog post by Sreedevi Jayarajan was &lt;a class="external-link" href="https://www.thenewsminute.com/article/no-such-rule-many-vaccination-centres-are-insisting-aadhaar-proof-covid150080"&gt;published in the News Minute&lt;/a&gt; on June 4, 2021. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The words were written on a white board inside the private hospital she had visited in Bengaluru on May 21, three weeks after the Union Government opened up COVID-19 vaccinations for the 18+ category after online registration. “I had booked a vaccine slot and visited the hospital and the words on the board read ‘Aadhaar is mandatory’, along with other dos and don’ts of the vaccination process that the hospital followed,” she tells TNM. On the morning of her vaccination date, Radhika had registered on the Union Health Ministry’s CoWin portal for a vaccine slot in the 18+ age group. She had given her PAN number when the portal asked for a government ID proof. The appointment slip on CoWin also showed her PAN, she says.&lt;/p&gt;
&lt;p class="_yeti_done" style="text-align: justify; "&gt;But on the day of vaccination, authorities at the private hospital refused to accept her PAN card. Radhika says that they insisted on her Aadhaar number in order to authenticate her vaccination appointment, despite her telling them that it is illegal to demand her Aadhar card. “The hospital authorities told me that they only used Aadhaar cards to register people for vaccination or authenticate CoWin appointments. They said that if I did not want to give my Aadhaar number, I would have to wait a few more hours for them to figure out a different process,” she tells TNM. By this time, Radhika had already waited three hours in the hospital queue.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Bengaluru-based journalist Biswak* too recounts a similar experience at a government run vaccination centre he had visited on May 5. The 25-year-old had registered on CoWin using his Driving License, one of five government ID proofs that the Health Ministry portal accepts for booking vaccination slots. But at the centre, Biswak says that the officials insisted on his Aadhaar number. “Thankfully I had the number despite not carrying my card. I got vaccinated and the vaccination certificate issued on my CoWin account showed the last four digits of my Aadhaar, and did not mention my driving license which was my ID proof of choice,” he says.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;TNM got in touch with several people from Tamil Nadu and Karnataka among other states who confirmed that their vaccination centres refused to accept any other ID proof, and insisted on Aadhaar. This despite the Union government not making Aadhaar mandatory for CoWin registration, for on-the-spot registrations, and even for authentication of appointments at vaccination centres.&lt;/p&gt;
&lt;h3 id="_mcePaste"&gt;Co-Win does not insist on Aadhaar&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A quick look at the CoWin portal will tell you that you can register with any of six government ID proofs other than your Aadhaar card. These are Driving License, PAN card, Passport, Pension Passbook, NPR Smart Card and Voter ID (EPIC). To the vaccine centres, registered citizens should carry the very same ID proof they have used to register on the Co-Win portal, along with a printout or screenshot of their appointment slip. This means, if a person has registered on the portal using an Aadhaar card, the vaccination centre will ask for the same for authentication.&lt;/p&gt;
&lt;p dir="ltr"&gt;Once vaccinated, citizens get a certificate with their vaccination status (one dose or fully vaccinated) on their phones. This certificate contains the person’s name, age, type of vaccine (Covishield or Covaxin) and the last four digits of the ID proof used for registration.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;While Radhika and Biswak say that their appointment slips had their PAN and Driving License numbers respectively, after they were coerced to give their Aadhaar numbers, the vaccination certificate on the Co-Win portal showed their Aadhaar number. “This means that they have forced me to give my Aadhaar number and then used this, despite me giving a different ID proof,” Radhika says. Multiple private hospitals in Chennai too currently insist on Aadhaar card for vaccinations, while Tamil Nadu government maintains that Aadhaar is not mandatory.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;TNM spoke to a senior official in the Revenue and Finance Department of the Greater Chennai Corporation who confirmed that centres, both private and government, did not have the right to demand Aadhaar for vaccination. “There is no such rule that Aadhaar has to be submitted by citizens. In fact, the Co-Win portal also has a section to register those who have no ID proof, i.e homeless persons or those from marginalised sections. The portal finds another way to register these people. So insisting on an Aadhaar number is out of the question,” he says. In the neighbouring state of Kerala, the government recently announced that persons who had to travel abroad for various reasons should register on the government portal only using their passports. This, so that their vaccination certificate would generate their passport number as ID proof.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;A matter of convenience?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In the absence of a law which mandates Aadhaar to be used for the purpose of universal COVID-19 vaccination, there is no legal basis for hospitals and vaccination centres to insist on Aadhaar numbers to vaccinate people. “Unlike a law passed by the Union government which makes it compulsory for your PAN to be linked to your Aadhaar, there is no law which the government has passed to make Aadhaar compulsory for vaccination. The Union government does, however, have the legislative competence to pass such a law. Which means that if they want to make Aadhaar mandatory for vaccination, they can. So far they have not. And therefore, nobody has the right to demand Aadhaar to vaccinate people,” says Pranesh Prakash of the Centre for Internet and Society.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;However, it could be a matter of convenience for hospitals to use one type of ID proof, to be able to streamline their data entry process. “As (I believe) Aadhaar is the most widespread ID card in the country right now, when compared to other ID proofs, it makes it simple for vaccination centres to ask for Aadhaar numbers and key this in," Pranesh adds.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;To a query that TNM posted on Twitter, we got varied responses from people. While many said that the centres did not insist on a particular ID card, many others said they had to give their Aadhaar. The insistence for Aadhaar by vaccination centres, both private and government, seems to be random, with no proper pattern or rule in place.&lt;/p&gt;
&lt;h3&gt;System does not support other ID proofs?&lt;/h3&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;From Radhika’s experience, the hospital she visited for vaccination could not support any other ID proof, as they, in their own words “followed a system of using just Aadhaar cards”. This indirectly coerces unwilling citizens to part with their Aadhaar details, and offers no choice for those who registered with other ID proofs.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;“I had to finally give my Aadhaar number but it said that there was a mismatch. Later we found out that my name on my PAN was a bit different from the name on my Aadhaar card. Since I had used the PAN to register on Co-Win, the portal could not authenticate me with the Aadhaar number. Finally I had to re-register on the spot and give a different phone number as the phone number I had given was already linked to my Aadhaar and PAN,” she says, adding that all of this could have been avoided if the hospital had accepted her PAN in the first place.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, a private hospital that has been doing vaccinations in many places across India told TNM that they had no instructions from the state or Union government to use only Aadhaar and claimed that they only asked for Aadhaar if the person had used it during registration. However, many people who responded to TNM named this private hospital and many others too as those insisting on Aadhaar as proof.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-news-minute-june-4-2021-sreedevi-jayarajan-no-such-rule-but-many-vaccination-centres-are-insisting-on-aadhaar-as-proof'&gt;https://cis-india.org/internet-governance/news/the-news-minute-june-4-2021-sreedevi-jayarajan-no-such-rule-but-many-vaccination-centres-are-insisting-on-aadhaar-as-proof&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Sreedevi Jayarajan</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2021-06-26T04:43:13Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-guardian-march-21-2017-no-id-no-benefits">
    <title>No ID, no benefits: thousands could lose lifeline under India’s biometric scheme</title>
    <link>https://cis-india.org/internet-governance/news/the-guardian-march-21-2017-no-id-no-benefits</link>
    <description>
        &lt;b&gt;Controversial Aadhaar card restricts fundamental rights, argue critics, limiting access to free school meals and exposing 1 billion people to privacy risks.&lt;/b&gt;
        &lt;p&gt;The article was published in the &lt;a class="external-link" href="https://www.theguardian.com/global-development/2017/mar/21/no-id-no-benefits-thousands-could-lose-lifeline-india-biometric-scheme-aadhaar-card"&gt;Guardian&lt;/a&gt; on March 21, 2017. Sumandro Chattapadhyay was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img alt="An Aadhaar biometric identity card, which will be mandatory for Indians to access many essential government services and benefits." class="responsive-img maxed" src="https://i.guim.co.uk/img/media/cfb15b17bf824d857a561f3167b26793cb2e5583/0_136_4000_2400/master/4000.jpg?w=300&amp;amp;q=55&amp;amp;auto=format&amp;amp;usm=12&amp;amp;fit=max&amp;amp;s=5253b0eb088c65cfdc3b013302b0eb76" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span class="discreet"&gt;An Aadhaar biometric identity card, which will be mandatory for Indians  to access many essential government services and benefits. Photograph: Bloomberg/Getty Images&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Hundreds of thousands of people in &lt;a class="u-underline" href="https://www.theguardian.com/world/india"&gt;India&lt;/a&gt; could be left without essential government services and benefits –  including free school meals and uniforms, food subsidies and pensions –  under new rules that make access to more than three dozen state-funded  schemes conditional on showing identification.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Over the past month, citizens have been notified that they have to prove their identity with a biometric ID, known as an &lt;a class="u-underline" href="https://uidai.gov.in/"&gt;Aadhaar card&lt;/a&gt;,  to be eligible to use various services. Booking railway tickets online,  applying for some jobs, and getting fuel subsidies will also be  dependent on showing the controversial card.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aadhaar cards were introduced by the Indian government in 2009, and  rolled out by prime minister Narendra Modi in 2014. They record personal  biometric data, including fingerprints and eye scans, which the  government says allows it to ensure that welfare services are being  delivered to those who really need them, and saving billions of rupees  by reducing welfare fraud.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The &lt;a class="u-underline" href="https://uidai.gov.in/"&gt;Unique Identification Authority of India&lt;/a&gt; (UIDAI), which oversees the Aadhaar programme, says that more than 1.13  billion people have been enrolled on an official database. But  activists say that hundreds of thousands of Indians and migrants are  still undocumented and could miss out on their fundamental rights  because of the new rules.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“What if a Facebook account was necessary to log in to the internet,  and what if Facebook was owned by the government of the US?” asked  Sumandro Chattapadhyay, research director at the Centre for Internet and  Society (CIS), a thinktank with offices in Bangalore and Delhi. “We are  building a system that will decide whether a child will eat or not on  an afternoon based on [the] quality of internet connectivity and  cleanliness of the child’s thumbprint.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Chattapadhyay argued that Aadhaar, which is effectively being forced  upon Indians, and which is used increasingly by private companies,  exposed more than a billion people to huge privacy risks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The  Aadhaar ID is being connected to digital communications via sim card  registration, it is being connected to financial transactions via bank  accounts, and all Indian citizens are being forced to enrol for it  against the threat of losing out from welfare services,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The potential of unmonitored and unregulated use of such linked data  by the private sector is massive. It does not matter if the Indian  state will finally go ahead with implementing this system or not. The  fact that [it] is considering such a system is scary enough.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nanu Bhasin, spokesperson at the ministry of women and child  development, confirmed that the order to link Aadhaar to government  schemes had come directly from the Modi government. “There are leakages  in the system,” she said. “This will plug leakages.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Bhasin said Aadhaar was now mandatory: “You have to take it, it is  necessary. You cannot take the right to a benefit if you don’t have the  Aadhaar card.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;She said she did not know if those who did not want to enrol  in the scheme because of potential privacy risks would still be able to  receive benefits. “You have bank accounts, there you give all your  details, everything. Why make a fuss [about privacy] for Aadhaar?” she  said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of the most contentious new rules introduced this month, and  coming into force in July, requires children to show Aadhaar cards to  get free school meals. The notice led to a media storm in India, where  malnutrition rates are high and nearly &lt;a class="u-underline" href="http://www.worldbank.org/en/news/feature/2013/05/13/helping-india-combat-persistently-high-rates-of-malnutrition"&gt;60 million children&lt;/a&gt; are underweight.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On 7 March the government said &lt;a class="u-underline" href="http://pib.nic.in/newsite/PrintRelease.aspx?relid=158933"&gt;alternative forms of ID would be accepted&lt;/a&gt; for free school meals where people did not yet have Aadhaar cards, and  urged schools and childcare centres to enrol all attendees.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Activists argue that setting any barriers to free school meals is  unethical and unconstitutional. Ambarish Rai, national convenor of the  Right to Education Forum, said: “This is a very insensitive decision of  the government. How can you make it mandatory? It is a clear-cut  violation of the Right to Education Act 2009.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Compulsory identification could deter school attendance if children  struggle to get free school meals or uniforms, said Swati Narayan,  visiting research scholar from the LSE and food activist. “India’s  school meal programme covers almost 100 million children – the largest  in the world. Instead of creating unnecessary barriers, the focus should  be on how to improve these modest meals by adding eggs, fruit and  nutritious foods to the menu.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Glitches in the Aadhaar system have already led to reports of people  being unfairly denied government subsidies. In February, the news  website Scroll &lt;a class="u-underline" href="https://scroll.in/article/829071/in-jharkhand-compulsory-biometric-authentication-for-rations-sends-many-away-empty-handed"&gt;recorded a number of people in the state of Jharkhand being denied rice subsidies&lt;/a&gt; because of problems with Aadhaar card machines.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The constitutional validity of the government’s new orders is  currently being debated in court, with questions raised as to whether  the Indian parliament can restrict fundamental rights enshrined in the  constitution, and whether the government has the power to force citizens  to enrol.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2015, a supreme court order had ruled that the scheme was purely  voluntary, and that it could not become mandatory with a court ruling.  But in 2016, parliament passed the &lt;a class="u-underline" href="https://www.google.co.uk/url?sa=t&amp;amp;rct=j&amp;amp;q=&amp;amp;esrc=s&amp;amp;source=web&amp;amp;cd=6&amp;amp;ved=0ahUKEwi_2pSUx-XSAhUMjpAKHV1bDLIQFgg7MAU&amp;amp;url=https%3A%2F%2Fuidai.gov.in%2Fimages%2Fthe_aadhaar_act_2016.pdf&amp;amp;usg=AFQjCNHDmJKdO8jdfGZJKLKRJQpHdf1Frw&amp;amp;sig2=ds56EfksGTNm2PpBKqhjtA&amp;amp;cad=rja"&gt;Aadhaar Act&lt;/a&gt;, which allowed the government to require identification for government services.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Khagesh Jha, a lawyer and activist, argued that the act was  fundamentally unconstitutional. “Rescued children, children who have  been trafficked or those who have been forced into child labour – [you]  can’t expect them to hold an Aadhaar card or documents like a birth  certificate. Right to education is a fundamental right, and is protected  by the core of the constitution. It cannot be challenged by any other  document.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;UIDAI, the agency overseeing Aadhaar, issued a statement saying the government had &lt;a class="u-underline" href="http://pib.nic.in/newsite/PrintRelease.aspx?relid=158849"&gt;made savings of more than 490bn rupees&lt;/a&gt; (£6bn) in the past two and a half years, thanks to schemes linking  government benefits to Aadhaar. It added that during the past seven  years, there had been no report of a breach or leak of residents’ data.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-guardian-march-21-2017-no-id-no-benefits'&gt;https://cis-india.org/internet-governance/news/the-guardian-march-21-2017-no-id-no-benefits&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-03-22T14:27:25Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/outlook-arindam-mukherjee-february-20-2017-no-genie-at-your-fingertips">
    <title>No Genie At Your Fingertips</title>
    <link>https://cis-india.org/internet-governance/news/outlook-arindam-mukherjee-february-20-2017-no-genie-at-your-fingertips</link>
    <description>
