<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 111 to 125.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/youth-ki-awaaz-roopa-sudarshan-what-you-need-to-worry-about-before-linking-your-mobile-number-with-aadhaar"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/india-today-priya-pathak-november-8-2017-india-today-conclave-next-2017-aadhaar-was-rushed-says-mp-rajeev-chandrashekhar"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/hindustan-times-aman-sethi-november-27-2017-aadhaar-verification-at-airports-raises-need-for-stricter-data-privacy-regulations"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comments-by-the-centre-for-internet-and-society-on-the-report-of-the-committee-on-medium-term-path-on-financial-inclusion"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/newsclick-martin-moore-may-20-2019-aadhaar-reduced-agency-in-citizens-and-empowered-those-in-positions-of-authority"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/workshop-on-democratic-accountability-in-the-digital-age-delhi-november-14-15"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/economic-times-january-14-2017-sunil-abraham-on-aadhaar-misuse-during-demonetisation"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/seminar-on-understanding-financial-technology-cashless-india-and-forced-digitalisation-delhi-jan-24-2017"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/vidhi-doshi-fingerprint-payments-prompt-privacy-fears-in-india-the-guardian"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/frontline-v-sridhar-march-3-2017-digital-illusions"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/outlook-arindam-mukherjee-february-20-2017-no-genie-at-your-fingertips"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-hindu-april-10-2016-somesh-jha-pmo-no-to-smart-cards-insists-aadhaar"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/will-the-magic-number-deliver-aadhaar-cslg-26042016"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/telecom/blog/cis-submission-trai-note-on-interoperable-scalable-public-wifi"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/workshop-report-uidai-and-welfare-services-august-27-2016"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/youth-ki-awaaz-roopa-sudarshan-what-you-need-to-worry-about-before-linking-your-mobile-number-with-aadhaar">
    <title>What You Need To Worry About Before Linking Your Mobile Number With Aadhaar</title>
    <link>https://cis-india.org/internet-governance/news/youth-ki-awaaz-roopa-sudarshan-what-you-need-to-worry-about-before-linking-your-mobile-number-with-aadhaar</link>
    <description>
        &lt;b&gt;As part of the directive issued by the Department of Telecommunications (DoT) dated March 23, 2017, major telecom service providers have issued a deadline of February 6, 2018, for linking mobile numbers with Aadhaar as part of the E-KYC verification.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post by Roopa Raju and Shekhar Rai was published in &lt;a class="external-link" href="https://www.youthkiawaaz.com/2017/11/linking-aadhar-with-mobile-number-pros-and-cons/"&gt;Youth Ki Awaaz&lt;/a&gt; on November 8, 2017&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The landmark case referenced by the DoT in the circular was the order  issued by the Supreme Court on February 6, 2017, delivered by Justice  JS Khehar (the erstwhile Chief Justice of India) in the case of &lt;a href="https://thewire.in/109330/aadhaar-phone-legal-battle/" rel="noopener" target="_blank"&gt;Lokniti Foundation vs Union of India&lt;/a&gt;.  The petitioner &lt;a href="http://supremecourtofindia.nic.in/jonew/courtnic/rop/2016/23429/rop_885627.pdf" rel="noopener" target="_blank"&gt;contended&lt;/a&gt; that terrorists, criminals and anti-social elements frequently used SIM  cards to commit atrocious, organised and unorganised crimes across the  country. The petition called for &lt;a href="http://supremecourtofindia.nic.in/jonew/courtnic/rop/2016/23429/rop_885627.pdf" rel="noopener" target="_blank"&gt;ensuring 100% verification&lt;/a&gt; on the identity of telecom service subscribers in public interest under &lt;a href="https://indiankanoon.org/doc/981147/" rel="noopener" target="_blank"&gt;Article 32&lt;/a&gt; of the Constitution of India. The PIL added that unverified SIM cards  pose a serious threat to the country’s security as they are routinely  used  in criminal and terrorist activities, thereby affecting a  citizen’s right (as ensured under &lt;a href="https://indiankanoon.org/doc/1199182/" rel="noopener" target="_blank"&gt;Article 21&lt;/a&gt; of the Constitution). As per the CAG report tabled at the Parliament in 2014, the identities of &lt;a href="https://timesofindia.indiatimes.com/india/Identities-of-4-59-crore-mobile-users-still-unverified-CAG/articleshow/39572824.cms" rel="noopener" target="_blank"&gt;4.59 crore mobile users&lt;/a&gt; still remained unverified.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Article 21 of the Constitution of India, 1949, &lt;a href="https://indiankanoon.org/doc/1199182/" rel="noopener" target="_blank"&gt;states&lt;/a&gt; that – &lt;i&gt;“No person shall be deprived of his life or personal liberty except according to procedure established by law.”&lt;/i&gt; While there is a threat to the common public interest through increased  acts of terrorism and atrocities due to unverified SIM cards, the  safety of information provided and linked to Aadhaar are increasingly  being questioned.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a study dated May 1, 2017, published by the Centre for Internet  and Society (CIS), a Bangalore-based organisation, it was observed that  data of &lt;a href="http://indiatoday.intoday.in/technology/story/aadhaar-data-of-130-millions-bank-account-details-leaked-from-govt-websites-report/1/943632.html" rel="noopener" target="_blank"&gt;over 130 million&lt;/a&gt; Aadhaar card-holders were leaked from just four government portals  dealing with the National Social Assistance programme, the National  Rural Employment Guarantee Scheme, the Chandranna Bima Scheme and the  Daily Online Payment Reports of NREGA.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On October 25, 2017, the chief minister of West Bengal, Mamata Banerjee, also &lt;a href="https://thewire.in/190932/west-bengal-mamata-banerjee-bjp-aadhaar/" rel="noopener" target="_blank"&gt;strongly opposed&lt;/a&gt; the government’s plan to link mobile numbers with Aadhaar cards. She  said that it was a breach of privacy and that the ruling government was  intruding upon the citizen’s right to personal freedom. However, the  Supreme Court &lt;a href="https://www.ndtv.com/india-news/aadhaar-petitions-in-supreme-court-today-including-bengals-10-points-1768703" rel="noopener" target="_blank"&gt;questioned&lt;/a&gt; the state government’s right to challenge the Centre and asked her to file a plea with the court in her individual capacity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As per the data published by Telecom Regulatory Authority of India  (TRAI) on September 14, 2017, India’s telecom subscriber base &lt;a href="http://indianexpress.com/article/technology/tech-news-technology/telecom-subscriber-base-dips-marginally-to-121-crore/" rel="noopener" target="_blank"&gt;dipped by 1.3 lakh&lt;/a&gt; to 121.07 crore in July 2017. Moreover, only three operators – Reliance  Jio, Bharti Airtel and the state-run BSNL – reported additions to their  subscriber base.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;Month&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Telephone subscriber base&lt;br /&gt; (in million)&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Growth rate&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;Mar-17&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;1194.58&lt;/td&gt;
&lt;td&gt;–&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;Apr-17&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;1198.89&lt;/td&gt;
&lt;td&gt;0.36%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;May-17&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;1204.98&lt;/td&gt;
&lt;td&gt;0.51%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;Jun-17&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;1210.84&lt;/td&gt;
&lt;td&gt;0.49%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;Jul-17&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;1210.71&lt;/td&gt;
&lt;td&gt;-0.01%&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(Source: &lt;a href="http://www.trai.gov.in/release-publication/reports/telecom-subscriptions-reports" rel="noopener" target="_blank"&gt;TRAI monthly subscription data&lt;/a&gt;)&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The dip in the subscriber count for various telecom operators can be  accredited to the phasing of registration of SIM cards through E-KYC for  new mobile numbers. While there is a the possibility of addition of  genuine subscribers in the following months, the direct subscriber  acquisition cost (DSAC) has been significantly reduced owing to the  overall reduction in subscriber addition (assuming exclusion of sunk  cost).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prior to the DoT directive, telecom service providers relied heavily  on the documents provided by the subscribers for SIM registration. The  two-fold impact of this was the delay in SIM activation, owing to the  transfer of documents from the retailer to the distributor to the  company and the possibility of documents not matching with the usage  timeline of usage. Additionally, tracking the ever-changing retailers  was difficult for the service providers – and with the subscriber  documents being collected and stored at one location by the service  providers, verification of dummy subscribers was difficult.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With the introduction of Aadhaar linkage for mobile numbers,  subscribers are held accountable for its usage, thereby tagging  responsibility for any acts arising as a result. Savings from the  digitisation of documents and paper should also be considered.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, an increased number of job losses is possible, owing to the  ‘optimisation’ of the process by way of document verification, servicing  costs and reliance on third parties (to name just a few). Increased  compliance costs are also an issue of concern.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The key question that looms prominently with the approaching deadline  is how secure public data will be, given that it may possibly be linked  with bank account numbers and income tax returns. With retailers using  fingerprints of the subscribers to validate Aadhaar numbers with the  mobile numbers at the time of SIM registration, there is an increased  risk of exposure to identity theft.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the government is increasingly trying to bring in a seamless  process to assimilate data for transparency in analysing consumer  patterns, it is suggested that they also allocate funds for enhancing  the cyber-security of the data consolidated from this directive.  Furthermore, cyber security regulations can be strengthened to avoid  data leakages to third party organisations. Severe penalties should also  be implemented to ensure robust compliance to these measures.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/youth-ki-awaaz-roopa-sudarshan-what-you-need-to-worry-about-before-linking-your-mobile-number-with-aadhaar'&gt;https://cis-india.org/internet-governance/news/youth-ki-awaaz-roopa-sudarshan-what-you-need-to-worry-about-before-linking-your-mobile-number-with-aadhaar&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-11-26T05:55:49Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/india-today-priya-pathak-november-8-2017-india-today-conclave-next-2017-aadhaar-was-rushed-says-mp-rajeev-chandrashekhar">
    <title>India Today Conclave Next 2017: Aadhaar was rushed, says MP Rajeev Chandrashekhar</title>
    <link>https://cis-india.org/internet-governance/news/india-today-priya-pathak-november-8-2017-india-today-conclave-next-2017-aadhaar-was-rushed-says-mp-rajeev-chandrashekhar</link>
    <description>
        &lt;b&gt;Talking at the ongoing India Today Conclave Next 2017, MP Rajeev Chandrashekhar said that Aadhaar was rushed and foisted on the country by authorities that fail to first create a proper ecosystem. Chandrashekhar gave his comments at a keynote titled Privacy -- The Fundamental Right for the Digital Citizen.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Priya Pathak was published by &lt;a class="external-link" href="http://indiatoday.intoday.in/technology/story/india-today-conclave-next-2017-aadhaar-was-rushed-says-mp-rajeev-chandrashekhar/1/1084396.html"&gt;India Today&lt;/a&gt; on November 8, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Chandrashekhar, who has been vocal on  the issues like data protection, privacy and net neutrality, said that  the government should have created a proper ecosystem for Aadhaar by  bringing norms and laws around data protection and privacy before asking  people to sign up for the unique ID.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The MP talked about India's  journey from being a largest unconnected world to becoming the largest  connected world. But Chandrashekhar criticised the "flawed" Aadhaar and  said that it was a classic example of how a government system would push  for technology in governance without addressing key bits of the  ecosystem around the citizen and the consumer.&lt;/p&gt;
&lt;div class="zg-placement-transition   zg-placement" id="zdt_3644892_1_wrapper" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;"If  that (Aadhaar) wasn't enough, the IT act and section 66A and its  language and its vagueness and its potential for misuse was another  example of the faults of a bureaucracy or a political system trying to  legislate or create solutions in the digital world, " he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At  the same time, he lauded the recent Supreme Court order that held all  Indians had fundamental right to privacy. "The latest finding of Supreme  Court of Privacy as fundamental right is a big deal and it will alter  number of things going forward," he said. He added that there should be  more debate and discussion on data privacy as there is an attempt to  characterise data privacy as some of kind of elitist issue in India  which it's not.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Privacy, especially for the digital world,  currently is one of the most debated topics in India. The country in the  past few years has seen a number of instances where a government or a  private entity has knowingly or unknowingly compromised the data of its  users. Recently a study published by Centre for Internet and Society, a  Bengaluru-based organisation, revealed that private data of more 130  million Aadhaar card holders were leaked from four government websites.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  Supreme Court in August this year declared privacy as a fundamental  right. A nine-judge Constitution bench headed by Chief Justice J S  Khehar has declared that "right to privacy is an intrinsic part of Right  to Life and Personal Liberty under Article 21 and entire Part III of  the Constitution".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The move has been praised by many including  Rajeev Chadrashekhar who has said that it is a big welcome step. "It is  clear that Aadhaar and all other legislations existing and proposed will  have to meet the test of privacy being a fundamental right," he  recently said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/india-today-priya-pathak-november-8-2017-india-today-conclave-next-2017-aadhaar-was-rushed-says-mp-rajeev-chandrashekhar'&gt;https://cis-india.org/internet-governance/news/india-today-priya-pathak-november-8-2017-india-today-conclave-next-2017-aadhaar-was-rushed-says-mp-rajeev-chandrashekhar&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-11-26T06:41:07Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/hindustan-times-aman-sethi-november-27-2017-aadhaar-verification-at-airports-raises-need-for-stricter-data-privacy-regulations">
    <title>Aadhaar verification at airports raises need for stricter data privacy regulations</title>
    <link>https://cis-india.org/internet-governance/news/hindustan-times-aman-sethi-november-27-2017-aadhaar-verification-at-airports-raises-need-for-stricter-data-privacy-regulations</link>
    <description>
        &lt;b&gt;The absence of legislation is letting companies compile and deploy sensitive personal information without legal oversight.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Aman Sethi was published in the &lt;a class="external-link" href="http://www.hindustantimes.com/india-news/aadhaar-verification-at-airports-raises-need-for-stricter-data-privacy-regulations/story-pNJYBM7mJkhRrFJElYX2RJ.html"&gt;Hindustan Times&lt;/a&gt; on November 27, 2017&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;When Suvodeep Das, a 42-year-old marketing professional, took a Jet airways flight from Hyderabad to Mumbai in September, he said a software bug in the airline’s website wouldn’t let him check in online without first punching in his Aadhaar number.&lt;br /&gt;&lt;br /&gt;“When I got my boarding pass, it had my Aadhaar number printed on it,” Das told HT, wondering, “Why do you need an Aadhaar number to take a flight, and why display it publicly?”&lt;br /&gt;&lt;br /&gt;In October, another passenger found their Aadhaar number on the boarding pass: this time, it was barcoded.&lt;br /&gt;&lt;br /&gt;HT has reviewed both boarding passes. Publishing Aadhaar numbers is an offence under the Aadhaar Act 2016.&lt;br /&gt;&lt;br /&gt;Jet Airways did not respond to repeated requests for comment. Speaking off the record, airline executives said Jet encoded Aadhaar numbers to test the proposed Aadhaar Enabled Entry and Biometric Boarding System (AEEBBS): a complex Aadhaar-seeding project that aims to replace a passenger’s boarding pass with his/her fingerprint.&lt;br /&gt;&lt;br /&gt;Bangalore International Airport (BIAL), which plans to install AEEBBS, says it will improve passenger security and reduce check-in time at the Kempegowda International, India’s third busiest airport.&lt;br /&gt;&lt;br /&gt;Privacy advocates, however, say the system, which stores passenger biometrics and Aadhaar numbers on the servers of a private corporation, is an example of how the absence of a data protection law in India lets companies compile and deploy sensitive personal information without legal oversight.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Future uses of the AEEBBS, according to the BIAL website, include  integrating the system with passenger blacklists, typically maintained  by the ministry of home affairs, to determine who can and cannot board a  flight.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The unregulated proliferation of Aadhaar uses is  compromising the digital identities of citizens and putting them at  risk,” said Usha Ramanathan, a legal theorist who has written  extensively on Aadhaar. ”There is a misconception that data protection  is about data being at risk. It is actually about the rights of people  being at risk.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Pilot Project&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In January, Bangalore  International Airport Ltd (BIAL), the corporation that runs the  Bengaluru terminal, and Jet Airways integrated their flight and  passenger databases as part of a four-month pilot project to test the  AEEBS.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The pilot project incorporated the entire airport journey  from entry right through to the boarding gate and included all security  check points,” a BIAL spokesperson said in an email. “The project  allowed for quicker processing time for a passenger from entry to  security gate while simultaneously enabling fewer points of human  interaction.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Participation in the project was voluntary. BIAL  said about 15% of passengers opted to use it. In October, BIAL called  for bids for a full roll-out of the AEEBBS by December 2018.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The system, tender documents reveal, works in the following way:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;First  passengers enter their Aadhaar numbers when they book their flights.  The airline turns this number into a QR code printed on the flight  ticket. Once at the terminal, passengers bypass the standard practice of  showing their ticket and ID to a security guard, and instead they enter  the terminal by flashing the ticket at a QR code scanner while pressing  their fingers against a biometric reader installed at the entrance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  AEEBBS verifies the passenger’s identity by querying the UIDAI’s  database, and then checks the airport’s flight information system to see  if the passenger is booked to fly that day.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thereafter, the  system creates a “passenger dataset” that bundles the passenger’s  biometrics and flight information into a single file unique to each  passenger. This dataset is used to verify the identity of the passenger  at each checkpoint, allowing the airport to track the passenger until  she boards her plane.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The tender document states that the  biometric data should be purged immediately after the passenger’s flight  departs. If flights are rescheduled, the biometrics shall persist until  the passenger finally departs.&lt;/p&gt;