        &lt;b&gt;Aadhaar biometrics will now enable cashless shopping sans card and smartphone. A look at the hopes and fears.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Arindam Mukherjee was &lt;a class="external-link" href="http://www.outlookindia.com/magazine/story/no-genie-at-your-fingertips/298449"&gt;published in the Outlook&lt;/a&gt; on February 20, 2017. Pranesh Prakash and Sunil Abraham were quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Soon, you will be able to pay for your groceries and other purchased goods by using just your fingerprints and biometric data. You won’t need debit or credit cards, smartphones or e-wallets. You won’t need to sign or even remember your PIN.&lt;br /&gt;&lt;br /&gt;In a bid to increase digitisation and move to the next phase of ‘cashless India’, the government is preparing to launch Aadhaar Pay, an initiative that will supersede the need to use credit cards, debit cards, smartphones and PINs to make payments or transfer money. The proposed system of payments will use a person’s biometric data and fingerprints to make payments through Aadhaar-linked bank accounts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The initiative, which has been running as a pilot project in fair price shops in Andhra Pradesh, is expected to be launched in a month’s time. According to officials of the Unique Identification Authority of India (UIDAI), the system has been getting a positive response in these trials and is ready for a nationwide launch.&lt;br /&gt;&lt;br /&gt;In Aadhaar Pay, all a person needs to carry to a shop are his fingerprints as merchant establishments will authenticate his or her identity through fingerprints, which will give them access to a person’s Aadhaar data. The only essential requirement for this new mode of payments is that bank acc­ounts have to be linked with the account-­holder’s Aadhaar number.&lt;br /&gt;&lt;br /&gt;Unlike the post-demonetisation limits imposed on ATM and bank account withdrawals, no limits are proposed to be put on Aadhaar Pay transactions as of now. The proposal is to leave the fixing of limits to the discretion of banks. However, the government hopes Aadhaar Pay will be used mostly for small-value transactions rather than large deals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The system will work through an app in the merchant establishment’s smartphone—with a fingerprint scanner device—eliminating the requirement of a Point of Sale (POS) terminal, which is required for credit card and debit card transactions. The scanner will be priced at around Rs 2,000, considerably cheaper than POS terminals that cost Rs 8,000-10,000.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aadhaar Pay is the next step of the government’s successful run of Aadhaar Enabled Payment System (AEPS), under which transactions are made through ‘banking correspondents’, mostly in rural areas. These transactions are done through POS machines and micro-ATMs. Like Aadhaar Pay, AEPS disburses money without a signature or a debit or credit card, and without the need to visit a bank branch. But unlike AEPS, which works through banking correspondents, Aadhaar Pay will be available through merchant establishments much the same way as debit or credit cards work.&lt;br /&gt;&lt;br /&gt;The biggest task before the government to ensure the success of Aadhaar Pay is to develop a network of merchant establishments that will accept Aadhaar Pay just the way they accept credit or debit cards or e-wallet payments like Paytm. To do this, the government said in this year’s budget that banks would be encouraged to put 20 lakh Aadhaar Pay access machines across the country. “We have asked every bank to select 35 merchants for this. These merchants will have a smartphone and a biometric device attachment to carry out Aadhaar Pay transactions,” UIDAI CEO Ajay Bhushan Pandey tells Outlook.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This won’t be easy. Even in case of debit or credit cards, the  biggest limiting factor is the relatively small number of POS terminals  that accept them. According to data from the National Payment  Corporation of India (NPCI), there are only 14 lakh POS terminals in  India, which has over 3.5-4 crore merchant establishments and 80 crore  cards (77 crore debit cards and three crore credit cards). The bulk of  these terminals are in tier I and tier II cities and almost none in tier  III and IV towns. To improve the situation, the government is already  working towards bringing in 10 lakh new terminals by March, most of  which will be put in tier III and tier IV towns, bringing them deeper  within the ambit of the ­digitised, cashless economy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though a starting target of 20 lakh terminals for Aadhaar Pay may  seem quite ambitious, according to the latest data, 111.51 crore adults  have already obtained their Aadhaar numbers and 50 crore bank acc­ounts  (of a total 110 crore savings accounts in the country) of 40 crore  people have been linked to Aadhaar and, according to UIDAI, nearly two  crore people are linking their bank accounts with Aadhaar every month,  brightening up the prospects of Aadhaar Pay. A majority of these numbers  are from rural areas and smaller cities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government and UIDAI aim to roll out Aadhaar Pay primarily in rural areas and tier III and tier IV cities to begin with, as these areas do not have proper debit or credit card coverage and the people living there are not big users of plastic cards or smartphones. “We need to provide a solution for every segment of the ­population,” says Pandey. “We have to take care of the people who cannot use smartphones or other mobile phones and debit or credit cards, and those who cannot remember their PIN for authentication. The only tool with them is their fingerprint. Approximately 30 crore people are not comfortable with cards or phone. We had to get them into the mode of digital payments.”&lt;br /&gt;&lt;br /&gt;Not surprisingly, critics of Aadhaar and Aadhaar-based services have attacked Aadhaar Pay and AEPS on issues of privacy and security of biometric and personal data. Pranesh Prakash, policy director with the Centre for Internet and Society (CIS), ­rec­ently tweeted, “As long as AEPS encourages biometric authorisation of transactions, it is bound to be a security nightmare, with widespread fraud.” Would you tell a shopkeeper your debit card’s PIN? No. Then why share your fingerprint? A fingerprint, in this system, becomes a kind of unchangeable PIN, he asks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pointing out a possible danger, Usha Ramanathan, an independent law resear­c­her who has been following Aadhaar since its inception, says, “In many ­payments, biometric data is authenticated and then it remains in the system where there are leakages. Intermediaries then have access to the data, which is thus made insecure.”&lt;br /&gt;&lt;br /&gt;According to the UIDAI, however, once biometric data is provided by the consumer while making Aadhaar-based payments, it gets encrypted and a merchant doesn’t get access to that data. The Aadhaar Act also prohibits any storing of biometric data in local devices. And yet, there are many like CIS executive director Sunil Abraham who believe it is a mistake to use biometrics for authentication, especially when payments are concerned. “Our concern with Aadhaar Pay is about the biometric component of the project,” says Abraham. “Biometrics is an identification technology. Unfortunately, it is being presented as an authentication technology. It is not a secure authentication technology as biometric data can be stolen easily. It is also irrevocable; once bio­metric data is stolen, it cannot be ­re-issued like a smart card.”&lt;br /&gt;&lt;br /&gt;Then there is the problem of availability of fingerprints. In the case of many people from rural areas and the working class, fingerprints get affected due to the manual nature of their work. This makes it difficult for this target group of UIDAI to conduct transactions properly through Aadhaar Pay. “In Rajasthan, 30 per cent of the households are not even able to procure ration using fingerprints,” says Ramanathan.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The launch of Aadhar Pay at this time becomes more challenging as there has been a decline in digital payments this January. According to RBI data, digital payments, including transactions made by using credit cards, debit cards, electronic fund transfers, digital wallets and mobile banking transactions, were 10.2 per cent lower by volume and 7 per cent lower by value in January 2017 as compared to December 2016. Also, digital transactions fell from 1,027.7 million (worth Rs 105.4 lakh crore) to 922.9 million (worth Rs 98 lakh crore). This could get worse as the RBI raised the cash withdrawal limits from Rs 24,000 to Rs 50,000 from February 20 and aims to remove all limits by mid-March.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Within digital transactions, debit and credit transactions at POS terminals dec­lined 18.6 per cent month-on-month in January, while mobile banking transactions declined by 7.6 per cent, showing that people still prefer to deal in cash. According to NPCI data, however, IMPS transactions rose by 18 per cent in January and UPI-based transactions went up from 2 million transactions (worth Rs 700 crore) in December to 4.2 million transactions (worth Rs 1,666 crore) in January.&lt;br /&gt;&lt;br /&gt;Clearly, considering India’s demography and its problems, when it comes to the security of personal and biometric data, the government and the UIDAI have many issues to clear before Aadhaar Pay can achieve any success. Moreover, there are over 100 crore mobile phones in India today, with even the lowest strata of the population having access to one. Yet mobile-­based payments and m-wallets are yet to hit that critical mass. To make Aadhaar Pay a bigger success than that could be a gigantic task.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/outlook-arindam-mukherjee-february-20-2017-no-genie-at-your-fingertips'&gt;https://cis-india.org/internet-governance/news/outlook-arindam-mukherjee-february-20-2017-no-genie-at-your-fingertips&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-02-16T16:02:31Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/livemint-june-2-2017-komal-gupta-new-rules-for-govt-agencies-to-ensure-security-of-personal-data">
    <title>New rules for govt agencies to ensure security of personal data</title>
    <link>https://cis-india.org/internet-governance/news/livemint-june-2-2017-komal-gupta-new-rules-for-govt-agencies-to-ensure-security-of-personal-data</link>
    <description>
        &lt;b&gt;The new rules put the onus on government departments and agencies to safeguard personal data or information held by them.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Komal Gupta was &lt;a href="http://www.livemint.com/Politics/iTcwgoIUnkEnGSqOvekhUL/New-rules-for-govt-agencies-to-ensure-security-of-personal-d.html"&gt;published by Livemint&lt;/a&gt; on June 2, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Government departments handling personal data or information will have to ensure that end-users are made aware of the data usage and collection and their consent is taken either in writing or electronically, according to new guidelines issued by the government for security of personal data. Sensitive personal data such as passwords, financial information (bank account, credit card, debit card and other payment instrument details), medical records and history, sexual orientation, physical and mental health, and biometric information cannot be stored by agencies without encryption, say the guidelines issued by the ministry of electronics and information technology (IT) on 22 May.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The rules put the onus on government departments and agencies to safeguard personal data or information held by them. To be sure, the Information Technology Act 2000 and Aadhaar Act 2016 have laid down most of these rules. The new guidelines seek answers to questions being asked on data protection under the Aadhaar Act. “If agency is storing Aadhaar number or sensitive personal information in database, data must be encrypted and stored. Encryption keys must be protected securely, preferably using Hardware Security Modules (HSMs). If simple spreadsheets are used, it must be password protected and securely stored,” according to the guidelines.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In April, the IT Ministry issued a notification directing all government departments to remove any personal data published on their websites or through other avenues. The guidelines require regular audits to ensure effectiveness of data protection and also call for swift action on any breach of personal data. In cases where an Aadhaar number has to be printed, it should be truncated or masked. The guidelines say only the last four digits of the 12-digit unique identity number can be displayed or printed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to a research report issued by Bengaluru-based think tank Centre for Internet and Society on 1 May, four government portals could have made public around 130-135 million Aadhaar numbers and around 100 million bank account numbers.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/livemint-june-2-2017-komal-gupta-new-rules-for-govt-agencies-to-ensure-security-of-personal-data'&gt;https://cis-india.org/internet-governance/news/livemint-june-2-2017-komal-gupta-new-rules-for-govt-agencies-to-ensure-security-of-personal-data&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-06-07T13:51:29Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/financial-express-october-17-2016-new-regulations-in-place-aadhaar-card-records-to-be-preserved-for-7-yrs-by-centre">
    <title>New regulations in place; Aadhaar Card records to be preserved for 7 yrs by Centre</title>
    <link>https://cis-india.org/internet-governance/news/financial-express-october-17-2016-new-regulations-in-place-aadhaar-card-records-to-be-preserved-for-7-yrs-by-centre</link>
    <description>
        &lt;b&gt;UIDAI chief executive office ABP Pandey said that the concerns regarding Aadhar card-related benefits were "exaggerated" and that the agency will keep the records in case any disputes arise in the future.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in the &lt;a href="http://www.financialexpress.com/economy/new-regulations-in-place-aadhaar-card-records-to-be-preserved-for-7-yrs-by-centre/420633/"&gt;Financial Express&lt;/a&gt; on October 17, 2016. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;As per new regulations, the government will now keep a record for  seven years of all services and benefits that are availed using Aadhaar  number. Fearing that the database might be used for surveillance, the  Unique Identification Authority of India (UIDAI) will preserve the  records.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;UIDAI chief executive office ABP Pandey said that the concerns  regarding Aadhar card-related benefits were “exaggerated” and that the  agency will keep the records in case any disputes arise in the future.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pandey added that the information will be available online for two  years and shall be shifted to the offline archives for the next five  years. In that case, users will be able to check the records only for  two years. However, the rules won’t apply for security agencies and that  they will need a district judge’s permission to access the data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to &lt;i&gt;HT&lt;/i&gt;, the rules allow designated joint  secretary-level officers at the Centre to order access to information on  the grounds of national security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Talking about this Sunil Abraham, director of the Bengaluru-based  think tank, Centre for Internet and Society said that once Aadhar  becomes mandatory, it can be misused to conduct a 360-degree  surveillance on any person.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Every time a person fingerprints and quotes the Aadhaar number, the  agency concerned sends the data to UIDAI to crosscheck the particulars.&lt;br /&gt; The UIDAI authenticates about five million Aadhaar numbers, which are quoted to avail &lt;a href="http://www.financialexpress.com/tag/lpg-subsidy/"&gt;LPG subsidy&lt;/a&gt;, cheap ration and even passport, a day against a capacity to verify 100 million requests daily, reports &lt;i&gt;HT.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Meanwhile, The Unique Identification Authority of India (UIDAI) has  launched a drive to enrol any leftover population for Aadhaar in 22  states and UTs that have “statistically” hit 100 per cent coverage for  adults.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ‘Challenge drive’ starts from October 15 for a month, a UIDAI  statement said, adding that as of today, over 106.69 crore Aadhaar  numbers have been generated across the country.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/financial-express-october-17-2016-new-regulations-in-place-aadhaar-card-records-to-be-preserved-for-7-yrs-by-centre'&gt;https://cis-india.org/internet-governance/news/financial-express-october-17-2016-new-regulations-in-place-aadhaar-card-records-to-be-preserved-for-7-yrs-by-centre&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-10-17T14:46:31Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-hindu-yuthika-bhargava-june-9-2017-new-law-to-unlock-data-economy">
    <title>New law to unlock data economy </title>
    <link>https://cis-india.org/internet-governance/news/the-hindu-yuthika-bhargava-june-9-2017-new-law-to-unlock-data-economy</link>
    <description>
        &lt;b&gt;Proposal has been sent to PMO for approval. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Yuthika Bhargava was &lt;a class="external-link" href="http://www.thehindu.com/news/national/new-law-to-unlock-data-economy/article18951772.ece"&gt;published in the Hindu&lt;/a&gt; on June 9, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The government is mulling a new data protection law to protect  personal data of citizens, while also creating an enabling framework to  allow public data to be mined effectively. The move assumes significance  amid the debate over security of individuals’ private data, including  Aadhaar-linked biometrics, and the rising number of cyber-crimes in the  country.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The Ministry of Electronics and Information Technology  (MEIT) is working on a new data protection law. A proposal to this  effect has been sent to the Prime Ministers’ Office for approval,” a  senior ministry official told &lt;i&gt;The Hindu&lt;/i&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Once the PMO approves it, the ministry will set up a “cross-functional committee” on the issue.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We  want to include all stakeholders. It will be a high-level committee,  and all current and future requirements of the sector will be  discussed.”&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Two chief aims&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The official said: “We  are working with two main aims – to ensure that personal data of  individuals remain protected and is not misused, and to unlock the data  economy.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The official explained that a lot of benefits can be derived from the data that is publicly available, by using technology and big data analytics. “The information can be used for the benefit of both individuals and companies,” the official said.&lt;br /&gt;&lt;br /&gt;“The underlying infrastructure of the digital economy is data. India is woefully unprepared to protect its citizens from the avalanche of companies that offer services in exchange for their data, with no comprehensive framework to protect users,” Software Freedom Law Centre (SFLC.in), a non-profit, said in an emailed reply.&lt;br /&gt;&lt;br /&gt;Currently, India does not have a separate law for data protection, and there is no body that specifically regulates data privacy.&lt;br /&gt;&lt;br /&gt;“There is nominally a data protection law in India in the form of the Reasonable Security Guidelines under Section 43A of the Information Technology Act. However, it is a toothless law and is never used. Even when data leaks such as the ones from the official Narendra Modi app or McDonald’s McDelivery app have happened, section 43A and its rules have not proven of use,” said Pranesh Prakash, policy director at CIS.&lt;br /&gt;&lt;br /&gt;Some redress for misuse of personal data by commercial entities is also available under the Consumer Protection Act enacted in 2015, according to information on the website of Privacy International, an NGO. As per the Act, the disclosure of personal information given in confidence is an unfair trade practice.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-hindu-yuthika-bhargava-june-9-2017-new-law-to-unlock-data-economy'&gt;https://cis-india.org/internet-governance/news/the-hindu-yuthika-bhargava-june-9-2017-new-law-to-unlock-data-economy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-06-12T01:10:06Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/digital-policy-portal-july-13-2016-new-approaches-to-information-privacy-revisiting-the-purpose-limitation-principle">
    <title>New Approaches to Information Privacy – Revisiting the Purpose Limitation Principle</title>
    <link>https://cis-india.org/internet-governance/blog/digital-policy-portal-july-13-2016-new-approaches-to-information-privacy-revisiting-the-purpose-limitation-principle</link>
    <description>
        &lt;b&gt;Article on Aadhaar throwing light on privacy and data protection.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;This was &lt;a class="external-link" href="http://www.digitalpolicy.org/revisiting-the-principles-of-purpose-limitation-under-existing-data-protection-norms/"&gt;published in Digital Policy Portal&lt;/a&gt; on July 13, 2016.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Introduction&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Last year, Mukul Rohatgi, the Attorney General of India, called into question existing jurisprudence of the last 50 years on the constitutional validity of the right to privacy.&lt;sup&gt;1&lt;/sup&gt; Mohatgi was rebutting the arguments on privacy made against Aadhaar, the unique identity project initiated and implemented in the country without any legislative mandate.&lt;sup&gt;2&lt;/sup&gt; The question of the right to privacy becomes all the more relevant in the context of events over the last few years—among them, the significant rise in data collection by the state through various e-governance schemes,&lt;sup&gt;3&lt;/sup&gt; systematic access to personal data by various wings of the state through a host of surveillance and law enforcement initiatives launched in the last decade,&lt;sup&gt;4&lt;/sup&gt; the multifold increase in the number of Indians online, and the ubiquitous collection of personal data by private parties.&lt;sup&gt;5&lt;/sup&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;These developments have led to a call for a comprehensive privacy legislation in India and the adoption of the National Privacy Principles as laid down by the Expert Committee led by Justice AP Shah.&lt;sup&gt;6&lt;/sup&gt; There are privacy-protection legislation currently in place such as the Information Technology Act, 2000 (IT Act), which was enacted to govern digital content and communication and provide legal recognition to electronic transactions. This legislation has provisions that can safeguard—and dilute—online privacy. At the heart of the data protection provisions in the IT Act lies section 43A and the rules framed under it, i.e., Reasonable security practices and procedures and sensitive personal data information.&lt;sup&gt;7&lt;/sup&gt;Section 43A mandates that body corporates who receive, possess, store, deal, or handle any personal data to implement and maintain ‘reasonable security practices’, failing which, they are held liable to compensate those affected. Rules drafted under this provision also mandated a number of data protection obligations on corporations such the need to seek consent before collection, specifying the purposes of data collection, and restricting the use of data to such purposes only. There have been questions raised about the validity of the Section 43A Rules as they seek to do much more than mandate in the parent provisions, Section 43A— requiring entities to maintain reasonable security practices.&lt;/p&gt;
&lt;h3&gt;Privacy as control?&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Even setting aside the issue of legal validity, the kind of data protection framework envisioned by Section 43A rules is proving to be outdated in the context of how data is now being collected and processed. The focus of Section 43 A Rules—as well as that of draft privacy legislations in India&lt;sup&gt;8&lt;/sup&gt;—is based on the idea of individual control. Most apt is Alan Westin’s definition of privacy: “the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to other.”&lt;sup&gt;9&lt;/sup&gt; Westin and his followers rely on the normative idea of “informational self- determination”, the notion of a pure, disembodied, and atomistic self, capable of making rational and isolated choices in order to assert complete control over personal information. More and more this has proved to be a fiction especially in a networked society.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Much before the need for governance of information technologies had reached a critical mass in India, Western countries were already dealing with the implications of the use of these technologies on personal data. In 1973, the US Department of Health, Education and Welfare appointed a committee to address this issue, leading to a report called ‘Records, Computers and Rights of Citizens.’&lt;sup&gt;10&lt;/sup&gt; The Committee’s mandate was to “explore the impact of computers on record keeping about individuals and, in addition, to inquire into, and make recommendations regarding, the use of the Social Security number.” The Report articulated five principles which were to be the basis of fair information practices: transparency; use limitation; access and correction; data quality; and security. Building upon these principles, the Committee of Ministers of the Organization for Economic Cooperation and Development (OECD) arrived at the Guidelines on the Protection of Privacy and Transborder Flows of Personal Data in 1980.&lt;sup&gt;11&lt;/sup&gt; These principles— Collection Limitation, Data Quality, Purpose Specification, Use Limitation, Security Safeguards, Openness, Individual Participation and Accountability—are what inform most data protection regulations today including the APEC Framework, the EU Data Protection Directive, and the Section 43A Rules and Justice AP Shah Principles in India.&lt;/p&gt;
&lt;p&gt;Fred Cate describes the import of these privacy regimes as such:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;“All of these data protection instruments reflect the same approach: tell individuals what data you wish to collect or use, give them a choice, grant them access, secure those data with appropriate technologies and procedures, and be subject to third-party enforcement if you fail to comply with these requirements or individuals’ expressed preferences”&lt;sup&gt;12&lt;/sup&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This is in line with Alan Westin’s idea of privacy exercised through individual control. Therefore the focus of these principles is on empowering the individuals to exercise choice, but not on protecting individuals from harmful or unnecessary practices of data collection and processing. The author of this article has earlier written&lt;sup&gt;13&lt;/sup&gt; about the sheer inefficacy of this framework which places the responsibility on individuals. Other scholars like Daniel Solove,&lt;sup&gt;14&lt;/sup&gt; Jonathan Obar&lt;sup&gt;15&lt;/sup&gt; and Fred Cate&lt;sup&gt;16&lt;/sup&gt; have also written about the failure of traditional data protection practices of notice and consent. While these essays dealt with the privacy principles of choice and informed consent, this paper will focus on the principles of purpose limitation.&lt;/p&gt;
&lt;h3&gt;Purpose Limitation and Impact of Big Data&lt;/h3&gt;
&lt;p&gt;The principles of purpose limitation or purpose specification seeks to ensure the following four objectives:&lt;/p&gt;
&lt;ol style="list-style-type: lower-alpha;"&gt;
&lt;li&gt;Personal information collected and processed should be adequate and relevant to the purposes for which they are processed.&lt;/li&gt;
&lt;li&gt;The entities collect, process, disclose, make available, or otherwise use personal information only for the stated purposes.&lt;/li&gt;
&lt;li&gt;In case of change in purpose, the data’s subject needs to be informed and their consent has to be obtained.&lt;/li&gt;
&lt;li&gt;After personal information has been used in accordance with the identified purpose, it has to be destroyed as per the identified procedures.&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;The purpose limitation along with the data minimisation principle—which requires that no more data may be processed than is necessary for the stated purpose—aim to limit the use of data to what is agreed to by the data subject. These principles are in direct conflict with new technology which relies on ubiquitous collection and indiscriminate uses of data. The main import of Big Data technologies on the inherent value in data which can be harvested not by the primary purposes of data collection but through various secondary purposes which involve processing of the data repeatedly.&lt;sup&gt;17&lt;/sup&gt;Further, instead to destroying the data when its purpose has been achieved, the intent is to retain as much data as possible for secondary uses. Importantly, as these secondary uses are of an inherently unanticipated nature, it becomes impossible to account for it at the stage of collection and providing the choice to the data subject.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Followers of the discourse on Big Data would be well aware of its potential impacts on privacy. De-identification techniques to protect the identities of individuals in dataset face a threat from an increase in the amount of data available either publicly or otherwise to a party seeking to reverse-engineer an anonymised dataset to re-identify individuals. &lt;sup&gt;18&lt;/sup&gt; Further, Big Data analytics promise to find patterns and connections that can contribute to the knowledge available to the public to make decisions. What is also likely is that it will lead to revealing insights about people that they would have preferred to keep private.&lt;sup&gt;19&lt;/sup&gt;In turn, as people become more aware of being constantly profiled by their actions, they will self-regulate and ‘discipline’ their behaviour. This can lead to a chilling effect.&lt;sup&gt;20&lt;/sup&gt; Meanwhile, Big Data is also fuelling an industry that incentivises businesses to collect more data, as it has a high and growing monetary value. However, Big Data also promises a completely new kind of knowledge that can prove to be revolutionary in fields as diverse as medicine, disaster-management, governance, agriculture, transport, service delivery, and decision-making.&lt;sup&gt;21&lt;/sup&gt; As long as there is a sufficiently large and diverse amount of data, there could be invaluable insights locked in it, accessing which can provide solutions to a number of problems. In light of this, it is important to consider what kind of regulatory framework is most suitable which could facilitate some of the promised benefits of Big Data and at the same time mitigate its potential harm. This, coupled with the fact that the existing data protection principles have, by most accounts, run their course, makes the examination of alternative frameworks even more important. This article will examine some alternate proposals made to the existing framework of purpose limitation below.&lt;/p&gt;
&lt;h3&gt;Harms-based approach&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Some scholars like Fred Cate&lt;sup&gt;22&lt;/sup&gt; and Daniel Solove&lt;sup&gt;23&lt;/sup&gt; have argued that there is a need for the primary focus of data protection law to move from control at the stage of data collection to actual use cases. In his article on the failure of Fair Information Practice Principles,&lt;sup&gt;24&lt;/sup&gt;Cate puts forth a proposal for ‘Consumer Privacy Protection Principles.’ Cate envisions a more interventionist role of the data protection authorities by regulating information flows when required, in order to protect individuals from risky or harmful uses of information. Cate’s attempt is to extend the principles of consumer protection law of prevention and remedy of harms.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In a re-examination of the OECD Privacy Principles, Cate and Viktor Mayer Schöemberger attempt to discard the use of personal data to only purposes specified. They felt that restricting the use of personal to only specified purposes could significantly threaten various research and beneficial uses of Big Data. Instead of articulating a positive obligations of what personal data collected could be used for, they attempt to arrive at a negative obligation of use-cases prevented by law. Their working definition of the Use specification principle broaden the scope of use cases by only preventing use of data “if the use is fraudulent, unlawful, deceptive or discriminatory; society has deemed the use inappropriate through a standard of unfairness; the use is likely to cause unjustified harm to the individual; or the use is over the well-founded objection of the individual, unless necessary to serve an over-riding public interest, or unless required by law.”&lt;sup&gt;25&lt;/sup&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;While most standards in the above definition have established understanding in jurisprudence, the concept of unjustifiable harm is what we are interested in. Any theory of harms-based approach goes back to John Stuart Mill’s dictum that the only justifiable purpose to exert power over the will of an individual is to prevent harm to others. Therefore, any regulation that seeks to control or prevent autonomy of individuals (in this case, the ability of individuals to allow data collectors to use their personal data, and the ability of data collectors to do so, without any limitation) must clearly demonstrate the harm to the individuals in question.&lt;/p&gt;
&lt;p&gt;Fred Cate articulates the following steps to identify tangible harm and respond to its presence:&lt;sup&gt;26&lt;/sup&gt;&lt;/p&gt;
&lt;ol style="list-style-type: lower-alpha;"&gt;
&lt;li&gt;Focus on Use — Actual use of the data should be considered, not mere possession. The assumption is that the collection, possession, or transfer of information do not significantly harm people, rather it is the use of information following such collection, possession, or transfer.&lt;/li&gt;
&lt;li&gt;Proportionality — Any regulatory measure must be proportional to the likelihood and severity of the harm identified.&lt;/li&gt;
&lt;li&gt;Per se Harmful Uses — Uses which are always harmful must be prohibited by law&lt;/li&gt;
&lt;li&gt;Per se not Harmful Uses — If uses can be considered inherently not harmful, they should not be regulated.&lt;/li&gt;
&lt;li&gt;Sensitive Uses — In case where the uses are not per se harmful or not harmful, individual consent must be sought for using that data for those purposes.&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;The proposal by Cate argues for what is called a ‘use based system’, which is extremely popular with American scholars. Under this system, data collection itself is not subject to restrictions; rather, only the use of data is regulated. This argument has great appeal for both businesses who can reduce their overheads significantly if consent obligations are done away with as long as they use the data in ways which are not harmful, as well as critics of the current data protection framework which relies on informed consent. Lokke Moerel explains the philosophy of ‘harms based approach’ or ‘use based system’ in United States by juxtaposing it against the ‘rights based approach’ in Europe.&lt;sup&gt;27&lt;/sup&gt; In Europe, rights of individuals with regard to processing of their personal data is a fundamental human right and therefore, a precautionary principle is followed with much greater top-down control upon data collection. However, in the United States, there is a far greater reliance on market mechanisms and self-regulating organisations to check inappropriate processing activities, and government intervention is limited to cases where a clear harm is demonstrable.&lt;sup&gt;28&lt;/sup&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Continuing research by the Centre for Information Policy Leadership under its Privacy Risk Framework Project looks at a system of articulating what harms and risks arising from use of collected data. They have arrived a matrix of threats and harms. Threats are categorised as —a) inappropriate use of personal information and b) personal information in the wrong hands. More importantly for our purposes, harms are divided into: a) tangible harms which are physical or economic in nature (bodily harm, loss of liberty, damage to earning power and economic interests); b) intangible harms which can be demonstrated (chilling effects, reputational harm, detriment from surveillance, discrimination and intrusion into private life); and c) societal harm (damage to democratic institutions and loss of social trust).&lt;sup&gt;29&lt;/sup&gt;For any harms-based system, a matrix like above needs to emerge clearly so that regulation can focus on mitigating practices leading to the harms.&lt;/p&gt;
&lt;h3&gt;Legitimate interests&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Lokke Moerel and Corien Prins, in their article “Privacy for Homo Digitalis – Proposal for a new regulatory framework for data protection in the light of Big Data and Internet of Things”&lt;sup&gt;30&lt;/sup&gt; use the ideal of responsive regulation which considers empirically observable practices and institutions while determining the regulation and enforcement required. They state that current data protection frameworks—which rely on mandating some principles of how data has to be processed—is exercised through merely procedural notification and consent requirements. Further, Moerel and Prins feel that data protection law cannot only involve a consideration of individual interest but also needs to take into account collective interest. Therefore, the test must be a broader assessment than merely the purpose limitation articulating the interests of the parties directly involved, but whether a legitimate interest is achieved.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Legitimate interest has been put forth as an alternative to the purpose limitation. Legitimate is not a new concept and has been a part of the EU Data Protection Directive and also finds a place in the new General Data Protection Regulation. Article 7 (f) of the EU Directive&lt;sup&gt;31&lt;/sup&gt; provided for legitimate interest balanced against the interests or fundamental rights and freedoms of the data subject as the last justifiable reason for use of data. Due to confusion in its interpretation, the Article 29 Working Party, in 2014,&lt;sup&gt;32&lt;/sup&gt;looked into the role of legitimate interest and arrived at the following factors to determine the presence of a legitimate interest— a) the status of the individual (employee, consumer, patient) and the controller (employer, company in a dominant position, healthcare service); b) the circumstances surrounding the data processing (contract relationship of data subject and processor); c) the legitimate expectations of the individual.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Federico Ferretti has criticised the legitimate interest principle as vague and ambiguous. The balancing of legitimate interest in using the data against fundamental rights and freedoms of the data subject gives the data controllers some degree of flexibility in determining whether data may be processed; however, this also reduces the legal certainty that data subject have of their data not being used for purposes they have not agreed to.&lt;sup&gt;33&lt;/sup&gt;However, it is this paper’s contention that it is not the intent of the legitimate interest criteria but the lack of consensus on its application which creates an ambiguity. Moerel and Prins articulate a test for using legitimate interest which is cognizant of the need to use data for the purpose of Big Data processing, as well as ensuring that the rights of data subjects are not harmed.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;As demonstrated earlier, the processing of data and its underlying purposes have become exceedingly complex and the conventional tool to describe these processes ‘privacy notices’ are too lengthy, too complex and too profuse in numbers to have any meaningful impact.&lt;sup&gt;34&lt;/sup&gt;The idea of information self-determination, as contemplated by Westin in American jurisprudence, is not achieved under the current framework. Moerel and Prins recommend five factors&lt;sup&gt;35&lt;/sup&gt; as relevant in determining the legitimate interest. Of the five, the following three are relevant to the present discussion:&lt;/p&gt;