&lt;div class="airport_wrap" style="text-align: justify; "&gt;
&lt;div class="airport_padding"&gt;
&lt;div class="airport_headline"&gt;Concerns over Bengaluru airport’s use of Aadhaar&lt;/div&gt;
The  Aadhaar-Enabled Entry and Biometric Boarding System (AEEBBS) aims to  replace boarding cards with a passenger’s fingerprint. Here is how it  works.&lt;/div&gt;
&lt;img src="http://www.hindustantimes.com/static/ht2017/11/bengaluru_airport_aadhaar.jpg" width="100%&amp;quot;/" /&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Why Biometrics?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Bengaluru isn’t the only airport experimenting with systems like the AEEBBS.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We  have initiated trials on facial recognition, iris and finger-print  scanning etc., to generate Aadhaar + Biometric enabled passenger  data-sets,” said a spokesperson for the GMR Hyderabad International  Airport. “We hope to complete these trials in the next two months and  deploy them by June 2018 for all domestic passengers.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Yet  biometrics isn’t a fool-proof way of verifying someone’s identity.  Biometric experts have maintained that fingerprints can be copied and  printed onto “fake fingers” — a process known as spoofing.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At  Michigan State University, biometric expert Anil Jain and his team have  developed so-called fake fingers using 12 different materials, the most  sophisticated of which mimics the physical properties of human skin.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Many  of the commercial systems may not have state-of-the-art spoof detection  facilities,” Jain said, adding that he has advised the UIDAI on  biometrics in the past.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Jain said it was important that a secured  space like an airport have biometric readers that include “liveness”  detection, a term that refers to a broad set of techniques that use a  combination of advanced hardware and software to avoid spoof attacks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However,  it is not mandatory for UIDAI-certified biometric devices to have  liveness detection features. Documents published by Standardisation  Testing and Quality Certification (STQC), the agency tasked with  certifying Aadhaar devices, make clear that “liveness detection” is  “preferable” but not mandatory.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some manufacturers of certified  devices say their devices have liveness detection, but STQC does not  include this specific feature in its testing.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prof Jain said  biometrics are harder to forge than the identity cards that are  currently needed to gain access to airport terminals, suggesting that  the AEEBBS could increase security only if the data that undergirds the  system is properly secured.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Storage Concerns&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under  regulations framed by the Unique Identification Authority of India  (UIDAI), it is illegal to store biometric data captured for any  Aadhaar-related transaction.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Also, UIDAI-certified biometric  devices are prohibited from storing biometric data which casts a cloud  over BIAL’s proposal to create passenger datasets to merge passenger  flight data, biometric data and Aadhaar numbers, and store it on a local  BIAL network.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While UIDAI did not respond to requests for comment  on if these passenger data sets violated its regulations, BIAL said it  would work around the system by capturing passenger biometric data twice  — once to verify passenger identities in accordance with UIDAI  regulations, and once for the purpose of creating the passenger data  set.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Our intent is to capture data and store a separate set of  biometrics records (delinked from Aadhaar) that include  face/iris/fingerprints for the purpose of authentication of passenger at  various check points inside the airport,” the spokesperson said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some experts believe this may not be enough.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The  Aadhaar Act and Regulations are supposed to ensure that our biometric  records are safe, and entities capturing biometrics for Aadhaar-related  purposes cannot store the biometrics,” said Pranesh Prakash, policy  director at the Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“If biometrics  collected doesn’t need to follow the Aadhaar regulations because of a  technicality, how strong are the regulations?” Prakash said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Last  year, 22.18 million passengers travelled through Bengaluru airport. Once  the AEEBBS is installed, the airport’s servers shall become a temporary  repository of millions of fingerprints, and a lucrative target for  sophisticated hackers who could capture this data by implanting  malicious software in the system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Such software has become easier  to access since August 2016, when a group calling itself the “Shadow  Brokers” announced it had stolen some of the world’s most advanced  cyber-weapons from the vaults of the Tailored Access Operations unit of  National Security Agency, which manages the cyber-arsenal of the United  States of America.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Designing the system to minimise the use of  biometrics could alleviate these concerns, according to Rahul Matthan, a  partner at law firm Trilegal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“If data minimisation is the  principle that we keep on top of mind, Aadhaar should be used to allow  entry,” Matthan said, “Then the airport must devise other methods and  standards to ensure that security and passenger tracking is achieved.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Safeguarding Aadhaar Numbers&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  AEEBBS also raises questions on the manner in which airlines and  airports will store non-biometric data like passenger Aadhaar numbers.  UIDAI regulations published in July 2017 say companies and government  departments must store Aadhaar numbers in secure, isolated, databases  called ‘Aadhaar Data Vaults’.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Each Aadhaar number in these vaults  must be associated with a “reference key” — which is like a nick-name  for the Aadhaar number. So instead of using a citizen’s Aadhaar number  for a given transaction, businesses must preserve the confidentiality of  the number by using the reference key instead.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Jet Airway’s  decision to print Aadhaar numbers, rather than the reference keys, on  the boarding passes, suggests that the airline is not following UIDAI  guidelines — a problem that is likely to multiply as more airlines start  gathering this information to avail of the AEEBBS facility. Jet Airways  did not respond to requests for comment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Once the AEEBBS is in  place, BIAL also intends to use passenger data, harvested during  check-in and boarding, for commercial purposes, but it is unclear if and  how this data will be anonymised before it is used.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We aim to  make meaning of the abundant data that will be collected,” the BIAL  spokesperson said, insisting that the airport would respect traveller  privacy and the data would not be sold to third parties. “In due course —  and with passenger consent — we intend to use business intelligence to  make the journey more impactful.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For lawyer Matthan, the AEEBBS  is an example of why India needs a comprehensive data protection law to  address issues between citizens and private corporations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“There  is a need to ensure that Aadhaar is based on a sound framework of  privacy protection,” he said, noting that the recent Supreme Court  judgment protected citizen privacy against infringement by the  government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Data protection legislation, he said, would ensure that private corporations are held to the same standard.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/hindustan-times-aman-sethi-november-27-2017-aadhaar-verification-at-airports-raises-need-for-stricter-data-privacy-regulations'&gt;https://cis-india.org/internet-governance/news/hindustan-times-aman-sethi-november-27-2017-aadhaar-verification-at-airports-raises-need-for-stricter-data-privacy-regulations&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-11-27T13:34:35Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comments-by-the-centre-for-internet-and-society-on-the-report-of-the-committee-on-medium-term-path-on-financial-inclusion">
    <title>Comments by the Centre for Internet and Society on the Report of the Committee on Medium Term Path on Financial Inclusion </title>
    <link>https://cis-india.org/internet-governance/blog/comments-by-the-centre-for-internet-and-society-on-the-report-of-the-committee-on-medium-term-path-on-financial-inclusion</link>
    <description>
        &lt;b&gt;Apart from item-specific suggestions, CIS would like to make one broad comment with regard to the suggestions dealing with linking of Aadhaar numbers with bank accounts. Aadhaar is increasingly being used by the government in various departments as a means to prevent fraud, however there is a serious dearth of evidence to suggest that Aadhaar linkage actually prevents leakages in government schemes. The same argument would be applicable when Aadhaar numbers are sought to be utilized to prevent leakages in the banking sector.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The Centre for Internet and Society (CIS) is a non-governmental organization which undertakes interdisciplinary research on internet and digital technologies from policy and academic perspectives.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In the course of its work CIS has also extensively researched and witten about the Aadhaar Scheme of the Government of India, specially from a privacy and technical point of view. CIS was part of the Group of Experts on Privacy constituted by the Planning Commission under the chairmanship of Justice AP Shah Committee and was instrumental in drafting a major part of the report of the Group. In this background CIS would like to mention that it is neither an expert on banking policy in general nor wishes to comment upon the purely banking related recommendations of the Committee. We would like to limit our recommendations to the areas in which we have some expertise and would therefore be commenting only on certain Recommendations of the Committee.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Before giving our individual comments on the relevant recommendations, CIS would like to make one broad comment with regard to the suggestions dealing with linking of Aadhaar numbers with bank accounts. Aadhaar is increasingly being used by the government in various departments as a means to prevent fraud, however there is a serious dearth of evidence to suggest that Aadhaar linkage actually prevents leakages in government schemes. The same argument would be applicable when Aadhaar numbers are sought to be utilized to prevent leakages in the banking sector.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Another problem with linking bank accounts with Aadhaar numbers, even if it is not mandatory, is that when the RBI issues an advisory to (optionally) link Aadhaar numbers with bank accounts, a number of banks may implement the advisory too strictly and refuse service to customers (especially marginal customers) whose bank accounts are not linked to their Aadhaar numbers, perhaps due to technical problems in the registration procedure, thereby denying those individuals access to the banking sector, which is contrary to the aims and objectives of the Committee and the stated policy of the RBI to improve access to banking.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Individual Comments&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Recommendation 1.4 - Given the predominance of individual account holdings, the Committee recommends that a unique biometric identifier such as Aadhaar should be linked to each individual credit account and the information shared with credit information companies. This will not only be useful in identifying multiple accounts, but will also help in mitigating the overall indebtedness of individuals who are often lured into multiple borrowings without being aware of its consequences.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;CIS Comment&lt;/strong&gt;: The discussion of the committee before making this recommendation revolves around the total incidence of indebtedness in rural areas and their Debt-to-Asset ratio representing payment capacity. However, the committee has not discussed any evidence which indicates that borrowing from multiple banks leads to greater indebtedness for individual account holders in the rural sector. Without identifying the problem through evidence the Committee has suggested linking bank accounts with Aadhaar numbers as a solution.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Recommendation 2.2 - On the basis of cross-country evidence and our own experience, the Committee is of the view that to translate financial access into enhanced convenience and usage, there is a need for better utilization of the mobile banking facility and the maximum possible G2P payments, which would necessitate greater engagement by the government in the financial inclusion drive.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;CIS Comment&lt;/strong&gt;: The drafting of the recommendation suggests that RBI is batting for the DBT rather than the subsidy model. However an examination of the discussion in the report suggests that all that the Committee has not discussed or examined the subsidy model vis-à-vis the direct benefit transfer (DBT) model here (though it does recommend DBT in the chapter on G-2-P payments), but only is trying to say is that where government to people money transfer has to take place, it should take place using mobile banking, payment wallets or other such technologies, which have been known to be successful in various countries across the world.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Recommendation 3.1 - The Committee recommends that in order to increase formal credit supply to all agrarian segments, the digitization of land records should be taken up by the states on a priority basis.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Recommendation 3.2 - In order to ensure actual credit supply to the agricultural sector, the Committee recommends the introduction of Aadhaar-linked mechanism for Credit Eligibility Certificates. For example, in Andhra Pradesh, the revenue authorities issue Credit Eligibility Certificates to Tenant Farmers (under ‘Andhra Pradesh Land Licensed Cultivators Act No 18 of 2011'). Such tenancy /lease certificates, while protecting the owner’s rights, would enable landless cultivators to obtain loans. The Reserve Bank may accordingly modify its regulatory guidelines to banks to directly lend to tenants / lessees against such credit eligibility certificates.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;CIS Comment&lt;/strong&gt;: The Committee in its discussion before the recommendation 3.2 has discussed the problems faced by landless farmers, however there is no discussion or evidence which suggests that an Aadhaar linked Credit Eligibility Certificate is the best solution, or even a solution to the problem. The concern being expressed here is not with the system of a Credit Eligibility Certificate, but with the insistence on linking it to an Aadhaar number, and whether the system can be put in place without linking the same to an Aadhaar number.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Recommendation 6.11 - Keeping in view the indebtedness and rising delinquency, the Committee is of the view that the credit history of all SHG members would need to be created, linking it to individual Aadhaar numbers. This will ensure credit discipline and will also provide comfort to banks.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;CIS Comment&lt;/strong&gt;: There is no discussion in the Report on the reasons for increase in indebtedness of SHGs. While the recommendation of creating credit histories for SHGs is laudable and very welcome, however there is no logical reason that has been brought out in the Report as to why the same needs to be linked to individual Aadhaar numbers and how such linkage will solve any problems.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Recommendation 6.13 - The Committee recommends that bank credit to MFIs should be encouraged. The MFIs must provide credit information on their borrowers to credit bureaus through Aadhaar-linked unique identification of individual borrowers.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;CIS Comment&lt;/strong&gt;: Since the discussion before this recommendation clearly indicates multiple lending practices as one of the problems in the Microfinance sector and also suggests better credit information of borrowers as a possible solution, therefore this recommendation per se, seems sound. However, we would still like to point out that the RBI may think of alternative means to get borrower credit history rather than relying upon just the Aadhaar numbers.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Recommendation 7.3 - Considering the widespread availability of mobile phones across the country, the Committee recommends the use of application-based mobiles as PoS for creating necessary infrastructure to support the large number of new accounts and cards issued under the PMJDY. Initially, the FIF can be used to subsidize the associated costs. This will also help to address the issue of low availability of PoS compared to the number of merchant outlets in the country. Banks should encourage merchants across geographies to adopt such applicationbased mobile as a PoS through some focused education and PoS deployment drives.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Recommendation 7.5 - The Committee recommends that the National Payments Corporation of India (NPCI) should ensure faster development of a multi-lingual mobile application for customers who use non-smart phones, especially for users of NUUP; this will address the issue of linguistic diversity and thereby promote its popularization and quick adoption.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Recommendation 7.8 - The Committee recommends that pre-paid payment instrument (PPI) interoperability may be allowed for non-banks to facilitate ease of access to customers and promote wider spread of PPIs across the country. It should however require non-bank PPI operators to enhance their customer grievance redressal mechanism to deal with any issues thereof.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Recommendation 7.9 - The Committee is of the view that for non-bank PPIs, a small-value cashout may be permitted to incentivize usage with the necessary safeguards including adequate KYC and velocity checks.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;CIS Comments&lt;/strong&gt;: While CIS supports the effort to use technology and mobile phones to increase banking penetration and improve access to the formal financial sector for rural and semi-rural areas, sufficient security mechanisms should be put in place while rolling out these services keeping in mind the low levels of education and technical sophistication that are prevalent in rural and semi-rural areas.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Recommendation 8.1 - The Committee recommends that the deposit accounts of beneficiaries of government social payments, preferably all deposits accounts across banks, including the ‘inprinciple’ licensed payments banks and small finance banks, be seeded with Aadhaar in a timebound manner so as to create the necessary eco-system for cash transfer. This could be complemented with the necessary changes in the business correspondent (BC) system (see Chapter 6 for details) and increased adoption of mobile wallets to bridge the ‘last mile’ of service delivery in a cost-efficient manner at the convenience of the common person. This would also result in significant cost reductions for the government besides promoting financial inclusion.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;CIS Comment&lt;/strong&gt;: While the report of the Committee has already given several examples of how cash transfer directly into the bank accounts (rather than requiring the beneficiaries to be at a particular place at a particular time) could be more efficient as well as economical, the Committee is making the same point again here under the chapter that deals specifically with government to person payments. However even before this recommendation, there has been no discussion as to the need for linking or “seeding” the deposit accounts of the beneficiaries with Aadhaar numbers, let alone a discussion of how it would solve any problems.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Recommendation 10.6 - Given the focus on technology and the increasing number of customer complaints relating to debit/credit cards, the National Payments Corporation of India (NPCI) may be invited to SLBC meetings. They may particularly take up issues of Aadhaar-linkage in bank and payment accounts.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;CIS Comment&lt;/strong&gt;: There is no discussion on why this recommendation has been made, more particularly; there is no discussion at all on why issues of Aadhaar linkage in bank and payment accounts need to be taken up at all.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comments-by-the-centre-for-internet-and-society-on-the-report-of-the-committee-on-medium-term-path-on-financial-inclusion'&gt;https://cis-india.org/internet-governance/blog/comments-by-the-centre-for-internet-and-society-on-the-report-of-the-committee-on-medium-term-path-on-financial-inclusion&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vipul</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Financial Inclusion</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2016-03-01T13:53:38Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/newsclick-martin-moore-may-20-2019-aadhaar-reduced-agency-in-citizens-and-empowered-those-in-positions-of-authority">
    <title>"Aadhaar Reduced Agency in Citizens and Empowered Those in Positions of Authority"</title>
    <link>https://cis-india.org/internet-governance/news/newsclick-martin-moore-may-20-2019-aadhaar-reduced-agency-in-citizens-and-empowered-those-in-positions-of-authority</link>
    <description>
        &lt;b&gt;In the space of one election cycle, authoritarian governments, moneyed elites and fringe hackers figured out how to game elections, bypass democratic processes, and turn social networks into battlefields. Facebook, Google and Twitter – where our politics now takes place – have lost control and are struggling to claw it back. As our lives migrate online, we are gradually moving into a world of datafied citizens and real-time surveillance. The entire political landscape has changed, with profound consequences for democracy. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Martin Moore was &lt;a class="external-link" href="https://www.newsclick.in/aadhar-reduced-agency-citizens-and-empowered-those-positions-authority"&gt;published by NewsClick&lt;/a&gt; on May 20, 2019. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;em&gt;Written by Martin Moore,&lt;/em&gt; Democracy Hacked: Political Turmoil and Information Warfare in the Digital Age,&lt;em&gt; is a compelling account of how democracy is being disrupted by the tech revolution, and what can be done to get us back on track. The following are excerpts from the chapter &lt;/em&gt;"Survellaince Democracy" &lt;em&gt;of the book.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Tembhli, a remote rural village in northern Maharashtra, about 250 miles north of Mumbai, is rarely visited by high-powered politicians or prominent dignitaries. But on Wednesday, 29 September 2010, it found itself hosting not just the Indian prime minister, Manmohan Singh, but the president of Congress, Sonia Gandhi; the chief and deputy chief ministers and the governor of Maharashtra; and the head of the recently established Unique Identification Authority of India, Nandan Nilekani. It was this last figure, the least well known of the distinguished group, who was the reason behind the visit, and who would subsequently play the most important role in its aftermath. Nilekani and the politicians were there to give out the first ten ‘unique identifiers’ to residents of Tembhli. These ten people received their own twelve-digit number, a number that would, from that day forward, distinguish each of them from every other Indian citizen, and indeed – combined with their biometric data – from every other citizen in the world. “With this,” Sonia Gandhi said, “Tembhli has got a special importance in the map of India. People of Tembhli will lead the rest of the country. It is a historic step towards strengthening the people of our nation.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Governments of all stripes are prone to exaggerated rhetoric, but in this instance, Gandhi was proved right when she proclaimed that “starting from this tiny hamlet, the scheme will reach more than a billion people of this country.” Despite the change of government in 2014, by April 2016 a billion Indians had been allocated their unique identifier. By 2018 the number had exceeded 1.1 billion, out of a total population of just over 1.3 billion. It was, in the words of a Harvard Business School report, a “hugely ambitious project”, “the largest-scale project of its kind in the world”. Aadhaar, as the project was called, was “unique in its scale and ambition”.3 Each Aadhaar identifier included not just a twelve-digit number, but all ten fingerprints, iris scans from both eyes, and a photograph of each person’s face (with the potential for facial recognition later). By combining the number with one element of biometric data, the government believed, it could ensure that every Indian citizen had a single, verifiable, machine-readable identity. With this verifiable identity a citizen could open a bank account, receive welfare or pension payments, pay tax, apply for a driving license, or receive healthcare, regardless of literacy. In a country known for its administrative torpor and tortuous bureaucracy, where – in 2013 – only forty per cent of children’s births were even registered, such a scheme had the potential to let India leapfrog other democratic countries into the digital era, and make government not just digitally enabled but digitally empowered.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Yet this, for critics of the scheme, was one of its many flaws. “Aadhaar marks a fundamental shift in citizen–state relations,” Pranesh Prakash from India’s Centre for the Internet and Society wrote in the &lt;em&gt;Hindustan Times&lt;/em&gt;, “from ‘We the People’ to ‘We the Government’.” Civil society activists objected to the government’s enhanced power, and the relative unaccountability of the body running Aadhaar, headed by Nandan Nilekani until 2014. “In effect,” tech developer and activist Kiran Jonnalagadda wrote, “they are beyond the rule of law.” Others had practical objections.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Biometric identification often did not work. A database of this size and importance was bound to attract hackers. Leaks were inevitable. Indeed, the &lt;em&gt;Tribune&lt;/em&gt; newspaper in January 2018 revealed that it had been able to buy a service, for 500 rupees (less than $10), that gave it access to any of up to one billion Aadhaar details. Yet such objections were written off as ‘scaremongering’ and Aadhaar critics as “activists of the upper crust, upper class, wine ’n cheese, Netflix-watching social media elite”. On top of which, despite an Indian Supreme Court judgment in August 2017 that affirmed the fundamental right of Indians to privacy, by early 2018 Aadhaar had achieved such momentum as to appear unstoppable. If the government was able to navigate the various legislative challenges to the scheme, then there was also a queue of other nations keen to adopt something similar.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[…]&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As the government pushed Aadhaar towards every interaction the state had with the citizen, evidence mounted of failures in the system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the north-eastern state of Jharkhand, an eleven-year-old girl died of starvation after her family stopped receiving their government food ration. Their ration card, the Hindu Centre for Politics and Public Policy reported, “was not linked to Aadhaar”. The centre also reported on data, taken from the government’s websites, showing that in Rajasthan, where receiving rations was dependent on Aadhaar authentication, between a quarter and a third of people with ration cards did not receive rations between September 2016 and July 2017. In some ration shops, after having spent hours trying and failing to get their fingerprints read by the biometric machines, people lost their temper and smashed the machines on the ground.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Across India there were reports of machines not recognizing fingerprints, or only recognizing them after multiple attempts. Old people’s prints turned out to be more difficult to read, as were those of manual workers and fishermen. Since the system presumes guilt rather than innocence, the burden of proof lies with the citizen, not with the state. To claim a ration, apply for a scholarship or buy a train ticket, you have to prove who you are before receiving it. The obligation lies with the citizen to prove she is not a fraud. Even if she is not, and the failure is not with her but with the system, she pays for the system’s failure, not the government. To dispute a decision made by the machine means going to the nearest large town – often many miles away – and convincing an official that the problem is with the machine or the digital record, not with you. It is not surprising that some people wrecked Aadhaar machines in their rage.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the system was found to reduce agency in citizens, it empowered those in positions of authority. Central government was able to make public services conditional on authentication by Aadhaar (despite repeated court rulings that Aadhaar be voluntary, not mandatory). This conditionality could then be extended to the level and type of public services available to individuals. In fact, it had to be for many services – distinguishing pensioners from non-pensioners, for example. Yet in this conditionality, there is plenty of scope for harm and abuse. In 2017 the independent media site &lt;em&gt;Scroll.in&lt;/em&gt; reported a rising number of HIV-positive patients who were dropping out of treatment programmes because they were required to use their Aadhaar numbers and were fearful of their condition becoming public.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Equally, while Aadhaar itself did not provide any information about caste, ethnicity, religion or language, once it was linked to other databases, most notably the National Population Register, then it became possible to identify people by group. Formal group identification by the state has an ignominious history. During the apartheid era in South Africa, the penultimate number on the South African identity card indicated race. In the Rwandan genocide in 1994, anyone who had ‘Tutsi’ on their identification was liable to be killed. In Nazi Germany in 1938, every Jewish citizen had ‘J’ stamped on their ID cards and passports. In India, where political and religious divisions are closely intertwined, there is good reason to be anxious about new opportunities for group identification.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thanks to Aadhaar, companies started to build services using unique identification. A series of ‘trust platforms’ emerged, built on top of Aadhaar, where employers – and others – could access and authenticate people’s identity. A company called TrustID advertised itself as “India’s first, unique and comprehensive online verification platform”. Through TrustID an employer could check whether a potential employee had any criminal or civil convictions, or whether that person had a good or bad reputation (based on a news search and social media profiling). The company even encouraged women to check up on potential husbands they had found via marriage websites. Other international companies integrated Aadhaar into existing services. This is similar to the way in which companies work with platforms like Facebook to profile, and target, individuals based on their personal information – except in this instance doing it via the government. All the same questions about trust, privacy, freedom and power arise, with even greater political potency. The state and private companies are in partnership to track citizens constantly and to gather as much data as they can on them – data that they can then use for commercial or political purposes. This opaque, asymmetrical knowledge of the citizen seems like the reverse of what was intended by democratic transparency, especially in the absence of strong privacy and data protection. “Totalitarian states often do this against the wishes of their citizens,” Pratap Bhanu Mehta, the president of the Centre for Policy Research, writes, yet “in our democracy, our consent is being mobilized to put an imprimatur over more control and arbitrariness.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In August 2017, the Supreme Court of India came to a unanimous 9–0 decision that Article 21 of the Indian Constitution did guarantee a fundamental right to privacy. As such, it was not lawful for the government to make it mandatory for people to identify themselves using a unique identifier like Aadhaar, except in specific circumstances. To some this looked like a huge blow to the grand project. The Supreme Court decision “raises serious questions about Aadhaar”, lawyer Adarsh Ramanujan argued in India’s &lt;em&gt;Financial Express&lt;/em&gt;, and appeared to send “a direction to the central government to create a regime to ensure that privacy rights are not trammelled by other private parties”. The judgment was about privacy broadly, and did not refer to specific cases like Aadhaar, but was seen as the basis from which future challenges to the scheme could be launched. The Modi government, however, appeared to carry on regardless. In October it linked Aadhaar to driving licence applications. By mid-December, the government had made Aadhaar mandatory if citizens wanted to access any of 140 government services.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nandan Nilekani, who had stepped down as chair of Aadhaar in 2014 in order to become a candidate for the Congress party, railed against those who criticized the scheme. There was, he claimed, an “orchestrated campaign” to malign the system. “I think this so-called anti-Aadhaar lobby is really just a small bunch of liberal elites who are in some echo chamber,” he told an Indian business news channel. Anyway, Nilekani argued, it was too late for the naysayers to stop it. Too many people were now enrolled. It was too integral to the provision of services. Others saw attacks on Aadhaar as political, arguing that Congress was using it for political gain prior to the 2019 election, and that this would backfire. “Aadhaar today is not just a number,” the editor of India’s &lt;em&gt;Economic Times&lt;/em&gt;wrote. “The Congress envisaged it as a means of identity but the Modi government has taken it to a different level. It has become a weapon in the hands of the poor and a powerful tool to fight entrenched black money interests. It is now a symbol of anti-corruption, anti-black money drives, a symbol of efficient allocation of welfare benefits.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/newsclick-martin-moore-may-20-2019-aadhaar-reduced-agency-in-citizens-and-empowered-those-in-positions-of-authority'&gt;https://cis-india.org/internet-governance/news/newsclick-martin-moore-may-20-2019-aadhaar-reduced-agency-in-citizens-and-empowered-those-in-positions-of-authority&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Martin Moore</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-05-21T15:33:01Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/workshop-on-democratic-accountability-in-the-digital-age-delhi-november-14-15">
    <title>Workshop on Democratic Accountability in the Digital Age (Delhi, November 14-15)</title>
    <link>https://cis-india.org/internet-governance/events/workshop-on-democratic-accountability-in-the-digital-age-delhi-november-14-15</link>
    <description>
        &lt;b&gt;IT for Change, along with Centre for Internet and Society (CIS), Digital Empowerment Foundation (DEF), Mazdoor Kisan Shakti Sangathan (MKSS) and National Campaign for People’s Right to Information (NCPRI), is organising a two day workshop on ‘Democratic Accountability in the Digital Age’. The workshop will focus on evolving a comprehensive policy approach to data based governance and digital democracy, grounded in a rights and social justice framework. It will be held at the United Service Institution of India, Delhi, during November 14-15, 2016. The CIS team to participate in the workshop includes Sumandro Chattapadhyay (speaker), Amber Sinha (speaker), Vanya Rakesh (participant), and Himadri Chatterjee (participant).&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The workshop aims to:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;Discuss the institutional norms, rules and practices appropriate to the rise of ‘governance by networks’ and ‘rule by data’ that can guarantee democratic accountability and citizen participation, and&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Articulate the steps to claim the civic-public value of digital technologies so that data and the new possibilities for networking are harnessed for a vibrant grassroots democracy.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;We hope the workshop can create a civil society coalition that can build effective strategies for legal and policy reform to further participatory democracy in the digital age. On the first day, the workshop will set the context through knowledge sharing and thematic presentations and discussions. On the second day, we aim to concretize strategies for collective action to further democratic accountability in the digital age.&lt;/p&gt;
&lt;hr /&gt;
&lt;h4&gt;&lt;a href="http://itforchange.net/mavc/wp-content/uploads/2016/11/Workshop-Agenda-Democratic-accountability-in-the-digital-age-14-to-15-Nov-2016-2.pdf"&gt;Workshop Agenda&lt;/a&gt; (PDF)&lt;/h4&gt;
&lt;h4&gt;&lt;a href="http://itforchange.net/mavc/wp-content/uploads/2016/10/Background-note-for-workshop-on-Democracy-in-Digital-Age-Sep21.odt"&gt;Background Note&lt;/a&gt; (ODT)&lt;/h4&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/workshop-on-democratic-accountability-in-the-digital-age-delhi-november-14-15'&gt;https://cis-india.org/internet-governance/events/workshop-on-democratic-accountability-in-the-digital-age-delhi-november-14-15&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital ID</dc:subject>
    