&lt;ol style="list-style-type: lower-alpha;"&gt;
&lt;li style="text-align: justify;"&gt;Collective Interest — A cost-benefit analysis should be conducted, which examines the implications for privacy for the data subjects as well as the society, as a whole.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;The nature of the data — Rather than having specific categories of data, the nature of data needs to be assessed contextually to determine legitimate interest.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Contractual relationship and consent not independent grounds — This test has two parts. First, in case of contractual relationship between data subject and data controller: the more specific the contractual relationship, the more restrictions apply to the use of the data. Second, consent does not function as a separate principle which, once satisfied, need not be revisited. The nature of the consent (opportunities made available to data subject, opt in/opt out, and others) will continue to play a role in determining legitimate interest.&lt;/li&gt;&lt;/ol&gt;
&lt;h3&gt;Conclusion&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Replacing the purpose limitation principles with a use-based system as articulated above poses the danger of allowing governments and the private sector to carry out indiscriminate data collection under the blanket guise that any and all data may be of some use in the future. The harms-based approach has many merits and there is a stark need for more use of risk assessments techniques and privacy impact assessments in data governance. However, it is important that it merely adds to the existing controls imposed at data collection, and not replace them in their entirety. On the other hand, the legitimate interests principle, especially as put forth by Moerel and Prins, is more cognizant of the different factors at play — the inefficacy of existing purpose limitation principles, the need for businesses to use data for purposes unidentified at the stage of collection, and the need to ensure that it is not misused for indiscriminate collection and purposes. However, it also poses a much heavier burden on data controllers to take into account various factors before determining legitimate interest. If legitimate interest has to emerge as a realistic alternative to purpose limitation, there needs to be greater clarity on how data controllers must apply this principle.&lt;/p&gt;
&lt;h3&gt;Endnotes&lt;/h3&gt;
&lt;ol&gt;
&lt;li style="text-align: justify;"&gt;Prachi Shrivastava, “Privacy not a fundamental right, argues Mukul Rohatgi for Govt as Govt affidavit says otherwise,” Legally India, Jyly 23, 2015, http://www.legallyindia.com/Constitutional-law/privacy-not-a-fundamental-right-argues-mukul-rohatgi-for-govt-as-govt-affidavit-says-otherwise.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Rebecca Bowe, “Growing Mistrust of India’s Biometric ID Scheme,” Electronic Frontier Foundation, May 4, 2012, https://www.eff.org/deeplinks/2012/05/growing-mistrust-india-biometric-id-scheme.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Lisa Hayes, “Digital India’s Impact on Privacy: Aadhaar numbers, biometrics, and more,” Centre for Democracy and Technology, January 20, 2015, https://cdt.org/blog/digital-indias-impact-on-privacy-aadhaar-numbers-biometrics-and-more/.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;“India’s Surveillance State,” Software Freedom Law Centre, http://sflc.in/indias-surveillance-state-our-report-on-communications-surveillance-in-india/.&lt;/li&gt;
&lt;li&gt;“Internet Privacy in India,” Centre for Internet and Society, http://cis-india.org/telecom/knowledge-repository-on-internet-access/internet-privacy-in-india.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Vivek Pai, “Indian Government says it is still drafting privacy law, but doesn’t give timelines,” Medianama, May 4, 2016, http://www.medianama.com/2016/05/223-government-privacy-draft-policy/.&lt;/li&gt;
&lt;li&gt;Information Technology (Intermediaries Guidelines) Rules, 2011,&lt;br /&gt; http://deity.gov.in/sites/upload_files/dit/files/GSR314E_10511%281%29.pdf.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Discussion Points for the Meeting to be taken by Home Secretary at 2:30 pm on 7-10-11 to discuss the drat Privacy Bill, http://cis-india.org/internet-governance/draft-bill-on-right-to-privacy.&lt;/li&gt;
&lt;li&gt;Alan Westin, Privacy and Freedom (New York: Atheneum, 2015).&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;US Secretary’s Advisory Committee on Automated Personal Data Systems, Records, Computers and the Rights of Citizens, http://www.justice.gov/opcl/docs/rec-com-rights.pdf.&lt;/li&gt;
&lt;li&gt;OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data, http://www.oecd.org/sti/ieconomy/oecdguidelinesontheprotectionofprivacyandtransborderflowsofpersonaldata.htm&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Fred Cate, “The Failure of Information Practice Principles,” in Consumer Protection in the Age of the Information Economy, ed. Jane K. Winn (Burlington: Aldershot, Hants, England, 2006) http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1156972.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Amber Sinha and Scott Mason, “A Critique of Consent in Informational Privacy,” Centre for Internet and Society, January 11, 2016, http://cis-india.org/internet-governance/blog/a-critique-of-consent-in-information-privacy.&lt;/li&gt;
&lt;li&gt;Daniel Solove, “Privacy self-management and consent dilemma,” Harvard Law Review 126, (2013): 1880.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Jonathan Obar, “Big Data and the Phantom Public: Walter Lippmann and the fallacy of data privacy self management,” Big Data and Society 2(2), (2015), doi: 10.1177/2053951715608876.&lt;/li&gt;
&lt;li&gt;Supra Note 12.&lt;/li&gt;
&lt;li&gt;Supra Note 14.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Paul Ohm, “Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization” available at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1450006; Arvind Narayanan and Vitaly Shmatikov, “Robust De-anonymization of Large Sparse Datasets” available at https://www.cs.utexas.edu/~shmat/shmat_oak08netflix.pdf.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;D. Hirsch, “That’s Unfair! Or is it? Big Data, Discrimination and the FTC’s Unfairness Authority,” Kentucky Law Journal, Vol. 103, available at: http://www.kentuckylawjournal.org/wp-content/uploads/2015/02/103KyLJ345.pdf&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;A Marthews and C Tucker, “Government Surveillance and Internet Search Behavior”, available at http://ssrn.com/abstract=2412564; Danah Boyd and Kate Crawford, “Critical Questions for Big Data: Provocations for a cultural, technological, and scholarly phenomenon”, Information, Communication &amp;amp; Society, Vol. 15, Issue 5, (2012).&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Scott Mason, “Benefits and Harms of Big Data”, Centre for Internet and Society, available at http://cis-india.org/internet-governance/blog/benefits-and-harms-of-big-data#_ftn37.&lt;/li&gt;
&lt;li&gt;Cate, “The Failure of Information Practice Principles.”&lt;/li&gt;
&lt;li&gt;Solove, “Privacy self-management and consent dilemma,” 1882.&lt;/li&gt;
&lt;li&gt;Cate, “The Failure of Information Practice Principles.”&lt;/li&gt;
&lt;li&gt;Fred Cate and Viktor Schoenberger, “Notice and Consent in a world of Big Data,” International Data Privacy Law 3(2), (2013): 69.&lt;/li&gt;
&lt;li&gt;Solove, “Privacy self-management and consent dilemma,” 1883.&lt;/li&gt;
&lt;li&gt;Lokke Moerel, “Netherlands: Big Data Protection: How To Make The Draft EU Regulation On Data Protection Future Proof”, Mondaq, March 11. 2014, http://www.mondaq.com/x/298416/data+protection/Big+Data+Protection+How+To+Make+The+Dra%20ft+EU+Regulation+On+Data+Protection+Future+Proof%20al%20Lecture.&lt;/li&gt;
&lt;li&gt;Moerel, “Netherlands: Big Data Protection.”&lt;/li&gt;
&lt;li&gt;Centre for Information Policy Leadership, “A Risk-based Approach to Privacy: Improving Effectiveness in Practice,” Hunton and Williams LLP, June 19, 2014, https://www.informationpolicycentre.com/uploads/5/7/1/0/57104281/white_paper_1-a_risk_based_approach_to_privacy_improving_effectiveness_in_practice.pdf.&lt;/li&gt;
&lt;li&gt;Lokke Moerel and Corien Prins, “Privacy for Homo Digitalis: Proposal for a new regulatory framework for data protection in the light of Big Data and Internet of Things”, Social Science Research Network, May 25, 2016, http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2784123.&lt;/li&gt;
&lt;li&gt;EU Directive 95/46/EC – The Data Protection Directive, https://www.dataprotection.ie/docs/EU-Directive-95-46-EC-Chapter-2/93.htm.&lt;/li&gt;
&lt;li&gt;Article 29 Data Protection Working Party, “Opinion 06/2014 on the notion of legitimate interests of the data controller under Article 7 of Directive 95/46/EC,” http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp217_en.pdf.&lt;/li&gt;
&lt;li&gt;Frederico Ferretti, “Data protection and the legitimate interest of data controllers: Much ado about nothing or the winter of rights?,” Common Market Law Review 51(2014): 1-26. http://bura.brunel.ac.uk/bitstream/2438/9724/1/Fulltext.pdf.&lt;/li&gt;
&lt;li&gt;Sinha and Mason, “A Critique of Consent in Informational Privacy.”&lt;/li&gt;
&lt;li&gt;Moerel and Prins, “Privacy for Homo Digitalis.”&lt;/li&gt;&lt;/ol&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/digital-policy-portal-july-13-2016-new-approaches-to-information-privacy-revisiting-the-purpose-limitation-principle'&gt;https://cis-india.org/internet-governance/blog/digital-policy-portal-july-13-2016-new-approaches-to-information-privacy-revisiting-the-purpose-limitation-principle&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-11-09T13:54:28Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/bloomberg-quint-murali-neelakantan-swaraj-barooah-swagam-dasgupta-torsha-sarkar-august-14-2018-national-health-stack-data-for-datas-sake-a-manmade-health-hazard">
    <title>National Health Stack: Data For Data’s Sake, A Manmade Health Hazard</title>
    <link>https://cis-india.org/internet-governance/blog/bloomberg-quint-murali-neelakantan-swaraj-barooah-swagam-dasgupta-torsha-sarkar-august-14-2018-national-health-stack-data-for-datas-sake-a-manmade-health-hazard</link>
    <description>
        &lt;b&gt;On Oct. 5, 2017, an HIV positive woman was denied admission in Hyderabad’s Osmania General Hospital even though she was entitled to free treatment under India’s National AIDS Control Organisation programme. Another incident around the same time witnessed a 24-year-old pregnant woman at Tikamgarh district hospital in Madhya Pradesh being denied treatment by hospital doctors once she tested positive for HIV. The patient reportedly delivered the twins outside the maternity ward after she was turned away by the hospital, but her newborn twin girls died soon after.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The op-ed was &lt;a class="external-link" href="https://www.bloombergquint.com/opinion/2018/08/14/data-for-datas-sake-a-manmade-health-hazard#gs.bT20zK4"&gt;published in Bloomberg Quint&lt;/a&gt; on August 14, 2018.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Apart  from facing the severity of their condition, patients afflicted with  diseases such as HIV, tuberculosis, and mental illnesses, are often  subject to social stigma, sometimes even leading to the denial of  medical treatment. Given this grim reality would patients want their  full medical history in a database?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  ‘National Health Stack’ as described by the NITI Aayog in its  consultation paper, is an ambitious attempt to build a digital  infrastructure with a “deep understanding of the incentive structures  prevalent in the Indian healthcare ecosystem”. If the government is to  create a database of individuals’ health records, then it should  appreciate the differential impact that it could have on the patients.&lt;/p&gt;
&lt;blockquote&gt;The collection of health data, without sensitisation and  accountability, has the potential to deny healthcare to the vulnerable.&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;We  have innumerable instances of denial of services due to Aadhaar and  there is a real risk that another database will lead to more denial of  access to the most vulnerable.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Earlier,  we had outlined some key aspects of the NHS, the ‘world’s largest’  government-funded national healthcare scheme. Here we discuss some of  the core technical issues surrounding the question of data collection,  updating, quality, and utilisation.&lt;/p&gt;
&lt;h3&gt;Resting On A Flimsy Foundation: The Unique Health ID&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The  National Health Stack envisages the creation of a unique ID for  registered beneficiaries in the system — a ‘Digital Health ID’. Upon the  submission of a ‘national identifier’ and completion of the Know Your  Customer process, the patient would be registered in the system, and a  unique health ID generated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This  seemingly straightforward process rests on a very flimsy foundation.  The base entry in the beneficiary registry would be linked to a ‘strong  foundational ID’. Extreme care needs to be taken to ensure that this is  not limited to an Aadhaar number. Currently, the unavailability of  Aadhaar would not be a ground for denial of treatment to a patient only  for their first visit; the patient must provide Aadhaar or an Aadhaar  enrolment slip to avail treatment thereafter. This suggests that the  national healthcare infrastructure will be geared towards increasing  Aadhaar enrollment, with the unstated implication that healthcare is a  benefit or subsidy — a largess of government, and not, as the courts  have confirmed, a fundamental right.&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;Not  only is this project using government-funded infrastructure to deny its  citizens the fundamental right to healthcare, it is using the desperate  need of the vulnerable for healthcare to push the ‘Aadhaar’ agenda.&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Any pretence that Aadhaar is voluntary is slowly fading with the government mandating it at every step of our lives.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img alt="Aadhaar Seva kendra. (Source: Aadhaar Official Account/Facebook)&amp;amp;nbsp;" class="qt-image" src="https://images.assettype.com/bloombergquint%2F2018-01%2Fd7f4b53a-b069-484d-8c28-511c516aa4d5%2F3a192ed0-8a18-4518-95be-ac5234239e94.jpg?w=480&amp;amp;auto=format%2Ccompress" /&gt;&lt;/p&gt;
&lt;div class="visualClear" style="text-align: justify; "&gt;Aadhaar Seva kendra. (Source: Aadhaar Official Account/Facebook&lt;/div&gt;
&lt;div class="visualClear" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;h3&gt;Is The Health ID An Effective And Unique Identifier?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Even  if we choose to look past the fact that the validity of Aadhaar is  still pending the test of legality before the apex court, a foundational  ID would mean that the data contained within that ID is unique,  accurate, incorruptible, and cannot be misused. These principles,  unfortunately, have been compromised by the UIDAI in the Aadhaar project  with its lack of uniqueness of identity (i.e, fake IDs and duplicity),  failure to authenticate identity, numerous alleged data leaks (‘alleged’  because UIDAI maintains that there haven’t been any leaks), lack of  connectivity to be able to authenticate identity and numerous instances  of inaccurate information which cannot be corrected.&lt;/p&gt;
&lt;p&gt;Linking something as crucial and basic as healthcare data with such a database is a potential disaster.&lt;/p&gt;
&lt;p&gt;There is a real risk that incorrect linking could cause deaths or inappropriate medical care.&lt;/p&gt;
&lt;h3&gt;The High Risk Of Poor Quality Data&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The  NITI Aayog paper envisages several expansive databases that are capable  of being updated by different entities. It includes enrollment and  updating processes but seems to assume that all these extra steps will  be taken by all the relevant stakeholders and does not explain the  motivation for stakeholders to do so.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In  a country where government doctors, hospitals, wellness centres, etc  are overburdened and understaffed, this reliance is simply not credible.  For instance, all attributes within the registries are to be digitally  signed by an authorised updater, there must be an audit trail for all  changes made to the registries, and surveyors will be tasked with  visiting providers in person to validate the data. Identifying these  precautions as measures to assure accurate data is a great step towards  building a national health database, but this seems an impossible task.&lt;/p&gt;
&lt;blockquote&gt;Who are these actors and what will incentivise them to ensure the accuracy and integrity of data?&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;In  other words, what incentive and accountability structures will ensure  that data entry and updating is accurate, and not approached from a more  ‘&lt;i&gt;jugaad&lt;/i&gt;’ ‘let’s just get this done for the sake of it’  attitude that permeates much of the country. How will patients have  access to the database to be able to check its accuracy? Is it possible  for a patient (who will presumably be ill) to gain easy access to an  updater to change their data? If so, how? It is worth noting that the  patient’s ‘right’ to check her data assumes that they have access to a  computer that is connected to the internet as well as a good level of  digital literacy, which is not the case in India for a significant  section of the population. Even data portability loses its potential  benefits if the quality of data on these registries is not reliable. In  this case, healthcare providers will need to verify their patients’  health history using physical records instead, rendering the stack  redundant.&lt;/p&gt;
&lt;p&gt;Who will be liable to the patient for misdiagnosis based on the database?&lt;/p&gt;
&lt;p&gt;&lt;img alt="A sonographic image is displayed on a monitor as a patient undergoes an ultrasound scan in Bikaner, Rajasthan, India. (Photographer: Prashanth Vishwanathan/Bloomberg)" class="qt-image" src="https://images.assettype.com/bloombergquint%2F2018-08%2Fe1659408-49ba-4188-b57e-aef377c69eb0%2Fm1291107.jpg?w=480&amp;amp;auto=format%2Ccompress" /&gt;&lt;/p&gt;
&lt;div class="visualClear"&gt;A sonographic image is displayed on a monitor as a patient undergoes an  ultrasound scan in Bikaner, Rajasthan, India. (Photographer: Prashanth  Vishwanathan/Bloomberg)&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;Leaving  the question of accountability vague opens updaters to the possibility  of facing dangerous and unnecessarily punitive measures in the future.  The NITI Aayog paper fails to address this key issue which arose  recently. Despite being a notifiable disease, there are reports that  numerous doctors from the private sector failed to notify or update TB  cases to the Ministry of Health and Family Welfare ostensibly on the  grounds that they did not receive consent from their patients to share  their information with the government. This was met with a harsh  response from the government which stated that clinical establishment  that failed to notify tuberculosis patients would face jail time.  According to a few doctors, the government’s new move would coerce  patients to go to ‘underground clinics’ to receive treatment discreetly  and hence, would not solve the issue of TB.&lt;/p&gt;
&lt;blockquote&gt;The document also offers no specific recommended procedures regarding how inaccurate entries will be corrected or deleted.&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;It  is then perhaps not a stretch to imagine that these scenarios would  affect the quality of the data stored; defeating NITI Aayog’s objective  of researchers using the stack for high-quality medical data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  reason why the quality and integrity of data is at the head of the  table is that all the proposed applications of the NHS (analytics, fraud  detection etc.) assume a high quality, accurate dataset. At the same  time, the enrolment process, updating process and disclosed measures to  ensure data quality will effectively lead to poor quality data. If this  is the case, then applications derived from the NHS dataset should  assume an imperfect data, rather than an accurate dataset, which should  make one wonder if no data is better than data that is certainly  inaccurate.&lt;/p&gt;
&lt;h3&gt;Lack Of Data Utilisation Guidelines&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Issues  with data quality are exacerbated depending on how and where it is  used, and who uses it. The paper has identified some users to be  health-sector stakeholders such as healthcare providers (hospitals,  clinics, labs etc), beneficiaries, doctors, insurers and accredited  social health activists but misses laying down utilisation guidelines.  The foresight to create a dataset that can be utilised by multiple  actors for numerous applications is commendable, but potentially  problematic -- especially if guidelines on how this data is to be used  by stakeholders (especially the private sector) are ignored.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In  order to bridge this knowledge gap, India has the opportunity to learn  from the legal precedent set by foreign institutions. As an example, one  could examine the Health Information Technology for Economic and  Clinical Health Act (HITECH) and the Health Insurance Portability and  Accountability Act (HIPAA) in the U.S. which sets out strict guidelines  for how businesses are to handle sensitive health data in order to  maintain the individual’s privacy and security. It goes one step further  to also lay down incentive and accountability structures in order that  business associates necessarily report security breaches to their  respective covered entities.&lt;/p&gt;
&lt;blockquote&gt;If  we do not take necessary precautions now, we not only run the risk of  poor security and breach of privacy but of inaccurate data that renders  the national health data repository a health risk for the whole patient  population.&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;There’s  also the lack of clarity on who is meant to benefit from using such a  database or whether the benefits are equal to all stakeholders, but more  on that in a subsequent piece.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img alt="A medical team uses a glucometer to check the blood glucose level of a patient at a mobile clinic in Pancharala, on the outskirts of Bengaluru, India. (Photographer: Dhiraj Singh/Bloomberg)" class="qt-image" src="https://images.assettype.com/bloombergquint%2F2018-08%2F5e7e7b41-1513-4161-b195-5b8a77c6e4f1%2F314780590_1_20.jpg?w=480&amp;amp;auto=format%2Ccompress" /&gt;&lt;/p&gt;
&lt;div class="visualClear" style="text-align: justify; "&gt;A medical team uses a glucometer to check the blood glucose level of a  patient at a mobile clinic in Pancharala, on the outskirts of Bengaluru,  India. (Photographer: Dhiraj Singh/Bloomberg)&lt;/div&gt;
&lt;div class="visualClear" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;h3&gt;It’s Your Recipe, You Try It First!&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;If  the NITI Aayog and the government are sure that there is a need for a  national healthcare database, perhaps they can start using the Central  Government Health Scheme (which includes all current and retired  government employees and their families) as a pilot scheme for this.  Once the software, database and the various apps built on it are found  to be good value for money and patients benefit from excellent treatment  all over the country, it could be expanded to those who use the  Employees’ State Insurance system, and then perhaps to the armed forces.  After all, these three groups already have a unique identifier and  would benefit from the portability of healthcare records since they are  likely to be transferred and posted all over the country. If, and only  if, it works for these groups and the claimed benefits are observed,  then perhaps it can be expanded to the rest of the country’s healthcare  systems.&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Murali  Neelakantan is an expert in healthcare laws. Swaraj Barooah is Policy  Director at The Centre for Internet and Society. Swagam Dasgupta and  Torsha Sarkar are interns at The Centre for Internet and Society.&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/bloomberg-quint-murali-neelakantan-swaraj-barooah-swagam-dasgupta-torsha-sarkar-august-14-2018-national-health-stack-data-for-datas-sake-a-manmade-health-hazard'&gt;https://cis-india.org/internet-governance/blog/bloomberg-quint-murali-neelakantan-swaraj-barooah-swagam-dasgupta-torsha-sarkar-august-14-2018-national-health-stack-data-for-datas-sake-a-manmade-health-hazard&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Murali Neelakantan, Swaraj Barooah, Swagam Dasgupta and Torsha Sarkar</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Healthcare</dc:subject>
    

   <dc:date>2018-09-16T05:01:18Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/first-post-march-16-nimish-sawant-nasscom-chief-saying-full-data-protection-isnt-possible-should-wake-us-from-our-digital-slumber">
    <title>Nasscom chief saying full data protection isn’t possible should wake us from our digital slumber</title>
    <link>https://cis-india.org/internet-governance/news/first-post-march-16-nimish-sawant-nasscom-chief-saying-full-data-protection-isnt-possible-should-wake-us-from-our-digital-slumber</link>
    <description>
        &lt;b&gt;Considering India is rapidly moving towards a digital economy, the hurdles not withstanding, data and identity security are topics which have to be taken very seriously. Since the demonetisation, a large part of the population who would never bother with digital transactions has suddenly come online. But there is no such thing as complete security of personal data, according to Nasscom chief R Chandrashekhar.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;This was published by &lt;a class="external-link" href="http://tech.firstpost.com/news-analysis/nasscom-chief-saying-full-data-protection-isnt-possible-should-wake-us-from-our-digital-slumber-367183.html"&gt;First Post&lt;/a&gt; on March 16, 2017. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Attending the World Consumer Rights Day, R Chandrashekhar  said that personal data of online consumers cannot be completely secure  and stressed on the need to have strict enforcement of consumer  protection laws. Speaking to &lt;i&gt;PTI,&lt;/i&gt; Chandrashekhar said, “More  than 3 million credit card data details were misused recently. Let us  face it, these kind of security breaches will take place. There is  nothing called fully perfect security in IT.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;It’s high time we call a spade, a spade&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;img alt="Image: PIB" class="wp-image-367245 size-full" height="360" src="http://tech.firstpost.com/wp-content/uploads/2017/03/RChandrasekhar_PIB380.jpg" width="640" /&gt;&lt;br /&gt;&lt;/b&gt;R Chandrashekhar, President Nasscom. Image: PIB&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Coming from the head of Nasscom, this announcement pertaining to security is very important. According to Chandrashekhar one cannot expect complete cyber security, but there are definitely ways in which such attacks and incidents can be minimised. He very rightly said that that protecting the online consumer data, specially looking at how rapidly e-commerce is growing in the country, is of prime importance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One cannot help but agree with Chandrashekhar, specially considering the fact India &lt;a href="http://tech.firstpost.com/news-analysis/demonetisation-privacy-laws-need-to-be-in-place-before-giving-the-biggest-push-to-digital-transactions-348478.html"&gt;&lt;b&gt;does not have a privacy law ecosystem&lt;/b&gt;&lt;/a&gt; that is present in countries such as the US and the UK, where online consumer protection is taken very seriously. &lt;a href="http://tech.firstpost.com/news-analysis/facebook-asked-to-delete-whatsapp-user-data-in-germany-over-data-protection-law-infringement-337708.html"&gt;&lt;b&gt;Germany&lt;/b&gt;&lt;/a&gt; and &lt;a href="https://www.google.co.in/url?sa=t&amp;amp;rct=j&amp;amp;q=&amp;amp;esrc=s&amp;amp;source=web&amp;amp;cd=5&amp;amp;cad=rja&amp;amp;uact=8&amp;amp;ved=0ahUKEwjljYHpzNrSAhUkSI8KHa6oB_MQFgg2MAQ&amp;amp;url=http%3A%2F%2Ftech.firstpost.com%2Fnews-analysis%2Ffrance-fines-google-150000-euros-over-data-privacy-216266.html&amp;amp;usg=AFQjCNE15FPlAi9rR5yCXNzS_hnua81QAw&amp;amp;sig2=GVGgF_cxGNhXo-SJhLo4Gg&amp;amp;bvm=bv.149397726,d.c2I" rel="nofollow"&gt;&lt;b&gt;other EU nations&lt;/b&gt;&lt;/a&gt; have always been at the forefront, when it comes to protecting data  privacy, and it has ensured that consumer-facing technology companies do  not run roughshod when it comes to protecting user data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Chandrashekhar stated that there was no need for separate  regulations for e-commerce sites, but the priority was ensuring means to  enforce consumer laws in the digital world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Lack of dedicated privacy laws&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to cyberlaw and cybersecurity expert, Pavan  Duggal, “Going forward, there is an urgent need for India to take a  strong view on privacy in terms of legislative frameworks.  Unfortunately, at the time of writing, &lt;a href="http://tech.firstpost.com/news-analysis/privacy-protection-need-for-proactive-cyber-legal-approaches-in-india-357248.html"&gt;&lt;b&gt;India does not have a dedicated law on privacy&lt;/b&gt;&lt;/a&gt;.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img alt="Image: Foamy Media" class="wp-image-353936 size-full" height="360" src="http://tech.firstpost.com/wp-content/uploads/2016/12/social-media.jpeg" width="640" /&gt;&lt;br /&gt;Image: Foamy Media&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Social media websites for instance have a lot of user data. But what happens when they suddenly change their privacy policies? For instance, a lot of users signed on to WhatsApp when it was an independent company. But post the Facebook acquisition, there have been a lot of instances where WhatsApp has updated its terms and conditions to suit its parent Facebook.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;That’s not completely illegal one may say. Loss of privacy  is a price you pay for free services. But what if, I as a consumer of  WhatsApp &lt;a href="http://tech.firstpost.com/news-analysis/german-consumer-rights-group-accuses-whatsapp-of-illegally-sharing-user-data-with-facebook-359979.html"&gt;&lt;b&gt;do not want the app to share any of my data with Facebook&lt;/b&gt;&lt;/a&gt;?  The only option I am left with is to delete WhatsApp. But then again, I  do not know if my data is also deleted from WhatsApp servers or it has  already been shared. Social media apps, only let you know what updates  are being added. Consent is only required to update the app. You can  stall that, up to a point. But there will come a time when you will have  to update an app. Then by default you have given approval to all the  terms and conditions associated with the app.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Two students had challenged WhatsApp’s revision to its  privacy policy before Delhi High Court. The Court dismissed the petition  insisting that users could opt out by &lt;a href="http://www.thehindu.com/news/cities/Delhi/delete-or-share-high-court-tells-whatsapp-users/article9143285.ece" rel="nofollow"&gt;&lt;b&gt;deleting their accounts&lt;/b&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When a similar challenge was mounted before the authorities  in UK, Facebook had to put a pause on their data sharing – and this was  because of its strong data protection policy. Under the UK data  protection law, the company has to inform the authority established  under the Act of any changes in the use of user data. In the case of  WhatsApp, the &lt;a href="http://tech.firstpost.com/news-analysis/why-india-failed-to-prevent-whatsapp-data-sharing-with-facebook-while-uk-succeeded-346115.html"&gt;&lt;b&gt;UK authority objected to such sharing.&lt;/b&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Aadhaar – the 12-digit biometric storehouse&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://tech.firstpost.com/wp-content/uploads/2016/03/aadhar_251002219381.jpg"&gt;&lt;img alt="aadhaar_251002219381" class="wp-image-303751 size-full aligncenter" height="360" src="http://tech.firstpost.com/wp-content/uploads/2016/03/aadhar_251002219381.jpg" width="640" /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aadhaar card is being used for many financial and non  financial transactions. Also the Aadhaar number associated with an  individual also holds a lot of personal and biometric data. So when  recently, there was news about a possible Aadhaar data breach when &lt;a href="http://tech.firstpost.com/news-analysis/aadhaar-data-breach-uidai-finds-multiple-transactions-done-with-the-same-fingerprint-364155.html"&gt;&lt;b&gt;UIDAI filed a police complaint&lt;/b&gt;&lt;/a&gt; against Axis Bank, business correspondent Suvidhaa Infoserve and e-sign provider eMudhra, it was naturally a shock to many.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unlike a password which can be changed, with biometric  information there is no scope to do that if it is compromised. Although  UIDAI claims that there are &lt;a href="http://tech.firstpost.com/news-analysis/aadhaar-is-being-used-by-few-corporates-for-salary-disbursements-but-the-potential-is-immense-361749.html"&gt;&lt;b&gt;multiple levels of security and firewalls&lt;/b&gt;&lt;/a&gt; to ensure there is no breach of Aadhaar information of an individual,  one can only hope that it is robust enough to withstand any attack.  Collection of biometric data by the government to form a database, for  instance, was debated and ultimately not used in the UK.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash, policy director of the Centre for Internet  and Society, expressed concern about the pace at which we are  progressing when it comes to having a legal and regulatory framework  when it comes to the Digital India push. “While the security  architecture of Aadhaar Enabled Payment Systems (AEPS) might in itself  be good, the idea of providing your fingerprints to merchants for  financial transactions is a terrible idea since that is like asking you  to give your bank password to a merchant, and the merchant can reuse  that password, and you can’t ever change the password,” said Prakash.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Enforcing the correct processes&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Last year, a malware affected the systems of Hitachi Payment  Services, which provides back end services to ATM machines and Point of  Sale nodes across India. As a result of this, around &lt;b&gt;&lt;a href="http://tech.firstpost.com/news-analysis/32-lakh-debit-cards-compromised-affected-banks-include-sbi-hdfc-yes-axis-bob-and-icici-342220.html" target="_blank"&gt;32 lakh debit cards were compromised&lt;/a&gt;&lt;/b&gt; including those issued by SBI, HDFC, Yes Bank, Axis, BOB and ICICI. Security experts and consultants have pointed out &lt;b&gt;&lt;a href="http://tech.firstpost.com/news-analysis/banks-need-to-switch-to-fully-encrypted-security-solutions-to-avoid-security-breaches-343696.html" target="_blank"&gt;various holes in the electronic transaction systems&lt;/a&gt;&lt;/b&gt; in place in India. Intel has also warned that &lt;b&gt;&lt;a href="http://tech.firstpost.com/news-analysis/demonetisation-security-experts-warn-that-atms-are-easy-targets-for-hackers-351182.html" target="_blank"&gt;ATM machines in India&lt;/a&gt;&lt;/b&gt; are vulnerable to malicious attacks. Intel points out that countries in  the Asia Pacific region are developing and are particularly vulnerable  because of old systems and machines being used.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://tech.firstpost.com/wp-content/uploads/2016/12/atm-queue-demonetisation.jpg"&gt;&lt;img alt="Image: REUTERS/Amit Dave " class="wp-image-353328" height="360" src="http://tech.firstpost.com/wp-content/uploads/2016/12/atm-queue-demonetisation.jpg" width="640" /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;div class="prodtxtinf" style="text-align: justify; "&gt;Image: REUTERS/Amit Dave&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;According to Mahesh Patel, president and group CTO, AGS  Transact Technologies this was more of a governance issue of the data  centre than any technical error. “It is not about the software, but it  is about the processes and procedures you put in place to ensure that  the system is secure. Everything from physical security to computing  security to admin management, etc should be process driven. So somewhere  there could have been a weak link there. Cloud has to be secure and  encrypted which suffices the use case of payments. This cloud is  different from the ones used by e-commerce sites to display all their  products,” said Patel.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We may have the best of software and security measures, but  ensuring that they are implemented the right way is equally important.  Plugging the loopholes in current regulations is also important.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Existing laws and regulations, not enough&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to Duggal, “The Information Technology Act, 2000  hardly has effective provisions to protect any data and personal privacy  in the digital ecosystem. The Indian Government needs to come up with  strong privacy law which can protect both personal privacy and data  privacy in an effective manner.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One may find it really shocking to hear the head of Nasscom  saying something to the extent that full data protection for online  consumers is not possible, but there is definitely truth to the matter.  It will require concerted efforts from not only regulators, governments,  digital wallet players and banking industry to come up with these  privacy laws, but also you the consumer has to ensure that you are aware  of the dangers lurking in the digital world. Educating oneself of the  various ways in which your data can be compromised is a good way to  protect your online self.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Because, let’s face it, for all practical purposes if you are online, your &lt;a href="http://tech.firstpost.com/news-analysis/privacy-is-dead-stop-whining-and-get-some-real-work-done-357090.html"&gt;&lt;b&gt;privacy is dead&lt;/b&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span class="tags"&gt; &lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/first-post-march-16-nimish-sawant-nasscom-chief-saying-full-data-protection-isnt-possible-should-wake-us-from-our-digital-slumber'&gt;https://cis-india.org/internet-governance/news/first-post-march-16-nimish-sawant-nasscom-chief-saying-full-data-protection-isnt-possible-should-wake-us-from-our-digital-slumber&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>WhatsApp</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-03-17T01:47:25Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/hindustan-times-neelam-pandey-aloke-tikku-july-15-2016-mandatory-aadhaar-card-for-govt-scholarships-violates-sc-order">