    
        <dc:subject>Digital Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Accountability</dc:subject>
    
    
        <dc:subject>Digital India</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Welfare Governance</dc:subject>
    
    
        <dc:subject>E-Governance</dc:subject>
    
    
        <dc:subject>Digital Rights</dc:subject>
    

   <dc:date>2016-12-15T09:27:22Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/economic-times-january-14-2017-sunil-abraham-on-aadhaar-misuse-during-demonetisation">
    <title>Sunil Abraham on Aadhaar's misuse during demonetisation</title>
    <link>https://cis-india.org/internet-governance/news/economic-times-january-14-2017-sunil-abraham-on-aadhaar-misuse-during-demonetisation</link>
    <description>
        &lt;b&gt;Sunil Abraham spoke to Economic Times on the misuse of Aadhaar during demonetisation. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Sunil Abraham said:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"We saw Aadhaar being misused at large-scale during the demonetization, criminals had created a black market in Aadhaar identity cards and photocopies of Aadhaar. Those interested in converting black money were purchasing these photocopies from the black market and giving them to bank officials so that they could maintain fake records that tried to prove that ordinary people came in photos' cash transactions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Whenever we try to introduce technological measures we must always think of the human systems that are at work and the human procedures that are at work. Another example is today telcos giving sim cards based on Aadhaar authentication to meet their sales targets some of these telcos are giving multiple sim  cards for a single Aadhaar based KYC. Those sim cards are often resold into black market or given to persons that are not familiar with the aadhaar number holder and this has only makes the security situation in the country worse. It has not improved." Watch the &lt;b&gt;&lt;a class="external-link" href="http://economictimes.indiatimes.com/et-now/experts/sunil-abraham-on-aadhaars-misuse-during-demonetisation/videoshow/56544492.cms"&gt;Video&lt;/a&gt;&lt;/b&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/economic-times-january-14-2017-sunil-abraham-on-aadhaar-misuse-during-demonetisation'&gt;https://cis-india.org/internet-governance/news/economic-times-january-14-2017-sunil-abraham-on-aadhaar-misuse-during-demonetisation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Demonetisation</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-01-19T01:35:02Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/seminar-on-understanding-financial-technology-cashless-india-and-forced-digitalisation-delhi-jan-24-2017">
    <title>Seminar on Understanding Financial Technology, Cashless India, and Forced Digitalisation (Delhi, January 24)</title>
    <link>https://cis-india.org/internet-governance/news/seminar-on-understanding-financial-technology-cashless-india-and-forced-digitalisation-delhi-jan-24-2017</link>
    <description>
        &lt;b&gt;The Centre for Financial Accountability is organising a seminar on "Understanding Financial Technology, Cashless India, and Forced Digitalisation" on Tuesday, January 24, at YWCA, Ashoka Road, New Delhi. Sumandro Chattapadhyay will participate in the seminar and speak on the emerging architecture of FinTech in India, as being developed and deployed by UIDAI and NPCI.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Cross-posted from &lt;a href="https://letstalkfinancialaccountability.wordpress.com/2017/01/20/understanding-financial-technology-cashless-india-forced-digitalisation/"&gt;Centre for Financial Accountability&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;Programme Schedule&lt;/h2&gt;
&lt;h4&gt;09.30 - Registration&lt;/h4&gt;
&lt;h4&gt;10:00 - Introduction to the Seminar &amp;amp; Setting the Context&lt;/h4&gt;
&lt;p&gt;Madhuresh Kumar, National Alliance of People’s Movements&lt;/p&gt;
&lt;h4&gt;10:15–11:30 - Session 1 - Understanding the Political Context of FinTech&lt;/h4&gt;
&lt;p&gt;B P Mathur, Former Dy CAG&lt;/p&gt;
&lt;p&gt;Prabir Purkayastha, Free Software Movement of India and Knowledge Commons&lt;/p&gt;
&lt;p&gt;C P Chandrasekhar, Centre for Economic Studies and Planning, JNU&lt;/p&gt;
&lt;h4&gt;11:30-11:45 – Tea / Coffee break&lt;/h4&gt;
&lt;h4&gt;11:45-13:15 - Session 2 - How will FinTech Impact the Poor, and Labour and Banking Sector?&lt;/h4&gt;
&lt;p&gt;Ashim Roy, New Trade Union of India&lt;/p&gt;
&lt;p&gt;Nikhil Dey, Mazdoor Kisan Shakti Sangathan&lt;/p&gt;
&lt;p&gt;Ravinder Gupta, General Secretary, State Bank of India Officers Association&lt;/p&gt;
&lt;h4&gt;13:15-14:00 – Lunch&lt;/h4&gt;
&lt;h4&gt;14:00-15:30 - Session 3 - Understanding the Economic Context of FinTech&lt;/h4&gt;
&lt;p&gt;Indira Rajaraman, Former Director, RBI&lt;/p&gt;
&lt;p&gt;Tony Joseph, Sr. Journalist&lt;/p&gt;
&lt;h4&gt;15:30-17:00 - Session 4 - Understanding the Architecture of FinTech: Linkages to Aadhaar, IndiaStack etc&lt;/h4&gt;
&lt;p&gt;Sumandro Chattapadhyay, the Centre for Internet and Society&lt;/p&gt;
&lt;p&gt;Gopal Krishna, ToxicsWatch&lt;/p&gt;
&lt;h4&gt;17:00 – Tea&lt;/h4&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/seminar-on-understanding-financial-technology-cashless-india-and-forced-digitalisation-delhi-jan-24-2017'&gt;https://cis-india.org/internet-governance/news/seminar-on-understanding-financial-technology-cashless-india-and-forced-digitalisation-delhi-jan-24-2017&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Unified Payments Interface</dc:subject>
    
    
        <dc:subject>Financial Technology</dc:subject>
    
    
        <dc:subject>Digital ID</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Digital Economy</dc:subject>
    
    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital India</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Financial Inclusion</dc:subject>
    
    
        <dc:subject>Biometrics</dc:subject>
    
    
        <dc:subject>Digital Payment</dc:subject>
    

   <dc:date>2017-01-23T13:17:19Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/vidhi-doshi-fingerprint-payments-prompt-privacy-fears-in-india-the-guardian">
    <title>Vidhi Doshi - Fingerprint Payments Prompt Privacy Fears in India (The Guardian)</title>
    <link>https://cis-india.org/internet-governance/news/vidhi-doshi-fingerprint-payments-prompt-privacy-fears-in-india-the-guardian</link>
    <description>
        &lt;b&gt;This article by Vidhi Doshi on the use of Aadhaar-based payments by private companies in India was published by The Guardian on February 09, 2017. Sumandro Chattapadhyay is quoted in the article.&lt;/b&gt;
        
&lt;p&gt;Originally published by &lt;a href="https://www.theguardian.com/sustainable-business/2017/feb/09/fingerprint-payments-privacy-fears-india-banknotes"&gt;The Guardian&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;For two years, Indian officials have been trawling the country, from city slums to unelectrified villages, zapping eyeballs, scanning fingerprints and taking photographs.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Last month, Indian shoppers started to see the results. With the launch of a government-backed fingerprint payment system, tied to India’s growing biometric data bank, registered citizens can – in theory at least – now pay for things with the touch of a finger.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;India’s extraordinary biometric database, named Aadhaar after a Hindi word for ‘foundation’, is the biggest of its kind in the world. It was initially sold to the public as a welfare delivery mechanism that would ensure the country’s 1.25bn citizens were each receiving the right quantity of subsidised rice or cooking fuel, while weeding out fraudsters.&lt;/p&gt;
&lt;p&gt;But now this pool of more than a billion people’s biometric data is being used by banks, credit checking firms and other private companies to identify customers, raising questions about privacy and security.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;As one of his flagship policies, prime minister Narendra Modi pledged to create a “digital India” in which the country’s cash-centric economy would switch to credit and debit cards, squeezing the parallel economy of untaxed cash transactions and giving more citizens access to digital financial services.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In a surprise television announcement last November, Modi announced the demonetisation of 500 and 1,000 rupee notes (around £6 and £12), wiping out 85% of the country’s circulating currency overnight.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Two days later, when the banks reopened, long queues snaked around almost every branch, with millions lining up to open bank accounts for the first time. Many used their 12-digit Aadhaar number, linked to their biometric profile, to sign up. Within three weeks, 3m bank accounts had been opened using fingerprint verification, according to estimates.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The moment marked a radical change for India’s banking system, under which applicants were traditionally required to file photocopies of passports or voter IDs. Banks could take weeks, sometimes months, to verify them. Now applicants’ encrypted biometric data can be sent to the Unique Identification Authority of India (UIDAI), a government agency, to be matched against their Aadhaar data, re-encrypted and sent back to the bank.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Despite technical teething problems, the system is designed to allow very fast authorisation. “All this happens in a matter or two or three seconds,” explains Ajay Bhushan Pandey, UIDAI’s director general.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;For Pandey, the benefits are clear: paper documents are easy to forge and hard to verify, especially in India where until recently thousands of people still used handwritten passports. Not so biometric data.&lt;/p&gt;
&lt;h4&gt;Privacy fears&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;Pandey emphasises that private banks and companies aren’t able to access the entire Aadhaar database, only to use the government interface, which allows them to verify identities.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Nonetheless, many Indians are worried about the privacy implications. Sumandro Chattapadhyay, a director at the Centre for Internet and Society thinktank, is one of them.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;For starters, says Chattapadhyay, the law governing use of the biometric database, fast-tracked through parliament last year, is flimsy when it comes to the private sector. Since India lacks a general privacy or data protection law, this leaves corporate use of Aadhaar services effectively unregulated, he says.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This is particularly worrying, says Chattapadhyay, because of the data-sharing possibilities opened up by Aadhaar. It makes it easier for companies not only to share information on individuals’ consumption and mobility habits, but also to link this data up with public records like the electoral register, he says. “Both lead to significant threats to privacy of individuals.”&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Chattapadhyay’s fear is that private companies could eventually gain access to government-held personal data, such as income or medical records, while the government could use company data like phone records to target specific individuals in political campaigns.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Already companies are linking Aadhaar numbers with collected metadata. Credit-checking startup CreditVidya, for example, identifies clients using their biometric ID in combination with their internet browsing history and other data, to assign credit scores for users who have no record of loan repayments. Banks then store this processed metadata, for example whether or not someone’s Facebook name is consistent with the name on their bank account.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Its founder Abhishek Agarwal admits there are risks for users: “[I]f someone managed to hack the bank’s security system, as well as the Aadhaar database, they could potentially be able to link your Facebook or LinkedIn data with your biometric information.” But he says this would be hard to do.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Pandey insists the companies are carefully vetted before they can use Aadhaar authentication. But, like Agarwal, he acknowledges the system can never be 100% secure: ““I wouldn’t say it is impossible to break the system, but it is very, very difficult.”&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/vidhi-doshi-fingerprint-payments-prompt-privacy-fears-in-india-the-guardian'&gt;https://cis-india.org/internet-governance/news/vidhi-doshi-fingerprint-payments-prompt-privacy-fears-in-india-the-guardian&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Vidhi Doshi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Demonetisation</dc:subject>
    
    
        <dc:subject>Digital Payment</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Biometrics</dc:subject>
    

   <dc:date>2017-02-13T09:21:42Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/frontline-v-sridhar-march-3-2017-digital-illusions">
    <title>Digital illusions</title>
    <link>https://cis-india.org/internet-governance/news/frontline-v-sridhar-march-3-2017-digital-illusions</link>
    <description>
        &lt;b&gt;The Watal Committee’s report presents the government with an impossible road map to a cashless nirvana. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by V. Sridhar was &lt;a class="external-link" href="http://www.frontline.in/the-nation/digital-illusions/article9541506.ece?homepage=true"&gt;published in Frontline&lt;/a&gt;, Print edition: March 3, 2017&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;MORE than two months after demonetising an overwhelming proportion of the currency in circulation, the Narendra Modi government now appears to have settled on its key objective for setting out on the unprecedented economic adventure. After shifting the goalposts several times—initially it was a means of combating terrorism and fake currency, later it was a war on black money and still later it was to forcibly march the country towards a “cashless” future, which was then modified to a more reasonable “less cash” society—the government now ostensibly has the road map to undertake the hazardous journey to an age when cash will no longer be king.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is no better and time-tested means for a government bent on carrying out its whims than to appoint a committee headed by a former bureaucrat to give it the report that would justify what it has already decided to do. In August 2016, months before demonetisation, it constituted the Committee on Digital Payments, chaired by Ratan P. Watal, Principal Adviser, NITI Aayog, and former Secretary, Ministry of Finance. The committee dutifully submitted its report in double quick time on December 9, which was approved by the Finance Ministry on December 27.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The haste with which the committee has gone about its business is evident throughout the report. The committee’s slant is also evident in its approach, especially the reverence with which it welcomes the demonetisation move, even though it was commissioned before November 8, and its recourse to suspect data from private industry and multinational companies even when better quality data were available from official sources such as the Reserve Bank of India (RBI). The report’s lack of rigour, especially in tackling the substantive issues pertaining to monetary policy, was also hindered by the fact that not a single economist of worth, not even a specialist in monetary economics, was present in the committee.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Reckless rush&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;However, to blame the committee alone would be futile. The government, by pursuing an ambitious and reckless push towards “less cash” before setting out a regulatory framework governing digital payments, in effect, placed the cart before the horse.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The report reveals not just the haste with which the Watal Committee has pursued its mission with evangelical zeal but its utter lack of respect for conceptual issues. Nowhere is this more evident than in its recommendation that the regulatory responsibilities for governing the digital payments system be distanced from the RBI. This not only is out of tune with global practices, but it reveals the committee’s sheer inability to understand the fact that although payments account for just a small fraction of what a banking system does, they impinge on modern banking and monetary policy in crucial ways.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a modern economy, currency creation by the central bank through fiat money is not the only means by which money is created. Deposits with banks, for instance, which provide the base for credit creation, are a means by which banks “create” money. From this perspective, a mobile wallet service provider also acts like a bank; even the users’ monies are held only for a brief period until transactions happen.&lt;br /&gt;&lt;br /&gt;Thus, it appears fit and proper that such services are also governed by the central bank. However, the Watal Committee has recommended that they be supervised by an entity that has a measure of independence from the RBI. This suggestion is dangerous because such entities can potentially pose a systemic risk, which is a key responsibility of a central bank. There is also the risk of regulatory capture of the suggested body, the Payments Regulatory Board (PRB), if sections of the payments industry exercise their newly acquired clout.&lt;br /&gt;&lt;br /&gt;The committee’s enthusiastic acceptance of the “go cashless” mantra is also evident in the data it has sourced. A good example of how it cherry-picked data is its use of a highly dubious (or at the very least, utterly misplaced) dataset to make the point that India is far too dependent on cash. It points to data sourced from the International Monetary Fund (IMF) and other sources to claim that India’s cash-GDP (gross domestic product) ratio is 12.04 per cent, much higher than countries such as Brazil, Mexico and South Africa.&lt;br /&gt;&lt;br /&gt;However, this much-abused dataset, quoted widely by advocates of demonetisation, is an inaccurate measure because it only captures the extent of physical currency in circulation and ignores short-term deposits, which are defined as “broad money”. Logically, these deposits must be included because they are virtually on call by depositors and are, therefore, liquid. Secondly, the fact that such deposits have been increasing as a proportion of the currency in circulation, aided by the spread of banking in India, makes them particularly relevant in the Indian context. The committee, in its bid to justify sending the nation on a cashless path, proceeds to evaluate the “high” costs that cash imposes on the Indian economy. It quotes from McKinsey and Visa, both of which may have a vested interest in India’s mission to go cashless, to drive home the point that going digital would result in huge savings. It quotes McKinsey to claim that “transitioning to an electronic platform for government payments itself could save approximately Rs.100,000 crore annually, with the cost of the transition being estimated at Rs.60,000-70,000 crore” and a Visa report that claims a total investment of Rs.60,000 crore over five years towards creating a digital payments ecosystem could reduce the country’s cost of cash from 1.7 per cent of the GDP to 1.3 per cent.&lt;br /&gt;&lt;br /&gt;Even while pushing the benefits of going cashless, the committee does admit that the transition to digital payments “cannot be agnostic to the actual costs incurred by the end customers, the reasons for preferring cash, and the factors inhibiting the uptake of existent channels of digital payments”.&lt;br /&gt;&lt;br /&gt;A large part of the Indian economy is its “black” counterpart, estimated at about 60 per cent of the legitimate part of India’s national income. Since a significant portion of the currency in circulation caters to the demand from the shadow economy, apart from the huge segment that is engaged in legitimate but informal economic activity, these estimates miss a significant chunk of the economy and its need for cash. Conceptually, to that extent, they significantly overstate the extent of cash relative to real GDP, including the portion missing from official data.&lt;br /&gt;&lt;br /&gt;The naive assumption that digitalised financial transactions are scale-neutral and costless, painless and efficient lies at the heart of the Watal Committee’s report. This has obvious implications for India’s large informal economy, which the Modi government is pushing, under pain of death, towards formality through digital channels. For instance, basic data on the usage of debit cards show how skewed the demand for cards is in India. In August 2016, cash withdrawals at ATMs accounted for 92.28 per cent of the value of all debit card transactions in the country. Thus, less than 8 per cent of the total value was made at point-of-sale (PoS) terminals.&lt;br /&gt;&lt;br /&gt;This statistic is a clear indication of a divide that mirrors the income and consumption divide in Indian society. When banks issue cards (debit, credit or any other), card payment system companies such as Mastercard and Visa provide an interface with the customer for which the issuer pays a fee, which is, in any case, recovered from customers. According to a recent study by Visa, the penetration of PoS terminals has slowed down significantly since 2012, when the RBI set limits on what the card companies could charge as merchant discount rate (MDR), the amount charged from sellers. This reveals that card companies may have been slowing down penetration in order to bargain for a bigger slice of the transaction fee. Although the rates apply not just to card-based purchases but to cash withdrawals too (and have been waived or lowered in the wake of demonetisation on a purely temporary basis), there is no guarantee that they will not increase once the situation returns to normal. This is aggravated by the fact that the government may have little or no control, or the will, to prevent banks and card issuers from charging higher rates later. This has been demonstrated in the past with, for example, ATM-based withdrawals, for which customers have to pay a fee after a minimum number of transactions.&lt;br /&gt;&lt;br /&gt;The flat fee (as a percentage) is regressive, especially because it punishes smaller sellers. It is in this sense that finance, digital or otherwise, is never scale-neutral. The fact that the immediate victims of demonetisation are small-scale producers and retailers implies that the balance has been tilted against them and in favour of larger producers and retailers after November 8. By skewing the field against small and tiny enterprises, demonetisation has been the vehicle for a massive and unprecedented transfer of incomes and wealth from the poor to the rich.&lt;br /&gt;&lt;br /&gt;There is also a fundamental asymmetry in the use of technology in the financial services industry. ATMs, which have been around for decades, were originally touted as a technology that increases efficiency in the use of cash; you only need to withdraw as much as you need, so there is no motive to hoard cash. But that was not the motive for introducing ATMs; the real reason was that they enabled banks to reduce their workforce to cut costs. As ATMs became more ubiquitous, banks started moving from cost cutting to profit-seeking by levying a fee for every transaction above a minimum threshold. In effect, the gains from technology are boosting the profitability of banks while the wider systemic benefits made possible by the same technology have been sacrificed, as the imposition of fees above a minimum threshold actually drives people to hoard cash.&lt;br /&gt;&lt;br /&gt;A study by Visa in October 2016, titled Accelerating The Growth of Digital Payments in India: A Five-Year Outlook, reveals that a one percentage point reduction in cash in circulation as percentage of GDP would require digital transactions of personal consumption expenditure to multiply ninefold. In other words, Visa suggested that digital transactions as a percentage of personal consumption expenditure would need to increase from 4 per cent to 36 per cent if the cash-GDP ratio has to reduce from 11 per cent to 10 per cent.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Security concerns&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Apart from these weighty economic issues, which are central to the move towards digital financial transactions, there are other critically important issues that the committee has either ignored or swept under the carpet. The question of privacy and security was a central issue at a recent conference on digital payments organised by HasGeek, a platform for software developers, in Bengaluru. Several experts, including some from the payments industry, pointed out the serious security and privacy issues that are being ignored in the rush to go digital. For example, an expert on data security warned that the mindless rush to mobile-based transactions was especially scary because most Android phones are vulnerable because they leak data. In fact, he noted that it may be safer for Android mobile users to perform digital transactions using desktop browsers.&lt;br /&gt;&lt;br /&gt;But what is more scary is the manner in which Aadhaar is being touted by the committee as the magic wand by which the digital era can be ushered in quickly. It recommends that mobile number-based and Aadhaar-based “fully interoperable payments” be prioritised within 60 days and that the National Payments Corporation of India (NPCI) be responsible for ensuring this.&lt;br /&gt;&lt;br /&gt;There has been significant resistance to the idea of an Aadhaar-enabled service for digital transactions, primarily because of security and privacy concerns. Entities such as the Centre for Internet and Society have warned against linking Aadhaar to the financial inclusion project because it violates the Supreme Court stricture against making Aadhaar mandatory. Kiran Jonnalagadda of HasGeek pointed out that the Aadhaar system offered only “single factor authorisation”. He said in a recent tweet that Aadhaar involved only a permanent login ID without “a changeable password”, which, from a systemic point of view, made it open to abuse.&lt;br /&gt;&lt;br /&gt;Longstanding critics of the Aadhaar project have pointed out the launch of such a countrywide programme at a time when a regulatory regime is not even in place, and when India does not have privacy protection laws, is dangerously misplaced. They have pointed to the fact that unlike in the case of a debit or credit card, which can be replaced when its integrity has been compromised, the theft of biometric characteristics of a user implies that they are compromised forever. This is not science fiction but a very real possibility as has been demonstrated across the world.&lt;br /&gt;&lt;br /&gt;There are also serious worries that the high failure rate of biometric verification would hurt the poor, supposedly the main target group of the Aadhaar project; the large-scale denial of services such as access to the public distribution system has already been documented across the country. Extending a failed system to real-time financial transactions, thus, appears to be dangerously misplaced. The fundamental issue is this: can a digital mode of payment effectively provide the same level of trust between the transacting parties that is central to a cash-based transaction? The answer to that depends critically on whether the digital mode provides the same level of convenience, cost, predictability and certainty.&lt;br /&gt;&lt;br /&gt;The Watal Committee has produced a report that the political masters sought. Its lack of appreciation of the economic issues underpinning financial transactions and of the wider economic processes in the Indian economy are obvious. Effectively, it has delivered what the Modi government asked for—an impossible road map to a cashless nirvana for a people already suffering the effects of demonetisation.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/frontline-v-sridhar-march-3-2017-digital-illusions'&gt;https://cis-india.org/internet-governance/news/frontline-v-sridhar-march-3-2017-digital-illusions&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-02-16T14:53:39Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/outlook-arindam-mukherjee-february-20-2017-no-genie-at-your-fingertips">
    <title>No Genie At Your Fingertips</title>
    <link>https://cis-india.org/internet-governance/news/outlook-arindam-mukherjee-february-20-2017-no-genie-at-your-fingertips</link>
    <description>