    <title>Mandatory Aadhaar card for govt scholarships violates SC order </title>
    <link>https://cis-india.org/internet-governance/news/hindustan-times-neelam-pandey-aloke-tikku-july-15-2016-mandatory-aadhaar-card-for-govt-scholarships-violates-sc-order</link>
    <description>
        &lt;b&gt;There seems to be no end to the government’s legal troubles.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Neelam Pandey and Aloke Tikku was &lt;a class="external-link" href="http://www.hindustantimes.com/india-news/mandatory-aadhaar-card-for-govt-scholarships-violates-sc-order/story-2tlXAiy9xYtZBokkhm52pN.html"&gt;published in the Hindustan Times&lt;/a&gt; on July 15, 2016. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The human resource development (HRD) ministry has made Aadhaar mandatory for government scholarship and fellowship from this academic year, a move that violates the Supreme Court’s order.&lt;br /&gt;&lt;br /&gt;Under this decision, the government will transfer the funds to the students’ bank accounts only after they submit their Aadhaar number.&lt;br /&gt;&lt;br /&gt;The court had last August barred the government from using Aadhaar for any purpose other than distributing food grain and cooking fuel such as kerosene and LPG. The SC had gone further to rule that production of Aadhaar would not be condition for obtaining any benefits due to a citizen.&lt;br /&gt;&lt;br /&gt;It was this SC order that prompted the government to push the Aadhaar law through Parliament to ensure that the court’s restriction did not come in the way of expanding the direct benefit transfer project.&lt;br /&gt;&lt;br /&gt;The law – that was passed by Parliament – gave the government powers to make Aadhaar mandatory for receiving any benefit, facility or service that involved any expenditure from the public exchequer.&lt;br /&gt;&lt;br /&gt;But most provisions of the Aadhaar law have not come into force yet.&lt;br /&gt;&lt;br /&gt;This week, it notified provisions that enabled it to appoint the chairperson of the Unique Identification Authority of India (UIDAI) that issues the 12-digit unique number and set up offices in cities outside Delhi.&lt;br /&gt;&lt;br /&gt;“This appears to be contempt of court,” said Sunil Abraham, head of the Bengaluru-headquartered advocacy group, Centre for Internet and Society.&lt;br /&gt;&lt;br /&gt;Thomas Mathew, one of the petitioners in the case pending before the Supreme Court, agreed. “I am going to move a contempt petition against the HRD ministry and UGC,” Mathew said, pointing that oil companies were also forcing people to get Aadhaar.&lt;br /&gt;&lt;br /&gt;The UGC directive to central universities sets July-end as the deadline for scholars at central universities to get their Aadhaar number. Many scholars who did not have an Aadhaar number said the fellowship were an important source of income for them to get by.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/hindustan-times-neelam-pandey-aloke-tikku-july-15-2016-mandatory-aadhaar-card-for-govt-scholarships-violates-sc-order'&gt;https://cis-india.org/internet-governance/news/hindustan-times-neelam-pandey-aloke-tikku-july-15-2016-mandatory-aadhaar-card-for-govt-scholarships-violates-sc-order&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-07-30T15:55:38Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/ndtv-march-20-2016-making-aadhaar-mandatory-gamechanger-for-governance">
    <title>Making Aadhaar Mandatory: Gamechanger For Governance? </title>
    <link>https://cis-india.org/internet-governance/news/ndtv-march-20-2016-making-aadhaar-mandatory-gamechanger-for-governance</link>
    <description>
        &lt;b&gt;Why a programme that both the Congress and the BJP have hailed as transformational has divided Parliament this week? The Aadhaar Bill which was passed this week aims at facilitating government benefits and subsidies to citizens said Finance Minister Arun Jaitley.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Yet it became a reason for the Rajya Sabha to raise key questions. On the panel - Chandan Mitra, Rajya Sabha MP, BJP; Ajoy Kumar, Spokesperson, Congress; Tathagat Sathapathy, Lok Sabha MP, Biju Janata Dal; Rajeev Chandrashekhar, Rajya Sabha MP; Sunil Abraham, Executive Director, Centre for Internet &amp;amp; Society; and Shekhar Gupta, Senior Journalist.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Video&lt;/h3&gt;
&lt;p&gt;&lt;iframe width="420" src="https://www.youtube.com/embed/BY_OPw2ErmM" frameborder="0" height="315"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://www.ndtv.com/video/player/the-ndtv-dialogues/making-aadhaar-mandatory-gamechanger-for-governance/408648"&gt;Link to NDTV website&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/ndtv-march-20-2016-making-aadhaar-mandatory-gamechanger-for-governance'&gt;https://cis-india.org/internet-governance/news/ndtv-march-20-2016-making-aadhaar-mandatory-gamechanger-for-governance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-03-24T06:50:10Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-hindu-march-17-2015-aadhaar-an-identity-crisis">
    <title>Live Chat: Aadhaar: An identity crisis? </title>
    <link>https://cis-india.org/internet-governance/news/the-hindu-march-17-2015-aadhaar-an-identity-crisis</link>
    <description>
        &lt;b&gt;The Aadhaar card is not compulsory for citizens and "no person should be denied any benefits or ‘suffer’ for not having the Aadhaar cards issued by Unique Identification Authority of India," the Supreme Court ruled on Monday. &lt;/b&gt;
        &lt;p class="body" style="text-align: justify; "&gt;The live chat was &lt;a class="external-link" href="http://www.thehindu.com/news/national/the-debate-around-aadhaar-card/article7003376.ece"&gt;published in the Hindu&lt;/a&gt; on March 17, 2015. Sunil Abraham took part in the discussions.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;Four years after Aadhaar was launched – and touted as a panacea to  access social services and subsidies – its users continue to be dogged  by an array of problems ranging from technical glitches to procedural  delays. And those who do not have an Aadhaar card find themselves  quizzed by government authorities.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;i&gt;The Hindu&lt;/i&gt;’s Tamil Nadu edition today &lt;a href="http://www.thehindu.com/news/cities/chennai/issues-in-obtaining-aadhaar-from-glitches-to-lack-of-forms/article7000268.ece" target="_self"&gt;highlighted the challenges&lt;/a&gt; ordinary citizens - both those who have cards and those who do not –  face, be it from non-availability of application forms or glitches in  the biometrics process.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;We will be hosting a live chat on Aadhaar at 5 pm today. You can pose  questions and share your views with Sunil Abraham, Executive Director of  Bangalore-based research organisation, Centre for Internet and Society;  K. Gopinath, Professor at the Computer Science and Automation  Department at the Indian Institute of Science (IISc) and The Hindu’s K.  Venkatraman.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Comment From Anon &lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;What could have happened such that the current government, who were once  in the opposition, were members of the parliamentary committee that  strongly opposed UIDAI, now suddenly wants to use it everywhere? What  could have transpired such that the PM got so convinced that it would  help its citizens more than it could potentially harm?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Sunil Abraham: &lt;/b&gt;Usually the party that is in power is  pro-surveillance and anti-censorship and the opposition is pro-privacy  and pro-free speech. After the elections - if the parties swap positions  as a result of the mandate - then they usually also swap positions on  surveillance and censorship. This phenomenon is not specific to India.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;K. Gopinath:&lt;/b&gt; The leakage in the current models is very high. Hence, the attraction.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The issue earlier was whether there was some costs to the use of sw  (esp. proprietary) from outside the country. Probably, these have been  addressed.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Comment From Saurabh &lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Aadhaar was supposed to be a good 2 factor authentication mechanism, what happens to it now ?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Sunil Abraham:&lt;/b&gt; Aadhaar architecture was designed to allow for  multiple authentication factors. Unfortunately biometrics is a poor  authentication factor since it cannot be revoked. Any two-factor  authentication scheme where one factor is biometrics is in reality only a  one-factor scheme. Pin code as with credit cards and debit cards would  have been much more secure for authentication.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;K Venkataramanan:&lt;/b&gt; It will continue to be relevant, but is unlikely to be mandatory for quite some time.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;K. Gopinath:&lt;/b&gt; Real-time 2-factor auth (biometrics, signatures) are not easy, esp over Internet, and would require a much longer rollout&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Comment From Saurabh &lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;I did not get Aadhar for myself or my family. Does this mean, I will not have to as yet.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Sunil Abraham:&lt;/b&gt; As per the UIDAI - Aadhaar is not mandatory. Also  according to the latest remarks from the Supreme Court - Aadhaar should  not be made mandatory without enabling law. But many state and central  government agencies have ignored the comments made by the SC and have  made Aadhaar mandatory for various programmes and schemes.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;The Hindu:&lt;/b&gt; Is Aadhaar virtually redundant now following the SC order? Nothing more than an expensive experiment?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;K. Gopinath: &lt;/b&gt;I think it will be used as an addl auth mechanism  (just like elec./ph. receipts). May be once the technology is demo'ed  properly (it has not been done seriously anywhere else), it will be  taken up again.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Comment From Abubacker &lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;I am an NRI and need to have Aadhaar Card? How to obtain Appointmet - I am from Tuticorin, Tamil Nadu&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;K Venkataramanan:&lt;/b&gt; Your family member or representative living in  Tuticorin may apply for Aadhaar through the local body. It may be  possible to get a date for recording biometrics. However, you have to  come down here for recording biometric details.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Comment From Kishore J &lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Why is Govt. not able to legalize the Aadhar, I'm assuming the only  reason Supreme court keeps blocking it is because its not a law passed  by Parliament ?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;K. Gopinath:&lt;/b&gt; SC goes by the constitution. If there is some concern someone is being "excluded", they will block it.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Sunil Abraham: &lt;/b&gt;The NIA bill was proposed in parliament and then  referred to a Standing Committee. Our summary and detailed feedback to  the Bill is available here: http://cis-india.org/intern... The Standing  Committee harshly criticized the Bill. See:  http://164.100.47.134/lsscommittee/Finance/42%20Report.pdf After which  the Bill has not been reworked by the UIDAI or the Planning Commission  /Niti Aayog for re-presentation to the Parliament.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Sunil Abraham:&lt;/b&gt; No - it is not just an expensive experiment. It is  much more dangerous - it is what security experts call a Honey Pot. A  centralized repository of biometrics harvested from residents of India.  These biometrics can be used to authenticate transactions in the UIDAI  database and other services. If there is a breach - then this huge  collection of authentication factors will end us in the hands of  criminal elements or some foreign state.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Comment From vaz &lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Aadhar is a joke, i have so many IDs and i cannot get any benefits out  of it, it is simply wasting time, if Govt really want mandate make it  easy for people, i pay taxes and Govt should treat me like one , i can  not waste my time standing in queues to get that card, get me time slot  and don't waste my time.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Sunil Abraham:&lt;/b&gt; This is because the process of registration has  been outsourced to private agencies. These private agencies have futher  outsourced to others and so on and so forth. Consequently, there is very  poor management and quality control by these agencies. If indeed  corruption was a priority - we should have tackled high-ticket  corruption first. We could have had biometric registration just for only  the politicians and bureaucrats. We could use biometric authentication  with them to create a non-repudiable audit trail of subsidies flowing  from the Centre to the Panchayat. Unfortunately, we tried to register  everybody simultaneously and that has resulted in poor quality of  biometrics and demographic data. We have visited some of the  registration centre and have seen the reality on the ground.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Comment From Guest &lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;I have been threatened by Gas Agency people if i don't link Aadhar to  Bank Account, won't be given a refilling cylinder.Is this a right one?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;K Venkataramanan:&lt;/b&gt; There is an option for getting DBT even without  Aadhaar. The bank account and the gas agency consumer account can be  linked without Aadhar. Please check www.mylpg.in for knowing how to  apply for DBT registration without Aadhaar&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;The Hindu: &lt;/b&gt;Your views Prof Gopinath? Do you see it as a biometrics Honey Pot too?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;K. Gopinath: &lt;/b&gt;From a security pov, it is certainly risky. It needs  really robust technologies before one can think of rolling out. For  example, we have "denial of service" attacks. ie, a service can be shut  out by random bombardment of msgs. Most curr large scale systems are  designed to handle it but some cannot handle it if large numbers  collude. This only prevents access to service but other attacks can  exfiltrate (take out) data, modify data, etc.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;The Hindu:&lt;/b&gt; And Mr. Venkataramanan, your thoughts?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Comment From kuldeep singh chauhan &lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;We need a strong law for data security. Aadhar is collecting data but  there is no provision except some provisions of IT Act and IPC for data  security.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;K. Gopinath:&lt;/b&gt; Yes, the legislation is weak or unnecessarily vague  (eg. the IT2000 act) or too broad in scope. I think what we need is a  citizen's charter for data access, security and privacy. Also, what  needs to be done when systems do not work!&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Sunil Abraham:&lt;/b&gt; There are two interpretations of Sec. 43A of the  IT Act. Acccording to most experts it only applies to Body Corporates in  other words it does not apply to the Government when it plays the role  of a data controller. According to an order issued by the IT Secy of  Maharastra [the court of first instance for 43A of ITA] -this section  will also apply to the Government. But beyond that order we have no  clarity on this question.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Comment From Pavan &lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;With no privacy laws, isn't it a bad idea to store citizen's data in a  database? We all know how inept our government is in ensuring any  security/privacy.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Sunil Abraham:&lt;/b&gt; With or without laws. Centralized approaches to  identity/authentication management are much more fragile and vulnerable  compared to decentralized options. The Internet is secured by digital  signatures - there is no centralized repository of all these signatures.  Therefore there is no centralized point of failure for the Internet. If  the Aadhaar project was based on Smart Cards instead of Biometrics -  then just like the Internet it would be robust without a central point  of failure. http://cis-india.org/intern...&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;K. Gopinath:&lt;/b&gt; Storing all info in a single place is a big security  risk. It needs very robust technologies (such as replication and  "secret sharing protocols") that work inspite of failures. These have  been done here and there but doing it on a large scale requires care.