        &lt;b&gt;Aadhaar biometrics will now enable cashless shopping sans card and smartphone. A look at the hopes and fears.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Arindam Mukherjee was &lt;a class="external-link" href="http://www.outlookindia.com/magazine/story/no-genie-at-your-fingertips/298449"&gt;published in the Outlook&lt;/a&gt; on February 20, 2017. Pranesh Prakash and Sunil Abraham were quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Soon, you will be able to pay for your groceries and other purchased goods by using just your fingerprints and biometric data. You won’t need debit or credit cards, smartphones or e-wallets. You won’t need to sign or even remember your PIN.&lt;br /&gt;&lt;br /&gt;In a bid to increase digitisation and move to the next phase of ‘cashless India’, the government is preparing to launch Aadhaar Pay, an initiative that will supersede the need to use credit cards, debit cards, smartphones and PINs to make payments or transfer money. The proposed system of payments will use a person’s biometric data and fingerprints to make payments through Aadhaar-linked bank accounts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The initiative, which has been running as a pilot project in fair price shops in Andhra Pradesh, is expected to be launched in a month’s time. According to officials of the Unique Identification Authority of India (UIDAI), the system has been getting a positive response in these trials and is ready for a nationwide launch.&lt;br /&gt;&lt;br /&gt;In Aadhaar Pay, all a person needs to carry to a shop are his fingerprints as merchant establishments will authenticate his or her identity through fingerprints, which will give them access to a person’s Aadhaar data. The only essential requirement for this new mode of payments is that bank acc­ounts have to be linked with the account-­holder’s Aadhaar number.&lt;br /&gt;&lt;br /&gt;Unlike the post-demonetisation limits imposed on ATM and bank account withdrawals, no limits are proposed to be put on Aadhaar Pay transactions as of now. The proposal is to leave the fixing of limits to the discretion of banks. However, the government hopes Aadhaar Pay will be used mostly for small-value transactions rather than large deals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The system will work through an app in the merchant establishment’s smartphone—with a fingerprint scanner device—eliminating the requirement of a Point of Sale (POS) terminal, which is required for credit card and debit card transactions. The scanner will be priced at around Rs 2,000, considerably cheaper than POS terminals that cost Rs 8,000-10,000.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aadhaar Pay is the next step of the government’s successful run of Aadhaar Enabled Payment System (AEPS), under which transactions are made through ‘banking correspondents’, mostly in rural areas. These transactions are done through POS machines and micro-ATMs. Like Aadhaar Pay, AEPS disburses money without a signature or a debit or credit card, and without the need to visit a bank branch. But unlike AEPS, which works through banking correspondents, Aadhaar Pay will be available through merchant establishments much the same way as debit or credit cards work.&lt;br /&gt;&lt;br /&gt;The biggest task before the government to ensure the success of Aadhaar Pay is to develop a network of merchant establishments that will accept Aadhaar Pay just the way they accept credit or debit cards or e-wallet payments like Paytm. To do this, the government said in this year’s budget that banks would be encouraged to put 20 lakh Aadhaar Pay access machines across the country. “We have asked every bank to select 35 merchants for this. These merchants will have a smartphone and a biometric device attachment to carry out Aadhaar Pay transactions,” UIDAI CEO Ajay Bhushan Pandey tells Outlook.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This won’t be easy. Even in case of debit or credit cards, the  biggest limiting factor is the relatively small number of POS terminals  that accept them. According to data from the National Payment  Corporation of India (NPCI), there are only 14 lakh POS terminals in  India, which has over 3.5-4 crore merchant establishments and 80 crore  cards (77 crore debit cards and three crore credit cards). The bulk of  these terminals are in tier I and tier II cities and almost none in tier  III and IV towns. To improve the situation, the government is already  working towards bringing in 10 lakh new terminals by March, most of  which will be put in tier III and tier IV towns, bringing them deeper  within the ambit of the ­digitised, cashless economy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though a starting target of 20 lakh terminals for Aadhaar Pay may  seem quite ambitious, according to the latest data, 111.51 crore adults  have already obtained their Aadhaar numbers and 50 crore bank acc­ounts  (of a total 110 crore savings accounts in the country) of 40 crore  people have been linked to Aadhaar and, according to UIDAI, nearly two  crore people are linking their bank accounts with Aadhaar every month,  brightening up the prospects of Aadhaar Pay. A majority of these numbers  are from rural areas and smaller cities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government and UIDAI aim to roll out Aadhaar Pay primarily in rural areas and tier III and tier IV cities to begin with, as these areas do not have proper debit or credit card coverage and the people living there are not big users of plastic cards or smartphones. “We need to provide a solution for every segment of the ­population,” says Pandey. “We have to take care of the people who cannot use smartphones or other mobile phones and debit or credit cards, and those who cannot remember their PIN for authentication. The only tool with them is their fingerprint. Approximately 30 crore people are not comfortable with cards or phone. We had to get them into the mode of digital payments.”&lt;br /&gt;&lt;br /&gt;Not surprisingly, critics of Aadhaar and Aadhaar-based services have attacked Aadhaar Pay and AEPS on issues of privacy and security of biometric and personal data. Pranesh Prakash, policy director with the Centre for Internet and Society (CIS), ­rec­ently tweeted, “As long as AEPS encourages biometric authorisation of transactions, it is bound to be a security nightmare, with widespread fraud.” Would you tell a shopkeeper your debit card’s PIN? No. Then why share your fingerprint? A fingerprint, in this system, becomes a kind of unchangeable PIN, he asks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pointing out a possible danger, Usha Ramanathan, an independent law resear­c­her who has been following Aadhaar since its inception, says, “In many ­payments, biometric data is authenticated and then it remains in the system where there are leakages. Intermediaries then have access to the data, which is thus made insecure.”&lt;br /&gt;&lt;br /&gt;According to the UIDAI, however, once biometric data is provided by the consumer while making Aadhaar-based payments, it gets encrypted and a merchant doesn’t get access to that data. The Aadhaar Act also prohibits any storing of biometric data in local devices. And yet, there are many like CIS executive director Sunil Abraham who believe it is a mistake to use biometrics for authentication, especially when payments are concerned. “Our concern with Aadhaar Pay is about the biometric component of the project,” says Abraham. “Biometrics is an identification technology. Unfortunately, it is being presented as an authentication technology. It is not a secure authentication technology as biometric data can be stolen easily. It is also irrevocable; once bio­metric data is stolen, it cannot be ­re-issued like a smart card.”&lt;br /&gt;&lt;br /&gt;Then there is the problem of availability of fingerprints. In the case of many people from rural areas and the working class, fingerprints get affected due to the manual nature of their work. This makes it difficult for this target group of UIDAI to conduct transactions properly through Aadhaar Pay. “In Rajasthan, 30 per cent of the households are not even able to procure ration using fingerprints,” says Ramanathan.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The launch of Aadhar Pay at this time becomes more challenging as there has been a decline in digital payments this January. According to RBI data, digital payments, including transactions made by using credit cards, debit cards, electronic fund transfers, digital wallets and mobile banking transactions, were 10.2 per cent lower by volume and 7 per cent lower by value in January 2017 as compared to December 2016. Also, digital transactions fell from 1,027.7 million (worth Rs 105.4 lakh crore) to 922.9 million (worth Rs 98 lakh crore). This could get worse as the RBI raised the cash withdrawal limits from Rs 24,000 to Rs 50,000 from February 20 and aims to remove all limits by mid-March.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Within digital transactions, debit and credit transactions at POS terminals dec­lined 18.6 per cent month-on-month in January, while mobile banking transactions declined by 7.6 per cent, showing that people still prefer to deal in cash. According to NPCI data, however, IMPS transactions rose by 18 per cent in January and UPI-based transactions went up from 2 million transactions (worth Rs 700 crore) in December to 4.2 million transactions (worth Rs 1,666 crore) in January.&lt;br /&gt;&lt;br /&gt;Clearly, considering India’s demography and its problems, when it comes to the security of personal and biometric data, the government and the UIDAI have many issues to clear before Aadhaar Pay can achieve any success. Moreover, there are over 100 crore mobile phones in India today, with even the lowest strata of the population having access to one. Yet mobile-­based payments and m-wallets are yet to hit that critical mass. To make Aadhaar Pay a bigger success than that could be a gigantic task.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/outlook-arindam-mukherjee-february-20-2017-no-genie-at-your-fingertips'&gt;https://cis-india.org/internet-governance/news/outlook-arindam-mukherjee-february-20-2017-no-genie-at-your-fingertips&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-02-16T16:02:31Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-hindu-april-10-2016-somesh-jha-pmo-no-to-smart-cards-insists-aadhaar">
    <title>PMO’s no to smart cards, insists on Aadhaar </title>
    <link>https://cis-india.org/internet-governance/news/the-hindu-april-10-2016-somesh-jha-pmo-no-to-smart-cards-insists-aadhaar</link>
    <description>
        &lt;b&gt;The government has decided to stop issuing new smart cards to beneficiaries of government schemes as Aadhaar is now backed by a law. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Somesh Jha was published in the Hindu on April 10, 2016. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The Prime Minister’s Office (PMO) has issued strict instructions to the Information Technology Ministry to ensure that States and the Central governmentstop issuing smart cards for new programmes for beneficiaries, and to rely on the Aadhaar-based Direct Benefit Transfer platform instead.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The move will impact ministries such as Labour, Social Justice and Health, which are in the process or have already rolled out smart cards.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government had said earlier that over 100 crore people, constituting 93 per cent of the adult population, had a unique identification (UID) number under the Aadhaar platform.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The undersigned is directed to request the department to examine the need for state and central government departments to issue separate smart cards in the light of the near universal coverage of Aadhaar and the delivery of the most public welfare benefits through Aadhaar enabled platforms,” according to a directive issued by Gulzar N, Director, PMO, to Aruna Sharma, Secretary, Department of Electronics and Information Technology.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The undersigned is also directed to request the department to prepare policy on the delivery of various public services using Aadhaar, Jan Dhan Yojana and existing platforms without the issuance of new smart cards.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Last month, Union Minister for Social Justice and Empowerment Thaawar Chand Gehlot had announced that all differently abled persons would soon get a unique identity card to avail welfare schemes. .&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;State governments had also planned to use smart card technology for welfare schemes. For instance, Odisha was mulling smart cards for construction workers in the State.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The PMO sent a separate communiqué to Labour Secretary Shankar Aggarwal in the context of a proposal to issue 40 crore smart cards to informal sector workers, called the Unorganised Workers’ Identification Number (U-WIN). The UWIN cards were to be used by these workers to access benefits under schemes such as Rashtriya Swasthya Bima Yojana , Aam Aadmi Bima Yojana , Atal Pension Yojana, Pradhan Mantri Suraksha Bima Yojana and Jeevan Jyoti Bima Yojana.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The PMO rejected the proposal noting that Aadhaar would act as a “universal unique identifier for each citizen.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Adding a UWIN number would not only duplicate work, but also introduce further problems in linking up with other databases which have already been linked with Aadhaar,” said the missive reviewed by The Hindu.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, experts are sceptical of the government’s move.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Smart cards are always better than biometrics. If that was not the case, the global financial infrastructure today will be working on biometrics and not on smart cards,” said Sunil Abraham, executive director of The Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Why are these banks working on smart cards? Smart cards work using cryptography, which is more fool-proof than biometrics. Biometrics allow for remote, covert and non-consensual identification,” Mr. Abraham said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Smart card vendors, however, said the move may not impact their market. “The demand for smart cards is massive in all the other segments such as for use in debit and credit cards or driving licenses and vehicle registration numbers,” said Deven Mehta, managing director of the Mumbai-based Smart Card IT Solutions.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-hindu-april-10-2016-somesh-jha-pmo-no-to-smart-cards-insists-aadhaar'&gt;https://cis-india.org/internet-governance/news/the-hindu-april-10-2016-somesh-jha-pmo-no-to-smart-cards-insists-aadhaar&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-04-20T02:19:18Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/will-the-magic-number-deliver-aadhaar-cslg-26042016">
    <title>"Will the Magic Number Deliver?" - Roundtable on Aadhaar at CSLG, JNU, April 26</title>
    <link>https://cis-india.org/internet-governance/news/will-the-magic-number-deliver-aadhaar-cslg-26042016</link>
    <description>
        &lt;b&gt;The Centre for the Study of Law and Governance (CSLG), Jawaharlal Nehru University (JNU), will organise a roundtable discussion on Tuesday, April 26, to discuss the Aadhaar project and Act. Along with Rajeev Chandrasekhar, Prasanna S, Apar Gupta, and Chirashree Dasgupta, Sumandro Chattapadhyay will be one of the discussants. It will  take place in the CSLG Conference Room at 6 pm.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Discussion Note&lt;/h3&gt;
&lt;p&gt;The Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Act, 2016, was enacted by the Parliament on March 16. Thereafter it has been notified on March 26.&lt;/p&gt;
&lt;p&gt;The Act empowers the UIDAI (Unique Identification Authority of India) to collect biometric and demographic information of residents to provide them with a unique number. This unique number is to be used for enumeration, identification and targeting of beneficiaries of government subsidies and services.&lt;/p&gt;
&lt;p&gt;Since the creation of the UIDAI as an executive authority in 2009, this process of enumeration has been ongoing. Recently, it was announced that more than 100 crore residents have been given their aadhaar cards. Alongside, however, legal challenges have continued in the Supreme Court.&lt;/p&gt;
&lt;p&gt;Given this context, this Roundatable Discussion will focus on the following set of questions (among others):&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;Can the Aadhaar Number enable better delivery of government subsidies and services?&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;How does the Act ensure data protection?&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Is there a right to privacy in India? What are the implications in the context of Aadhaar?&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Does the Act ensure public access to statutory remedies in case of violations?&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Did the Aadhaar Bill fulfil the requirements of a money bill?&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Discussion Format&lt;/h3&gt;
&lt;p&gt;Setting the Theme - Short Introduction to the Topic by Natasha Goyal&lt;/p&gt;
&lt;p&gt;Speakers' comments, 15 minutes each, consecutive, no power points&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;&lt;a href="https://twitter.com/rajeev_mp"&gt;Rajeev Chandrasekhar&lt;/a&gt;, Member of Parliament, Rajya Sabha&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="https://twitter.com/ajantriks"&gt;Sumandro Chattapadhyay&lt;/a&gt;, the Centre for Internet and Society&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="https://twitter.com/prasanna_s"&gt;Prasanna S&lt;/a&gt;, Lawyer&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="https://twitter.com/aparatbar"&gt;Apar Gupta&lt;/a&gt;, Advocate, Delhi High Court&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="http://www.jnu.ac.in/FacultyStaff/ShowProfile.asp?SendUserName=chirashree"&gt;Dr. Chirashree Dasgupta&lt;/a&gt;,  Centre for the Study of Law and Governance&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Open Session (Moderated Q and A)&lt;/p&gt;
&lt;p&gt;Followed by Tea&lt;/p&gt;
&lt;h3&gt;Directions to Venue&lt;/h3&gt;
&lt;p&gt;From JNU main gate, proceed straight until you get to a T-junction. Turn left. Continue until you reach a second T-junction. Turn right. Follow the road for just 0.7 km until you see a bus stop labelled “Paschimmabad.” About 50 m past the bus stop turn right at a sign that reads: “Centre for the Study of Law and Governance”. The CSLG  building is on the right. The conference room is on the first floor.&lt;/p&gt;
&lt;h3&gt;Poster&lt;/h3&gt;
&lt;img src="http://cis-india.org/internet-governance/news/will-the-magic-number-deliver-aadhaar-cslg-26042016/leadImage" alt="CSLG Roundtable Discussion - Will the Magic Number Deliver? - April 26, 6 pm" /&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/will-the-magic-number-deliver-aadhaar-cslg-26042016'&gt;https://cis-india.org/internet-governance/news/will-the-magic-number-deliver-aadhaar-cslg-26042016&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Digital India</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Biometrics</dc:subject>
    