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Comment From Kunal Soni &lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;SC Adhar card recommendations, ok Got it! But what about the banks for  example SBI who ask for adhar cards stating its the bank's rule? Who's  going to answer the question as they would never listen to common man  and they never did.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Comment From Sandeep &lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Hi,May be it is a strong message, but what exactly is the need to  make/introduce the Adhaar card, which is not recognizable worldwide? Why  dont we make our passport smart enough and reduce it to a chip as in  Europe. This will also enable everyone to get enrolled in our  administrative system. Basically, we are only repeating the entire  process with no international recognition.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Comment From Krishna Rao &lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Need to make it mandatory in the lines of SSN in US. Else it would be  very difficult to manage and ensure the subsidies and benefits reach the  really deserved section.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Comment From Ramesh &lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;It is a great concept it all information like property purchases, tax  returns, ration card, pf, esi, bank accounts , rail, air tickets are all  linked. will reduce corrupt practice considerably. It should be the  main identity of an Indian&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Comment From arun &lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;@Sunil what are the privacy safeguards that are in place currently  regarding protection of information collected by the government and  private agencies designated for this?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Sunil Abraham:&lt;/b&gt; Do you mean legal or technical?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;K Venkataramanan:&lt;/b&gt; @The Hindu: Yes, there are serious privacy  issues involved in a centralised database. However, their is a  counter-view that this is no different from any other data base  available in the hands of the government such as the one relating to  PAN. The main concern of those worried about the privacy problem in  Aadhaar is that data collection is done by private agencies, and details  such as biometric data could be misused&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;The Hindu:&lt;/b&gt; Sunil, a question for you from arun&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Comment From Pawan &lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Govt should give it legal recognition and give legal guarantee about the  usage and storage of the data... After that there would be no concern  related to identity security or enforcing it on the people.. People  would trust it and come forward to register for it.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Sunil Abraham:&lt;/b&gt; Legal recognition and guarantees are not  sufficient. You cannot use the law to fix poor technology design. The  security of the Internet is not a function of good law. It is a function  of good technological design.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Comment From Pappan &lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;the so called Europe, US an other developed countries already have  Social security numbers, why cant we just look at it like that?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Sunil Abraham: Social Security Number are an additional identifier. The  database just contains a collection of identifiers. If that database is  compromised the information cannot be used to authenticate transactions.  This is very unlike the UIDAI centralized database which is a  collection of authentication factors. Think of it as a database filled  with the passwords of all Indian residents.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;K Venkataramanan: @Kunal Soni - SBI can't insist on it as of now. The  person who issued any circular to that effect may be hauled up in court&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Guest&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;I have two questions. First, why is the honourable supreme court strking  down aadhar, on what grounds? Second, how can the government come  around those objections and allay the courts fears/objections? The  informed panelists may please give their opinions too. Thank you&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Sunil Abraham: There are 3 sets of petitioners who are being heard by  the SC in the combined case. Some of them associated with the right are  arguing that the UID is a threat to national security as it legitimizes  illegal immigrants. Those associated with the left are arguing that it  is a violation of the right to privacy. Still other who are ex-officers  from the armed forces are arguing that the project is mired in corrupt  practices.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;K Venkataramanan: The Court has not struck down Aadhaar. It has only  passed interim orders protecting the access to services of those who  have not yet had them.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Aashish Gupta&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Aadhaar was supposed to usher in portability of benefits. That is, you  could migrate to a different state and still get the benefit you  deserved.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Sunil Abraham: The Aadhaar database only contains information that  identifies you and also allow you to authenticate against that database.  It does not indicate eligibility for various schemes/subsidies. The  migration across State level eligibility lists has to be done by the  State. It is not a functionality provided by the UIDAI.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Ramesh&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Supreme Court should have suggested a better option instead of coming  down heavily on the Aadhar Card. The card will straight eliminate  multiple rations cards and voter ids.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Sunil Abraham: The previous technology adopted by the NDA government -  smart cards or SCOSTA [for the MNIC]. This technology option is free  from many of the flaws of UIDAI's current design.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Mrigesh&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Why is Aadhaar needed? I am for a middle class or for the elite class?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Geetha&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Has the government (or concerned agencies/departments) formulated any  policy on using the Aadhar information collected? For instance, what  agency can use the information, under what conditions, with whose  approval, for what limited purposes? Is this policy publicly available?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Sunil Abraham: No. Anyone who is approved by the UIDAI as a legitimate  can use the KYC API. Absolutely anyone can use the Authentication API.  There is no policy on what data collection/retention practices must be  adhered to by the users of both these APIs.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Arun Jayapal&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Has the government ever considered/analyzed a way to link the existing  resources (such as ration card, DL, passport, voter id, etc.,) and not  have come up with a completely new system (aadhaar). Is this not an  absolute waste of time and resources?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Sunil Abraham: Yes, you are absolutely right. The government should have  used biometrics as a means to dedup an existing high value database  like the Electoral Rolls or more importantly the PAN Card database. That  would have been better RoI for our anti-corruption Rupee.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;K Venkataramanan: @Ramesh The Court has come down heavily on only  officials who insist on Aadhar for delivery of services when there are  clear orders that it should not be mandatory&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From George J&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;I'm an NRI. I presently work and live in a country where the first order  of business on landing/Birth is to register one self and get a unique  ID number and ID. This the case for expats as well as residents be they  foreigners or Citizens. The registration process includes collection of  Biometric data. This single No and Id is used for everything from Bank  Accounts to School Admissions. It is good that India is doing something  similar. It is high time people with multiple ration cards, Passports  and the like are weeded out and provided a single verifiable identity.  Data Security is of essence and necessary safeguards are available.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Sunil Abraham: Could you name the country? And can you use biometrics  your country to authenticate transactions in a centralized database for  all sorts of transactions? If yes, then the technology design in your  country is as poor as in ours and it is only a question of time when the  centralized database leaks.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Aashish Gupta&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Apart from the Honey Pot, Aadhaar does not serve its primary purpose:  tackling corruption. Most pilots of Aadhaar have crash landed, and as a  result, state governments have created their own simpler systems to  tackle corruption.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Sunil Abraham: See: http://www.thehindu.com/opi... If the authentication  match is not working [1:1 match]. Then basically the dedup will not  work [1:n] match. That is why they are doing demographic dedup before  biometric dedup - because they know that the biometric dedup is  fallible.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Balu&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;A citizenship card , backed with a strond database is a must for every  citixen . Some serious thoughts should be done in this matter at the  earliest , instead of wasting time and money on different schemes .&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Sunil Abraham: We should use decentralized Internet scale technologies  based on open standards that are already proven. If we had used smart  cards based on SCOSTA or EMV standard we would be in a much better  place.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From PRASHANTH&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Has the government (or concerned agencies/departments) formulated any  policy on using the Aadhar information collected? For instance, what  agency can use the information, under what conditions, with whose  approval, for what limited purposes? Is this policy publicly available?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From vikash&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;supreme court should not have to push such legal hurdles given that the  750 million card has already been generated.A lot of money has been  investad in the project&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Saket&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Aaadhar card is full of errors. At the place where I got registered  person was issuing it in a hurry which creates lots of typing errors in  DOB and Place.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Aashish Gupta&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The supreme court has not struck down aadhaar, it has said that aadhaar  cannot be mandatory. This is to make sure that people who do not have an  aadhaar card do not miss out on their entitlements.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Ramesh&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Aadhaar should be made mandatory with necessary safeguards. Unless there  is an ultimatum and time frame to get the card it will never be  implemented. Even now many do not know where to get it done.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Aadharam&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Could you clarify whether this is an interim order or a final order on  Aadhar? Is there scope for a retraction/shift on the Supreme Court's  part?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Onkar Tiwari&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Why supreme court doesnt understand Adhar is necessary? it can curb  corruption. it wll reduce corruption specially in manrega where people  enters fake details and grab the money.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;K Venkataramanan: It is only an interim order. The Court will,  hopefully, resolve the questions raised by the petitioners about privacy  and data security issues&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From George J&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;I have taken Aadhar Card. The procedure asks the applicant themselves to  verify the data entered for typing mistakes etc. before being uploaded,  in fact where I registered they had asked for a sign off on the final  data on a printout. So how errors can creep in is beyond me. However the  photography equipment and skill of the data entry operator leave much  to be desired as the mug shot is not very kind to me!&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Guest&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;There should be a guide line which need to be followed as it is in the  hands of private partners who are also ask for bribe from the poor  people for the aadhar and they have no other option to pay for it as  they thought that this only can help them to get the govt. facilities  and subsidies.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;K Venkataramanan: @Onkar Tiwari, It is up to the government to convince  the court that Aadhaar will help curb corruption, and how. The Court is  unlikely to stop the use of technology to improve delivery of services  and curb corruption.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From v subrahmanian&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;help line over phone and the email correspondence is total waste.. they  themselves are helpless. Any query has never been replied to the  caller's satisfaction. Getting them on line itself is a challenge. It's  so complex. Of course, every eligible citizen of this complex country  must have the identity card. Why not if it is done through employer in  case of organized salaried employees?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Ramakrishna Rao&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Hi !! I request the panelists to kindly sum up in few 4 or 5 points the  reasons/grounds on which the parliamentary committee has rejected the  aadhar&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Guest&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The agencies who are collecting data for Aadhar Card are not doing good.  The aadhar card is full with many kind of errors including Name and  DOB.. Even a person is able to register twice under this scheme.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The Hindu: Mr. Venkataramanan would you like to respond to Ramakrishna Rao?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Guest&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;@K Gopinath - how robust is the de-duplication UID claims to have. And  in real time transactions, is it possible to authenticate n request  without 'false positives' or 'negatives'?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;K. Gopinath: Dedup claims assume “good” conditions. For example, a  farmhand may have rough skin, etc that may make the fingerprints  problematic. 1% errors have been reported in the past. Real time txns: I  think the current Aadhar is not geared for it. The connectivity is not  there. Also, with fingerprint technologies, the ability to check large  number of fingerprints for a match is not good enough. It has never been  scaled to the extent that is being planned.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Sandeep&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Still not sure if Aadhaar then other ID cards not needed ? Or Still all  along with Aadhaar ? then what is meaning of Aadhaar ? Only for LPG  connection? Why not govt making Aadhaar is mandatory in all other fields  as well , As Govt spent huge money for Aadhaar&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Guest&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;@ Sunil - How plausible is the idea that govt can use UID data to profile public?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Sushubh&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;I for one is very happy that at least the Supreme Court is not falling  for this privacy infringing scam. People defending this card here on  this platform needs to read more about it.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Guest&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Govt. created panic among public regarding adhaar. Public is highly  annoyed with the way the government is handling this adhaar project.  Only court reprimands,govt. backtracks as far as the adhaar is  concerned. It is high time for govt. to have serious insight into this.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;K Venkataramanan: The parliamentary committee on Finance had objected to  the UID being extended to non-citizens on the ground that it may end up  in illegal immigrants getting Aadhaar numbers.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;It had also questioned the rollout ofthe scheme before legislation was  passed. It had objected to its implementation without regard to its  consequences.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Srinivasa&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;I believe Nandan Nilkeni had mentioned certain very good examples of the  system flagging duplicates. So I assume the system is robust. We need  to make it mandatory for all services delivery and have suitable policy  and technology to protect data.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Sunil Abraham: I don't think we can go by the assurance of someone no  longer associated with the project. It is not persons that keep us safe  it is proper technology and law.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The Hindu: Welcome back Sunil! Lots of questions await you&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;K Venkataramanan: The committee had said UIDAI had no conceptual  clarity, no proper assessment of the costs involved, and that it could  end up in the hands of private agencies, that the technology was  untested and the UID may not meet the objectives for which it was  conceived&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Sunil Abraham: Sorry I was logged out.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Guest&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;There was a recent news in The Hindu about linking of Adhar cards to  election voter ID cards in Andhra Pradesh. Do you think that adopting  such moves by every state result in mandating the procedure eventually?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Guest&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;First Passport then PAN , voter id and now adahar, in any country there  is only passport and SSN, why india needs so many identity cards&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;K. Gopinath: The PAN database has been problematic just as the voter id.  