   <dc:date>2016-04-20T10:49:58Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/telecom/blog/cis-submission-trai-note-on-interoperable-scalable-public-wifi">
    <title>CIS Submission to TRAI Consultation Note on Model for Nation-wide Interoperable and Scalable Public Wi-Fi Networks</title>
    <link>https://cis-india.org/telecom/blog/cis-submission-trai-note-on-interoperable-scalable-public-wifi</link>
    <description>
        &lt;b&gt;​This submission presents responses by the CIS on the ​Consultation Note on Model for Nation-wide Interoperable and Scalable Public Wi-Fi Networks published by the TRAI on November 15, 2016. Our analysis of the solution proposed in the Note, in brief, is that there is no need of a solution for non-existing interoperability problem for authentication and payment services for accessing public Wi-Fi networks. The proposed solution in this Note only adds to over-regulation in this sector, and does not incentivise new investment in the sector, but only establishes UIDAI and NPCI as the monopoly service providers for authentication and payment services.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The comments were authored by Japreet Grewal, Pranesh Prakash, Sharath Chandra, Sumandro Chattapadhyay, Sunil Abraham, and Udbhav Tiwari, with expert comments from Amelia Andersdotter.&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;1. Preliminary&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;1.1.&lt;/strong&gt; This submission presents responses by the Centre for Internet and Society (“CIS”) &lt;strong&gt;[1]&lt;/strong&gt; on the &lt;em&gt;Consultation Note on Model for Nation-wide Interoperable and Scalable Public Wi-Fi Networks&lt;/em&gt; (“the Note”) published by the Telecom Regulatory Authority of India (“TRAI”) on November 15, 2016 &lt;strong&gt;[2]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;1.2.&lt;/strong&gt; The CIS welcomes the effort undertaken by TRAI to map regulatory and other barriers to deployment of public Wi-Fi in India. We especially appreciate that TRAI has recognised &lt;strong&gt;[3]&lt;/strong&gt; two key barriers to provision of public Wi-Fi networks identified and highlighted in our earlier response to the &lt;em&gt;Consultation Paper on Proliferation of Broadband through Public Wi­Fi&lt;/em&gt; &lt;strong&gt;[4]&lt;/strong&gt;: 1) over regulation (including, licensing requirements, data retention, and Know Your Customer policy), and 2) paucity of spectrum &lt;strong&gt;[5]&lt;/strong&gt;.&lt;/p&gt;
&lt;h2&gt;2. General Responses&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;2.1.&lt;/strong&gt; Before responding to the specific questions posed by the Note, we would like to make the following observations.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;2.2.&lt;/strong&gt; There is no need of a solution for non-existing interoperability problem for authentication and payment services for accessing public Wi-Fi networks. The proposed solution in this Note only adds to over-regulation in this sector. The proposed solution does not incentivise new investment in the sector, but only establishes UIDAI and NPCI as the monopoly service providers for authentication and payment services.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;2.3.&lt;/strong&gt; As the TRAI has consulted widely with industry and other stakeholders before it settled on the list of priority issues contained in Section C.6 of the Note, we are surprised to find that this Note aims to address only the problem of lack of “seamless interoperable payment system for Wi-Fi networks” (Section C.6.d. Of the Note), and does not discuss and propose solutions for any other key barriers identified by the Note.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;2.4.&lt;/strong&gt; The Note fails to clarify the “interoperability” problem in the payment system for usage of public Wi-Fi networks that it is attempting to solve. The Note identifies that lack of “single standard” for “authentication and  payment  mechanisms” for accessing public Wi-Fi networks as a key impediment to provide scalable and interoperable public Wi-Fi networks across the country &lt;strong&gt;[6]&lt;/strong&gt;. By conceptualising the problem in this manner, TRAI has bundled together two completely different concerns - authentication and payment - into one and this is at the root of the problems emanating from the proposed solution in this Note.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;2.5.&lt;/strong&gt; Lack of standard process for authentication is created by over-regulation via Know Your Customer (“KYC”) policies, and selection of eKYC service provided by UIDAI as the only acceptable authentication mechanism for all users of public Wi-Fi networks across India, creating further economic and legal challenges for smaller would-be providers of public Wi-Fi networks as they assess their liabilities and start-up costs. Additionally, since this would amount to making UID/Aadhaar enrolment mandatory for any user of public wi-fi networks, it seems to create a contradiction with previously communicated policy from the UIDAI and the Government that no such obligation should arise. Supreme Court has also mandated over successive Orders that enrolment for UID/Aadhaar number should remain optional for the citizens and residents.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;2.6.&lt;/strong&gt; As was observed by the respondents to the TRAI Consultation concluded earlier this year, there is no interoperability problem that needs to be solved regarding payments for accessing public Wi-Fi networks. Payment services continue to be evolved and payment aggregator services provided by existing companies may be expected to resolve many of the outstanding issues of service proliferation in the upcoming years, at least in the absence of additional mandatory technical measures imposed by the government. Bundling of payment with authentication will only undermine the already existing independent market for payment aggregators, and further enforce mandatoriness of UID/Aadhaar number.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;2.7.&lt;/strong&gt; Further, the payment mechanism proposed would seem to worsen difficulties for tourists and foreigners in accessing public Wi-Fi in India, as well adds an additional layer of authentication in a system already identified (even in the Note itself) to be overburdened by regulations regarding KYC and data retention. Section C.6.b of the Note highlights the problems faced by foreigners and tourists when the authentication mechanism is premised upon use of One Time Password (OTP) that requires a functioning local mobile phone number. It contradicts itself later by proposing an authentication method that requires the user to not only download an application onto their mobile/desktop device, but also to enrol for UID/Aadhaar number and/or to use their existing UID/Aadhaar number. Instead of reducing the existing barriers to provision of and access to public Wi-Fi, which the Note is supposed to achieve, it creates significant new barriers.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;2.8.&lt;/strong&gt; The technological architecture advanced by the Note upholds support of governance and surveillance projects that, in addition to being costly in their implementation and thereby slowing down the objective of getting India connected, are also of questionable value to the security of the Indian polity. UID, UPI, and related projects risk undermining cyber-security through their reliance on centralised architectures and interfere with healthy competitive market dynamics between commercial and non-commercial actors.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;2.9.&lt;/strong&gt; The Note continues to only consider and enable commercial models for the provision of public Wi-Fi networks. We have identified this as a problematic assumption in our last submission &lt;strong&gt;[7]&lt;/strong&gt;. It is most crucial that TRAI does not ignore and fail to promote and facilitate the possibility of not-for-profit models that involve grassroot communities, academia, and civil society.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;2.10.&lt;/strong&gt; Last but not the least, the term “Wi-Fi” refers to a particular technology for establishing wireless local area networks. Further, the term is a trademark of the Wi-Fi Alliance &lt;strong&gt;[8]&lt;/strong&gt;. It is this not a neutral term, and it must not be used as a general and universal synonym for wireless local area networks. We recommend that TRAI may consider using a technology-neutral term, say “public wireless services” or “public networking services”, to describe the sector. Following the terminology used in the Note, we have decided to continue using the term “Wi-Fi” in this response. This does not reflect our agreement about the appropriateness of this term. Important: The recommendation for technology-neutral regulation also comes with the qualification that safeguards like regulations on Listen Before Talk and Cycle Time are required to prevent technologies like LTE-U from squatting on spectrum and interfering with connections based on other standards.&lt;/p&gt;
&lt;h2&gt;3. Specific Responses&lt;/h2&gt;
&lt;h4&gt;Q1. Is the architecture suggested in the consultation note for creating unified authentication and payment infrastructure will enable nationwide standard for authentication and payment interoperability?&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;3.1.&lt;/strong&gt; No. The proposed infrastructure is likely to be costly for a large number of actors to implement and undermine some of the ongoing innovation in the Indian digital payment services industry. Rather than being helpful, it risks introducing additional requirements on an industry that TRAI has already identified as facing a number of large challenges.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.2.&lt;/strong&gt; There is no need for a unified architecture that provides nationwide standard for authentication and payment interoperability. It does not offer any incentive towards provision of public Wi-Fi networks. Neither is there an interoperability problem at the physical or data link layers that has been pointed out, nor is government mandated interoperability required at the payment or ID layer since there are private entities that provide such interoperability (like, payment aggregators). Additionally, we believe it is inappropriate that the TRAI is trying to predict the most suitable business/technological model for digital payments to be used for accessing commercial Wi-Fi networks. India has a booming online payments industry, and it must be allowed to evolve in an enabling regulatory environment that allow for competition and ensures responsible practices.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.3.&lt;/strong&gt; The Note identifies several structural impediments to expansion of public Wi-Fi networks in India, namely paucity of backhaul connectivity infrastructure (Section C.6.a), Inadequate associated infrastructure to offer carrier  grade  Wi-Fi network (Section C.6.c), dependency of authentication mechanism on pre-existing (Indian) mobile phone connection (Section C.6.b), and limited availability of spectrum to be used for public Wi-Fi networks (Section C.6.e). All these are crucial concerns and none of them have been addressed by the architecture suggested in the Note.&lt;/p&gt;
&lt;h4&gt;Q2. Would you like to suggest any alternate model?&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;3.4.&lt;/strong&gt; Yes. The model proposed in the Note is likely to exclude several types of potential users (say, foreigners and tourists), and impose a single authentication and payment service provider for accessing public Wi-Fi networks, which may undermine both competition and security in the market for these services.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.5.&lt;/strong&gt; Internationally, there are cities and regions (say, the city of Barcelona and the Catalonia region in Spain) where public Wi-Fi networks have been provided in a pervasive and efficient manner by taking a light regulatory approach that enables opportunities for potential providers to set up their own infrastructures and additionally have access to backhaul. Further, reducing legal requirements on authentication should be considered in place of government mandated technical architectures for authentication and payment. In particular, allowing for anonymous access to Public Wi-Fi or wireless connectivity would reduce both the administrative and the technical burden on potential providers at the hyper-local level, especially for providers whose main activity it is not, and cannot be, to provide internet services (say, event venues, malls, and shops).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.6.&lt;/strong&gt; The CIS suggests the following steps towards conceptualising an “alternative model”:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;remove existing regulatory disincentives,&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;urgently explore policies to promote deployment of wired infrastructures in general, and to enable a larger range of actors, including local authorities, to invest in and deploy local infrastructures by reducing licensing requirements in particular,&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;examine spectrum requirements for provision of public Wi-Fi, and&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;provide incentives, such as allowing telecom service providers to share backhaul traffic over public Wi-Fi, and ways for telecom service providers to lower their costs if they also make Internet access available for free.&lt;/li&gt;&lt;/ol&gt;
&lt;h4&gt;Q3. Can Public Wi-Fi access providers resell capacity and bandwidth to retail users? Is “light touch regulation” using methods such as “registration” instead of “licensing” preferred for them?&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;3.7.&lt;/strong&gt; CIS holds that capacity and bandwidth are neither comparable to tangible goods nor to digital currency. They are a utility, and the provider of the utility has to accept that their customers use the utility in the way they see fit, even if that use entails sharing said capacity and bandwidth with downstream private persons or customers. Wi-Fi capabilities are currently a built-in standardised feature of all consumer routers. Any individual, community, or store with access to an internet connection and a consumer router could become a public Wi-Fi access provider at no additional cost to themselves, furthering the goals of the Indian government in its Digital India strategy to ensure public and universal access to the internet.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.8.&lt;/strong&gt; In order to exploit the opportunities awarded by a large amount of entities in the Indian society potentially becoming Public Wi-Fi providers, TRAI should require neither registration nor licensing of these actors. Imposing administrative burdens on potential public Wi-Fi access providers creates legal uncertainty and will cause a lot of actors, who may otherwise contribute to the goals of Digital India, not to do so. This is particularly true for community organisers and citizens, who may not have access to legal assistance and therefore may avoid contributing to the goals of the government.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.9.&lt;/strong&gt; Light touch regulation when it comes to both granting license to  public Wi-Fi access providers as well as authentication of retail users, however, are needed not only as an exceptional practice for such instances but as a general practice in case of entities offering public Wi-Fi services, either commercially or otherwise. Further, additional laxity in administrative responsibilities is needed to incentivise provision of free, that is non-commercial, public Wi-Fi networks.&lt;/p&gt;
&lt;h4&gt;Q4. What should be the regulatory guidelines on “unbundling” Wi-Fi at access and backhaul level?&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;3.10.&lt;/strong&gt; The Note refers to unbundling of activities related to provision of Wi-Fi but it does not define the term. It is neither explained which specific activities at access and backhaul levels must be considered for unbundling.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.11.&lt;/strong&gt; While unbundling should clearly be allowed and any regulatory hurdles to unbundling should be removed, any such decision must be taken with a focus on urgently addressing the stagnated growth in landline and backhaul, as identified in Section C.6.a of the Note. Relying only on spectrum intensive infrastructures, such as mobile base stations, for providing connectivity, creates a heavy regulatory burden for the TRAI, while simultaneously not ensuring optimal connectivity for business and private users. The CIS is concerned that the focus of the Note on standardising a government-mediated authentication and payment mechanism detracts attention from this urgent obstacle to the fulfillment of the Digital India plans of accelerated provision of broadband highways, universal access, and public, especially free, access to internet services.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.12.&lt;/strong&gt; From the example of European telecommunications legislations, implementation of policy measures to ensure that vertical integration between infrastructure (say, cables, switches, and hubs) providers and service (say, providing a subscriber with a household modem or a SIM card) providers in the telecommunications sector does not become a barrier to new market entrants has yielded much success in countries that have pursued it, like Sweden and Great Britain.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.13.&lt;/strong&gt; Further,  there should be no default assumption of bundling by the TRAI. In particular, the TRAI should consider reviewing all regulations that may cause bundling to occur when this is not necessary, and put in place in a monitoring mechanism for ensuring that bundled practises (especially in electronic networks, base station infrastructures, backhaul and similar) do not cause competitive problems or raise market entry barriers &lt;strong&gt;[9]&lt;/strong&gt;. In most EU countries, especially where the corporate structure of incumbent(s) is not highly vertically integrated, interconnection requirements for electronic network providers of wired networks in the backhaul or backbone (effectively price regulated interconnection), and a conscious effort to ensure that new market players can enter the field, have ensured a competitive telecommunications environment. TRAI may consider reviewing the European regulation on local loop unbundling (1999) and discussions on functional separation (especially by the British regulatory authority Ofcom), within an Indian context.&lt;/p&gt;
&lt;h4&gt;Q5. Whether reselling of bandwidth should be allowed to venue owners such as shop keepers through Wi-Fi at premise? In such a scenario please suggest the mechanism for security compliance.&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;3.14.&lt;/strong&gt; Yes. Venue owners should be allowed to provide public Wi-Fi service both on a commercial and non-commercial basis.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.15.&lt;/strong&gt; It is not clear from the Note and the question what type of security concerns the TRAI is seeking to address. In terms of payment security, the payment industry already has a large range of verification and testing mechanisms. The CIS objects to the mandatory introduction of the proposed payment system so as to ensure greater security for Wi-Fi access providers and the users.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.16.&lt;/strong&gt; As far as hardware-related security issues are concerned, it is again unclear why consumer equipment compliant with existing Wi-Fi standards would not be sufficiently secure in the Indian context. Wi-Fi has proven to be a sturdy technical standard, its adoption is high in multiple jurisdictions around the world, and it also enjoys great technical stability. Similar security assessments could easily be made for alternative wireless technologies, such as WiMaX.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.17.&lt;/strong&gt; The CIS foresees problems is in the allocation of risk and liability by law. The already existing legal obligation to verify the identity of each user, for instance, is likely to introduce a large administrative burden on potential Public Wi-Fi providers, which may lead to such potential providers abstaining from entering the market. Should the identification requirement be removed, however, other concerns pertaining to legal obligations may arise. These include liability for user activities on the web or on the internet (cf. copyright infringement, libel, hate speech). We propose a “safe harbour” mechanism in these cases, limiting the liability of the potential public Wi-Fi provider.&lt;/p&gt;
&lt;h4&gt;Q6. What should be the guidelines regarding sharing of costs and revenue across all entities in the public Wi-Fi value chain? Is regulatory intervention required or it should be left to forbearance and individual contracting?&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;3.18.&lt;/strong&gt; The market segments identified by the TRAI in Section F.18 of the Note should normally all be competitive markets themselves, and so do not require regulatory assistance in sharing of costs and revenues. The more elaborate the requirements imposed on each actor of each market segment identified by the TRAI in Section F.18, the more costly the roll-out of public Wi-Fi is going to be for the market actors. Such a cost is not avoided by price regulation.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.19.&lt;/strong&gt; The TRAI may instead consider introducing public funding for backhaul roll-out in remote areas, where the market is unlikely to engage in such roll-out on its own. Presently, some Indian states (such as Karnataka) are committing to public funding for wireless access in remote areas. The Union Government can assist such endeavours.&lt;/p&gt;
&lt;h2&gt;Endnotes&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;[1]&lt;/strong&gt; See: &lt;a href="http://cis-india.org/"&gt;http://cis-india.org/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[2]&lt;/strong&gt; See: &lt;a href="http://trai.gov.in/Content/ConDis/20801_0.aspx"&gt;http://trai.gov.in/Content/ConDis/20801_0.aspx&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[3]&lt;/strong&gt; See Section C.6 of the Note.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[4]&lt;/strong&gt; See: &lt;a href="http://trai.gov.in/Content/ConDis/20782_0.aspx"&gt;http://trai.gov.in/Content/ConDis/20782_0.aspx&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[5]&lt;/strong&gt; See: &lt;a href="http://cis-india.org/telecom/blog/cis-submission-to-trai-consultation-on-proliferation-of-broadband-through-public-wifi-networks"&gt;http://cis-india.org/telecom/blog/cis-submission-to-trai-consultation-on-proliferation-of-broadband-through-public-wifi-networks&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[6]&lt;/strong&gt; See Section E.11. of the Note.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[7]&lt;/strong&gt; See: &lt;a href="http://cis-india.org/telecom/blog/cis-submission-to-trai-consultation-on-proliferation-of-broadband-through-public-wifi-networks"&gt;http://cis-india.org/telecom/blog/cis-submission-to-trai-consultation-on-proliferation-of-broadband-through-public-wifi-networks&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[8]&lt;/strong&gt; See: &lt;a href="https://www.wi-fi.org/"&gt;https://www.wi-fi.org/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[9]&lt;/strong&gt; See: Monitoring bundled products in the telecommunications sector is also recommended by the OECD: &lt;a href="http://oecdinsights.org/2015/06/22/triple-and-quadruple-play-bundles-of-communication-services-towards-all-in-one-packages/"&gt;http://oecdinsights.org/2015/06/22/triple-and-quadruple-play-bundles-of-communication-services-towards-all-in-one-packages/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/telecom/blog/cis-submission-trai-note-on-interoperable-scalable-public-wifi'&gt;https://cis-india.org/telecom/blog/cis-submission-trai-note-on-interoperable-scalable-public-wifi&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Japreet Grewal, Pranesh Prakash, Sharath Chandra, Sumandro Chattapadhyay, Sunil Abraham, and Udbhav Tiwari, with expert comments from Amelia Andersdotter</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Payment</dc:subject>
    
    
        <dc:subject>Public Wireless Network</dc:subject>
    
    
        <dc:subject>TRAI</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>UID</dc:subject>
    

   <dc:date>2016-12-12T13:59:00Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/workshop-report-uidai-and-welfare-services-august-27-2016">
    <title>Workshop Report - UIDAI and Welfare Services: Exclusion and Countermeasures</title>
    <link>https://cis-india.org/internet-governance/blog/workshop-report-uidai-and-welfare-services-august-27-2016</link>
    <description>
        &lt;b&gt;This report presents summarised notes from a workshop organised by the Centre for Internet and Society (CIS) on Saturday, August 27, 2016, to discuss, raise awareness of, and devise countermeasures to exclusion due to implementation of UID-based verification for and distribution of welfare services.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Introduction&lt;/h2&gt;
&lt;p&gt;The Centre for Internet and Society  organised a workshop on "UIDAI and Welfare Services: Exclusion and Countermeasures" at the Institution of Agricultural on  Technologists on August 27 in Bangalore to discuss, raise awareness of, and devise countermeasures to exclusion due to implementation of UID-based verification for and distribution of welfare services &lt;strong&gt;[1]&lt;/strong&gt;. This was a follow-up to the workshop held in Delhi on “Understanding Aadhaar and its New Challenges” at the Centre for Studies in Science Policy, JNU on May 26th and 27th 2016 &lt;strong&gt;[2]&lt;/strong&gt;. In this report we summarise the key concerns raised and the case studies presented by the participants at the workshop held on August 27, 2016.&lt;/p&gt;
&lt;h2&gt;Implementation of the UID Project&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;Question of Consent:&lt;/strong&gt; The Aadhaar Act &lt;strong&gt;[3]&lt;/strong&gt; states that the consent of the individual must be taken at the time of enrollment and authentication  and it must be informed to him/her the purpose for which the data would be used. However, the Act does not provide for an opt-out mechanism  and  an individual is compelled to give consent to continue with the enrollment process or to complete an authentication.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Lack of Adherence to Court Orders:&lt;/strong&gt; Despite of several orders by Supreme Court stating that use of Aadhaar cannot be made mandatory for the purpose of availing benefits and services, multiple state governments and departments have made it mandatory for a wide range of purposes like booking railway tickets &lt;strong&gt;[4]&lt;/strong&gt;, linking below the poverty line ration cards with Aadhaar &lt;strong&gt;[5]&lt;/strong&gt;, school examinations &lt;strong&gt;[6]&lt;/strong&gt;, food security, pension and scholarship &lt;strong&gt;[7]&lt;/strong&gt;, to name a few.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Misleading Advertisements:&lt;/strong&gt; A concern was raised that individuals are being mislead in the necessity and purpose for enrollment into the project.  For example, people have been asked to enrol by telling them that they might get excluded from the system and cannot get services like passports,  banks, NREGA, salaries for government employees, denial of vaccinations, etc. Furthermore,  the Supreme Court has ordered Aadhaar not be mandatory, yet people are being told that documentation or record keeping cannot be done without UID number.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Hybrid Governance:&lt;/strong&gt; The participants pointed out that with the Aadhaar (Targeted delivery of financial and other subsidies, benefits and services) Act, 2016 (hereinafter referred to as Aadhaar Act, 2016 ) being partially enforced,  multiple examples of exclusion as reported in the news are demonstrating  how the Aadhaar project is creating a case of hybrid governance i.e private corporations playing a significant role in Governance. This can be seen in case of Aadhaar where we see many entities from private sector being involved in its implementation, as well as many software and hardware companies.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Lack of Transparency around Sharing of Biometric Data:&lt;/strong&gt; The fact how and why the Government is relying on biometrics for welfare schemes is unclear and not known. Also, there is no information on how biometric data that is collected through the project is being used and its ability as an authenticating device. Along with that, there is very little information on companies that have been enlisted to hold and manage data and perform authentication.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Possibility of Surveillance:&lt;/strong&gt; Multiple petitions and ongoing cases have raised concerns regarding  the possibility of surveillance, tracking, profiling, convergence of data, and the opaque involvement of private companies involved in the project.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Denial of Information:&lt;/strong&gt; In an RTI filed by one of the participant requesting to share the key contract for the project, it was refused on the grounds under section 8(1) (d) of the RTI Act, 2005. However, it was claimed that the provision would not be applicable since the contract was already awarded and any information disclosed to the Parliament should be disclosed to the citizens. The Central Information Commission issued a letter stating that the contractual obligation is over and a copy of the said agreement can be duly shared. However, it was discovered by the said participant that certain pages of the same were missing , which contained confidential information. When this issue went before appeal before the Information Commissioner, the IC gave an order to the IC in Delhi to comply with the previous order. However, it was communicated that limited financial information may be given, but not missing pages. Also, it was revealed that the UIDAI was supposed to share biometric data with NPR (by way of a MoU), but it has refused to give information since the intention was to discontinue NPR and wanted  only UIDAI to collect data.&lt;/p&gt;
&lt;h2&gt;Concerns Arising from the Report of the Comptroller and Auditor General of India (CAG) on Implementation of PAHAL (DBTL) Scheme&lt;/h2&gt;
&lt;p&gt;A presentation on the CAG compliance audit report of PAHAL on LPG &lt;strong&gt;[8]&lt;/strong&gt; revealed how the society was made to believe that UID will help deal with the issue of duplication and collection as well as use of biometric data will help. The report also revealed that multiple LPG connections have the same Aadhaar number or same bank account number in the consumer database maintained by the OMCs, the bank account number of consumers were also not accurately recorded,  scrutiny of the database revealed improper capture of Aadhaar numbers, and there was incorrect seeding of IFSC codes in consumer database. The participants felt that this was an example of how  schemes that are being introduced for social welfare  do not necessarily benefit the society, and on the contrary, has led to exclusion by design. For example, in the year 2011, by was of the The Liquefied Petroleum Gas (Regulation of Supply and Distribution) Amendment Order, 2011 &lt;strong&gt;[9]&lt;/strong&gt;, the Ministry of Petroleum and Natural Gas made the Unique Identification Number (UID) under the Aadhaar project a must for availing LPG refills. This received a lot of public pushback, which led to non-implementation of the order. In October 2012, despite the UIDAI stating that the number was voluntary, a number of services began requiring the provision of an Aadhaar number for accessing benefits. In September 2013, when the first order on Aadhaar was passed by court &lt;strong&gt;[10]&lt;/strong&gt;, oil marketing companies and UIDAI  approached the Supreme Court to change the same and allow them to make it mandatory, which was refused by the Court. Later in the year 2014, use of Aadhaar for subsidies was made mandatory.  The participants further criticised the  CAG report for revealing the manner in which linking Aadhaar with welfare schemes has allowed duplication and led to ghost beneficiaries where there is no information about who these people are who are receiving the benefits of the subsidies. For example, in Rajasthan, people are being denied their pension as they are being declared dead due to absence of information from the Aadhaar database.&lt;/p&gt;
&lt;p&gt;It was said that the statistics of duplication  mentioned in the report show how UIDAI (as it claims to ensure de-duplication of beneficiaries) is not required for this purpose and can be done without Aadhaar as well. Also, due to incorrect seeding of Aadhaar number many are being denied subsidy where there is no information regarding the number of people who have been denied the subsidy because of this.  Considering these important facts from the audit report, the discussants concluded how the statistics reflect inflated claims by UIDAI and how the problems which are said to be addressed by using Aadhaar can be dealt without it. In this context, it is important to understand how the data in the aadhaar database maybe wrong and in case of e-governance the citizens suffer. Also, the fact that loss of subsidy-not in cash, but in use of LPG cylinder - only for cooking, is ignored. In addition to that, there is no data or way to check if the cylinder is being used for commercial purposes or not as RTI from oil companies says that no ghost identities have been detected.&lt;/p&gt;
&lt;h2&gt;UID-linked Welfare Delivery in Rajasthan&lt;/h2&gt;
&lt;p&gt;One speaker presented findings on people's experiences with UID-linked welfare services in Rajasthan, collected through a 100 days trip organised to speak to people across the state on problems related to welfare governance. This visit revealed that people who need the benefits and access to subsidies most are often excluded from actual services. It was highlighted that the paperless system is proving to be highly dangerous. Some of the cases discussed included that of a disabled labourer, who was asked to get an aadhaar card, but during enrollment asked the person standing next to him to put all his  5 fingers for biometric data collection.  Due to this incorrect data, he is devoid of all subsidies since the authentication fails every time he goes to avail it. He stopped receiving his entitlements.  Though problems were anticipated, the misery of the people revealed the extent of the problems arising from the project. In another case, an  elderly woman living alone, since she could not go for Aadhaar authentication, had not been receiving the ration she is entitled to receive for the past 8 months. When the ration shop was approached to represent her case, the dealers said that they cannot provide her ration since they would require her thumb print for authentication. Later, they found out that on persuading the dealer to provide her with ration since Aadhaar is not mandatory, they found out that in their records they had actually mentioned that she was being given the ration, which was not the case. So the lack of awareness and the fact that people are entitled to receive the benefits irrespective of Aadhaar is something that is being misused by dealers. This shows how this system has become a barrier for the people, where they are also unaware about the grievance redressal mechanism.&lt;/p&gt;
&lt;h2&gt;Aadhaar and e-KYC&lt;/h2&gt;
&lt;p&gt;In this session, the use of Aadhaar for e-KYC verification was discussed The UID strategy document describes how the idea is to link UIDAI with money enabled Direct Benefit Transfer (DBT) to the beneficiaries without any reason or justification for the same. It was highlighted by one of the participants how the Reserve Bank of India (RBI) believed that making Aadhaar compulsory for e-KYC and several other banking services was a violation of the Money Laundering Act as well as its own rules and standards, however, later relaxed the rules to link Aadhaar with bank accounts and accepted its for e-KyC with great reluctance as the Department of Revenue thought otherwise. It was mentioned how allowing opening of bank accounts remotely using Aadhaar, without physically being present, was touted as a dangerous idea. However, the restrictions placed by RBI were suddenly done away with and opening bank accounts remotely was enabled via e-KYC.&lt;/p&gt;
&lt;p&gt;A speaker emphasised that with emerging FinTech services in India being tied with Aadhaar via India Stack, the following concerns are becoming critical:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;With RBI enabling creation of bank accounts remotely, it becomes difficult to to track who did e-KYC and which bank did it and hold the same accountable.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;The Aadhaar Act 2016 states that UIDAI will not track the queries made and will only keep a record of Yes/No for authentication. For example, the e-KYC to open a bank account can now be done with the help of an Aadhaar number and biometric authentication. However, this request does not get recorded and at the time of authentication, an individual is simply told whether the request has been matched or not by way of a Yes/No &lt;strong&gt;[11]&lt;/strong&gt;. Though UIDAI will maintain the authentication record, this may act as an obstacle since in case the information from the aadhaar database does not match, the person would not be able to open a bank account and would only receive a yes/no as a response to the request.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Further, there is a concern that the Aadhaar Enabled Payment System being implemented by the National Payment Corporation of India (NCPI) would allow effectively hiding of source and destination of money flow, leading to money laundering and cases of bribery. This possible as NCPI maintains a mapper where each bank account is linked (only the latest one). However, Aadhaar number can be linked with multiple bank accounts of an individual. So when a transaction is made, the mapper records the transaction only from that 1 account. But if another transaction takes place with another bank account, that record is not maintained by the mapper at NCPI since it records only transactions of the latest account seeded in that. This makes money laundering easy as the money moves from aadhaar number to aadhaar number now rather than bank account to bank account.&lt;/li&gt;&lt;/ol&gt;
&lt;h2&gt;Endnotes&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;[1]&lt;/strong&gt; See: &lt;a href="http://cis-india.org/internet-governance/events/uidai-and-welfare-services-exclusion-and-countermeasures-aug-27"&gt;http://cis-india.org/internet-governance/events/uidai-and-welfare-services-exclusion-and-countermeasures-aug-27&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[2]&lt;/strong&gt; See: &lt;a href="http://cis-india.org/internet-governance/blog/report-on-understanding-aadhaar-and-its-new-challenges"&gt;http://cis-india.org/internet-governance/blog/report-on-understanding-aadhaar-and-its-new-challenges&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[3]&lt;/strong&gt; See: &lt;a href="https://uidai.gov.in/beta/images/the_aadhaar_act_2016.pdf"&gt;https://uidai.gov.in/beta/images/the_aadhaar_act_2016.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[4]&lt;/strong&gt; See: &lt;a href="http://scroll.in/latest/816343/aadhaar-numbers-may-soon-be-compulsory-to-book-railway-tickets"&gt;http://scroll.in/latest/816343/aadhaar-numbers-may-soon-be-compulsory-to-book-railway-tickets&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[5]&lt;/strong&gt; See: &lt;a href="http://www.thehindu.com/news/national/karnataka/linking-bpl-ration-card-with-aadhaar-made-mandatory/article9094935.ece"&gt;http://www.thehindu.com/news/national/karnataka/linking-bpl-ration-card-with-aadhaar-made-mandatory/article9094935.ece&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[6]&lt;/strong&gt; See: &lt;a href="http://timesofindia.indiatimes.com/india/After-scam-Bihar-to-link-exams-to-Aadhaar/articleshow/54000108.cms"&gt;http://timesofindia.indiatimes.com/india/After-scam-Bihar-to-link-exams-to-Aadhaar/articleshow/54000108.cms&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[7]&lt;/strong&gt; See: &lt;a href="http://www.dailypioneer.com/state-editions/cs-calls-for-early-steps-to-link-aadhaar-to-ac.html"&gt;http://www.dailypioneer.com/state-editions/cs-calls-for-early-steps-to-link-aadhaar-to-ac.html&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[8]&lt;/strong&gt; See: &lt;a href="http://www.cag.gov.in/sites/default/files/audit_report_files/Union_Commercial_Compliance_Full_Report_25_2016_English.pdf"&gt;http://www.cag.gov.in/sites/default/files/audit_report_files/Union_Commercial_Compliance_Full_Report_25_2016_English.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[9]&lt;/strong&gt; See: &lt;a href="http://petroleum.nic.in/docs/lpg/LPG%20Control%20Order%20GSR%20718%20dated%2026.09.2011.pdf"&gt;http://petroleum.nic.in/docs/lpg/LPG%20Control%20Order%20GSR%20718%20dated%2026.09.2011.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[10]&lt;/strong&gt; See: &lt;a href="http://judis.nic.in/temp/494201232392013p.txt"&gt;http://judis.nic.in/temp/494201232392013p.txt&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[11]&lt;/strong&gt; Section 8(4) of the Aadhaar Act, 2016 states that "The Authority shall respond to an authentication query with a positive, negative or any other appropriate response sharing such identity information excluding any core biometric information."&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/workshop-report-uidai-and-welfare-services-august-27-2016'&gt;https://cis-india.org/internet-governance/blog/workshop-report-uidai-and-welfare-services-august-27-2016&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vanya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Payment</dc:subject>
    
    
        <dc:subject>Data Systems</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Welfare Governance</dc:subject>
    
    
        <dc:subject>Big Data for Development</dc:subject>
    
    
        <dc:subject>Digital ID</dc:subject>
    

   <dc:date>2019-03-16T04:34:11Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