Hence, every technology cycle, a new system is usually attempted that  attempts to be "better" than the before. However, this requires care  which is not in good supply in the govt where the "lowest" bidder wins  or outsourcing happens.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The Hindu: We have Prof Gopinatha back too. Sorry about that technical glitch.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Deepak Vasudevan&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Why are different apex agencies managing Aadhar like UIDAI, Census and  NPR? There should be one root (apex) body and others should report onto  it.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Sunil Abraham: Yes. The division of work between UIDAI and NPR is not very clear and has added to the confusion.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;K Venkataramanan: The parliamentary standing committee, too pointed out the overlap of functions involving UIDAI and NPR&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The Hindu: There was this question for you earlier on the thread @K  Gopinath - how robust is the de-duplication UID claims to have. And in  real time transactions, is it possible to authenticate n request without  'false positives' or 'negatives'?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;K. Gopinath: Dedup claims assume “good” conditions. For example, a  farmhand may have rough skin, etc that may make the fingerprints  problematic. 1% errors have been reported in the past. Real time txns: I  think the current Aadhar is not geared for it. The connectivity is not  there. Also, with fingerprint technologies, the ability to check large  number of fingerprints for a match is not good enough. It has never been  scaled to the extent that is being planned.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Guest&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;When Union Of India aimed to greater transparency... these are the road  blocks they get... If Aadhar is not mandatory... then make Voter ID, PAN  Card, Ration card also not mandatory in their respective Govt  Businesses ... make self declaration as mandatory .. lets go to the  stone age in this Information age. Instead SC should direct the center  to come up with procedure to accommodate legitimate citizens of India  into the scheme in a time bound manner and frame policies to avoid  misuse of the personal data. are we looking the current world  Information age thru the same old glasses... it is time to adopt the  change...&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Sunil Abraham: Indeed we need more transparency. But privacy protections  must be inversely proportionate to power and as Julian Assange says  transparency requirements should be directly proportionate to power See:  http://openup2014.org/priva...&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;K Venkataramanan: Linking Aadhaar and voter ID cards is also being tried  out in other states It is only one more means of eliminating fake  voters or duplicates, but is unlikely tobe a ground to make Aadhaar  mandatory&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Ganesh&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;@Mr.Sunil, The current technology adopted for UIDAI is not good compared to last regime?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Sunil Abraham: Please see my our open letter on this question http://cis-india.org/intern...&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Madhavan R&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Just because UPA government bring this, its not good for NDA to object  it.. STOP wasting our money.. Just try to make best out of it..&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Sunil Abraham: Pouring more money into a failed project will not save  it. It has serious technological flaw and without addressing it we are  just making a bad situation worse.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From George J&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Currently all embassy's are collecting biometric data when you apply for  a visa. Most of this collection is done by private parties on behalf of  the respective governments. So if an Indian has travelled abroad the  chances of his Biometric data being available to foreign govts is 99%.  So what is the big scare about this? The need that it should be secure  and should not be misused is sacrosanct. with the kind of revelations  that have been made about mass eavesdropping I think people should get  used to living in glass houses!&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Pappan&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;@Sunil, please clarify about your comment on technology inadequecy&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Yuvaraj&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;I strongly support Adhaar card implemenataion. intially they may face  challeneges but for the long run its very effective mechanism to monitor  every thing&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Sunil Abraham: Monitoring everything means you monitor nothing. The  bigger the haystack the harder it is to find the needle. Good  surveillance practices means targetting survelliance not en masse data  collection.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Guest&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;It is heard that privacy of citizens is at stake with adhaar card. can panelists respond to this?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Sunil Abraham: I have dealt with your question here: http://www.business-standar...&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Srinivasa&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;That comparison of the two standards (SCOSTA and Aadhar) made  interesting reading. Why not a system where you collect biometrics and  iris and then issue a SCOSTA card? the biometrics and iris can be used  to remove duplicates and maintain a clean registry by failing the  duplicate SCOSTA cards. And all further transactions will only need a  card based access.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Loganathan&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;This is one the worst move by any government in the center to remember.  With no motive for the card, they introduced just to add to the loss in  exchequer and there is no benefit out of it. Many have wrong data  entered against their name and totally the waste one of all&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Sabari Arasu&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;I am aware of someone who is not Indian citizen got Aadhar card for  himself and his family. This scares me a lot as anyone(read  Bangaladheshis, Sri Lankans, Pakintanis, etc..) can get Aadhar card. Is  there a measure taken by Government to identify these issues?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Sunil Abraham: This is possible because the technology [biometrics]  cannot verify citizenship. Even worse biometrics can be imported from  foreign countries and can be used to create resident ghosts. This is  because the technology cannot even verify if the person in India. We  will need surveillance cameras at every point of registration to take  care of this possible fraud.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Chandra Sekhar&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Aadhaar card was a huge opportunity for the government to improve the  efficiency of governance.It was a challenging task and required great  amount accuracy.The way this project was executed is a question mark on  efficiency of governance.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The Hindu: Sunil, Venkatramanan, Gopinath - would you agree that Aadhaar  was an opportunity to improve governance? @chandra sekhar&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Guest&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Freebee lovers/netas will always oppose when you want to implement some thing which might deny them the benefit.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Sunil Abraham: Any evidence to backup this statement?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Guest&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;if the ASDHAAR is nt necessary as per SC then why everywhere it is being preferred identity such as Subsidy, Passport etc.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Sunil Abraham: Preference is not the same as a mandatory requirement.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-hindu-march-17-2015-aadhaar-an-identity-crisis'&gt;https://cis-india.org/internet-governance/news/the-hindu-march-17-2015-aadhaar-an-identity-crisis&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-04-03T06:54:25Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/list-of-recommendations-on-the-aadhaar-bill-2016">
    <title>List of Recommendations on the Aadhaar Bill, 2016 - Letter Submitted to the Members of Parliament</title>
    <link>https://cis-india.org/internet-governance/blog/list-of-recommendations-on-the-aadhaar-bill-2016</link>
    <description>
        &lt;b&gt;On Friday, March 11, the Lok Sabha passed the Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Bill, 2016. The Bill was introduced as a money bill and there was no public consultation to evaluate the provisions therein even though there are very serious ramifications for the Right to Privacy and the Right to Association and
Assembly. Based on these concerns, and numerous others, we submitted an initial list of recommendations to the Members of Parliaments to highlight the aspects of the Bill that require immediate attention.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Download the submission letter: &lt;a href="https://github.com/cis-india/website/raw/master/docs/CIS_Aadhaar-Bill-2016_List-of-Recommendations_2016.03.16.pdf"&gt;PDF&lt;/a&gt;.&lt;/h4&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Text of the Submission&lt;/h3&gt;
&lt;p&gt;On Friday, March 11, the Lok Sabha passed the Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Bill, 2016. The Bill was introduced as a money bill and there was no public consultation to evaluate the provisions therein even though there are very serious ramifications for the Right to Privacy and the Right to Association and Assembly. The Bill has made it compulsory for all Indian to enroll for Aadhaar in order to receive any subsidy, benefit, or service from the Government whose expenditure is incurred from the Consolidate Fund of India. Apart from the issue of centralisation of the national biometric database leading to a deep national vulnerability, the Bill also keeps unaddressed two serious concerns regarding the technological framework concerned:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Identification without Consent:&lt;/strong&gt; Before the Aadhaar project it was not possible for the Indian government or any private entity to identify citizens (and all residents) without their consent. But biometrics allow for non-consensual and covert identification and authentication. The only way to fix this is to change the technology configuration and architecture of the project. The law cannot be used to correct the problems in the technological design of the project.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Fallible Technology:&lt;/strong&gt; The Biometrics Standards Committee of UIDAI has acknowledged the lack of data on how a biometric authentication technology will scale up where the population is about 1.2 billion. The technology has been tested and found feasible only for a population of 200 million. Further, a report by 4G Identity Solutions estimates that while in any population, approximately 5% of the people have unreadable fingerprints, in India it could lead to a failure to enroll up to 15% of the population. For the current Indian population of 1.2 billion the expected proportion of duplicates is 1/121, a ratio which is far too high. &lt;strong&gt;[1]&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Based on these concerns, and numerous others, we sincerely request you to ensure that the Bill is rigorously discussed in Rajya Sabha, in public, and, if needed, also by a Parliamentary Standing Committee, before considering its approval and implementation. Towards this, we humbly submit an initial list of recommendations to highlight the aspects of the Bill that require immediate attention:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;&lt;strong&gt;Implement the Recommendations of the Shah and Sinha Committees:&lt;/strong&gt; The report by the Group of Experts on Privacy chaired by the Former Chief Justice A P Shah &lt;strong&gt;[2]&lt;/strong&gt; and the report by the Parliamentary Standing Committee on Finance (2011-2012) chaired by Shri Yashwant Sinha &lt;strong&gt;[3]&lt;/strong&gt; have suggested a rigorous and extensive range of recommendations on the Aadhaar / UIDAI / NIAI project and the National Identification Authority of India Bill, 2010 from which the majority sections of the Aadhaar Bill, 2016, are drawn. We request that these recommendations are seriously considered and incorporated into the Aadhaar Bill, 2016.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Authentication using the Aadhaar number for receiving government subsidies, benefits, and services cannot be made mandatory:&lt;/strong&gt; Section 7 of the Aadhaar Bill, 2016, states that authentication of the person using her/his Aadhaar number can be made mandatory for the purpose of disbursement of government subsidies, benefits, and services; and in case the person does not have an Aadhaar number, s/he will have to apply for Aadhaar enrolment. This sharply contradicts the claims made by UIDAI earlier that the Aadhaar number is “optional, and not mandatory”, and more importantly the directive given by the Supreme Court (via order dated August 11, 2015). The Bill must explicitly state that the Aadhaar number is only optional, and not mandatory, and a person without an Aadhaar number cannot be denied any democratic rights, and public subsidies, benefits, and services, and any private services.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Vulnerabilities in the Enrolment Process:&lt;/strong&gt; The Bill does not address already documented issues in the enrolment process. In the absence of an exhaustive list of information to be collected, some Registrars are permitted to collect extra and unnecessary information. Also, storage of data for elongated periods with Enrollment agencies creates security risks. These vulnerabilities need to be prevented through specific provisions.  It should also be mandated for all entities including the Enrolment Agencies, Registrars, CIDR and the requesting entities to shift to secure system like PKI based cryptography to ensure secure method of data transfer.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Precisely Define and Provide Legal Framework for Collection and Sharing of Biometric Data of Citizens:&lt;/strong&gt; The Bill defines “biometric information” is defined to include within its scope “photograph, fingerprint, iris scan, or other such biological attributes of an individual.” This definition gives broad and sweeping discretionary power to the UIDAI / Central Government to increase the scope of the term. The definition should be exhaustive in its scope so that a legislative act is required to modify it in any way.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Prohibit Central Storage of Biometrics Data:&lt;/strong&gt; The presence of central storage of sensitive personal information of all residents in one place creates a grave security risk. Even with the most enhanced security measures in place, the quantum of damage in case of a breach is extremely high. Therefore, storage of biometrics must be allowed only on the smart cards that are issued to the residents.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Chain of Trust Model and Audit Trail:&lt;/strong&gt; As one of the objects of the legislation is to provide targeted services to beneficiaries and reduce corruption, there should be more accountability measures in place. A chain of trust model must be incorporated in the process of enrolment where individuals and organisations vouch for individuals so that when a ghost is introduced someone has can be held accountable blame is not placed simply on the technology. This is especially important in light of the questions already raised about the deduplication technology. Further, there should be a transparent audit trail made available that allows public access to use of Aadhaar for combating corruption in the supply chain.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Rights of Residents:&lt;/strong&gt; There should be specific provisions dealing with cases where an individual is not issued an Aadhaar number or denied access to benefits due to any other factor. Additionally, the Bill should make provisions for residents to access and correct information collected from them, to be notified of data breaches and legal access to information by the Government or its agencies, as matter of right. Further, along with the obligations in Section 8, it should also be mandatory for all requesting entities to notify the individuals of any changes in privacy policy, and providing a mechanism to opt-out.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Establish Appropriate Oversight Mechanisms:&lt;/strong&gt; Section 33 currently specifies a procedure for oversight by a committee, however, there are no substantive provisions laid down that shall act as the guiding principles for such oversight mechanisms. The provision should include data minimisation, and “necessity and proportionality” principles as guiding principles for any exceptions to Section 29.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Establish Grievance Redressal and Review Mechanisms:&lt;/strong&gt; Currently, there are no grievance redressal mechanism created under the Bill. The power to set up such a mechanism is delegated to the UIDAI under Section 23 (2) (s) of the Bill. However, making the entity administering a project, also responsible for providing for the frameworks to address the grievances arising from the project, severely compromises the independence of the grievance redressal body. An independent national grievance redressal body with state and district level bodies under it, should be set up. Further, the NIAI Bill, 2010, provided for establishing an Identity Review Committee to monitor the usage pattern of Aadhaar numbers. This has been removed in the Aadhaar Bill 2016, and must be restored.&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Endnotes&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;[1]&lt;/strong&gt; See: &lt;a href="http://cis-india.org/internet-governance/blog/Flaws_in_the_UIDAI_Process_0.pdf."&gt;http://cis-india.org/internet-governance/blog/Flaws_in_the_UIDAI_Process_0.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[2]&lt;/strong&gt; See: &lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[3]&lt;/strong&gt; See: &lt;a href="http://164.100.47.134/lsscommittee/Finance/15_Finance_42.pdf"&gt;http://164.100.47.134/lsscommittee/Finance/15_Finance_42.pdf&lt;/a&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/list-of-recommendations-on-the-aadhaar-bill-2016'&gt;https://cis-india.org/internet-governance/blog/list-of-recommendations-on-the-aadhaar-bill-2016&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Amber Sinha, Sumandro Chattapadhyay, Sunil Abraham, and Vanya Rakesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Digital India</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Biometrics</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2016-03-21T08:50:09Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
