<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 121 to 135.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/outlook-arindam-mukherjee-february-20-2017-no-genie-at-your-fingertips"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-hindu-april-10-2016-somesh-jha-pmo-no-to-smart-cards-insists-aadhaar"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/will-the-magic-number-deliver-aadhaar-cslg-26042016"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/telecom/blog/cis-submission-trai-note-on-interoperable-scalable-public-wifi"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/workshop-report-uidai-and-welfare-services-august-27-2016"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/right-to-food-campaign-ranchi-convention-2016"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/scroll-m-rajshekhar-how-private-companies-are-using-aadhaar-to-deliver-better-services-but-theres-a-catch"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comments-on-the-report-of-the-committee-on-digital-payments-dec-2016"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/economic-times-indulekha-aravind-january-15-2017-the-soon-to-be-launched-aadhaar-pay-will-let-you-make-purchases-using-your-fingerprint"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/bloomberg-mayank-jain-january-17-2017-dangers-of-aadhaar-based-payments-that-no-one-is-talking-about"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/wall-street-journal-gabriele-parussini-january-13-2017-indias-digital-id-rollout-collides-with-rickety-reality"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/epw-27-february-2016-hans-varghese-mathews-flaws-in-uidai-process"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/a-comparison-of-the-2016-aadhaar-bill-and-the-2010-nidai-bill"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/richa-mishra-hindu-businessline-march-13-2017-the-12-digit-conundrum"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-guardian-march-21-2017-no-id-no-benefits"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/outlook-arindam-mukherjee-february-20-2017-no-genie-at-your-fingertips">
    <title>No Genie At Your Fingertips</title>
    <link>https://cis-india.org/internet-governance/news/outlook-arindam-mukherjee-february-20-2017-no-genie-at-your-fingertips</link>
    <description>
        &lt;b&gt;Aadhaar biometrics will now enable cashless shopping sans card and smartphone. A look at the hopes and fears.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Arindam Mukherjee was &lt;a class="external-link" href="http://www.outlookindia.com/magazine/story/no-genie-at-your-fingertips/298449"&gt;published in the Outlook&lt;/a&gt; on February 20, 2017. Pranesh Prakash and Sunil Abraham were quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Soon, you will be able to pay for your groceries and other purchased goods by using just your fingerprints and biometric data. You won’t need debit or credit cards, smartphones or e-wallets. You won’t need to sign or even remember your PIN.&lt;br /&gt;&lt;br /&gt;In a bid to increase digitisation and move to the next phase of ‘cashless India’, the government is preparing to launch Aadhaar Pay, an initiative that will supersede the need to use credit cards, debit cards, smartphones and PINs to make payments or transfer money. The proposed system of payments will use a person’s biometric data and fingerprints to make payments through Aadhaar-linked bank accounts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The initiative, which has been running as a pilot project in fair price shops in Andhra Pradesh, is expected to be launched in a month’s time. According to officials of the Unique Identification Authority of India (UIDAI), the system has been getting a positive response in these trials and is ready for a nationwide launch.&lt;br /&gt;&lt;br /&gt;In Aadhaar Pay, all a person needs to carry to a shop are his fingerprints as merchant establishments will authenticate his or her identity through fingerprints, which will give them access to a person’s Aadhaar data. The only essential requirement for this new mode of payments is that bank acc­ounts have to be linked with the account-­holder’s Aadhaar number.&lt;br /&gt;&lt;br /&gt;Unlike the post-demonetisation limits imposed on ATM and bank account withdrawals, no limits are proposed to be put on Aadhaar Pay transactions as of now. The proposal is to leave the fixing of limits to the discretion of banks. However, the government hopes Aadhaar Pay will be used mostly for small-value transactions rather than large deals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The system will work through an app in the merchant establishment’s smartphone—with a fingerprint scanner device—eliminating the requirement of a Point of Sale (POS) terminal, which is required for credit card and debit card transactions. The scanner will be priced at around Rs 2,000, considerably cheaper than POS terminals that cost Rs 8,000-10,000.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aadhaar Pay is the next step of the government’s successful run of Aadhaar Enabled Payment System (AEPS), under which transactions are made through ‘banking correspondents’, mostly in rural areas. These transactions are done through POS machines and micro-ATMs. Like Aadhaar Pay, AEPS disburses money without a signature or a debit or credit card, and without the need to visit a bank branch. But unlike AEPS, which works through banking correspondents, Aadhaar Pay will be available through merchant establishments much the same way as debit or credit cards work.&lt;br /&gt;&lt;br /&gt;The biggest task before the government to ensure the success of Aadhaar Pay is to develop a network of merchant establishments that will accept Aadhaar Pay just the way they accept credit or debit cards or e-wallet payments like Paytm. To do this, the government said in this year’s budget that banks would be encouraged to put 20 lakh Aadhaar Pay access machines across the country. “We have asked every bank to select 35 merchants for this. These merchants will have a smartphone and a biometric device attachment to carry out Aadhaar Pay transactions,” UIDAI CEO Ajay Bhushan Pandey tells Outlook.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This won’t be easy. Even in case of debit or credit cards, the  biggest limiting factor is the relatively small number of POS terminals  that accept them. According to data from the National Payment  Corporation of India (NPCI), there are only 14 lakh POS terminals in  India, which has over 3.5-4 crore merchant establishments and 80 crore  cards (77 crore debit cards and three crore credit cards). The bulk of  these terminals are in tier I and tier II cities and almost none in tier  III and IV towns. To improve the situation, the government is already  working towards bringing in 10 lakh new terminals by March, most of  which will be put in tier III and tier IV towns, bringing them deeper  within the ambit of the ­digitised, cashless economy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though a starting target of 20 lakh terminals for Aadhaar Pay may  seem quite ambitious, according to the latest data, 111.51 crore adults  have already obtained their Aadhaar numbers and 50 crore bank acc­ounts  (of a total 110 crore savings accounts in the country) of 40 crore  people have been linked to Aadhaar and, according to UIDAI, nearly two  crore people are linking their bank accounts with Aadhaar every month,  brightening up the prospects of Aadhaar Pay. A majority of these numbers  are from rural areas and smaller cities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government and UIDAI aim to roll out Aadhaar Pay primarily in rural areas and tier III and tier IV cities to begin with, as these areas do not have proper debit or credit card coverage and the people living there are not big users of plastic cards or smartphones. “We need to provide a solution for every segment of the ­population,” says Pandey. “We have to take care of the people who cannot use smartphones or other mobile phones and debit or credit cards, and those who cannot remember their PIN for authentication. The only tool with them is their fingerprint. Approximately 30 crore people are not comfortable with cards or phone. We had to get them into the mode of digital payments.”&lt;br /&gt;&lt;br /&gt;Not surprisingly, critics of Aadhaar and Aadhaar-based services have attacked Aadhaar Pay and AEPS on issues of privacy and security of biometric and personal data. Pranesh Prakash, policy director with the Centre for Internet and Society (CIS), ­rec­ently tweeted, “As long as AEPS encourages biometric authorisation of transactions, it is bound to be a security nightmare, with widespread fraud.” Would you tell a shopkeeper your debit card’s PIN? No. Then why share your fingerprint? A fingerprint, in this system, becomes a kind of unchangeable PIN, he asks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pointing out a possible danger, Usha Ramanathan, an independent law resear­c­her who has been following Aadhaar since its inception, says, “In many ­payments, biometric data is authenticated and then it remains in the system where there are leakages. Intermediaries then have access to the data, which is thus made insecure.”&lt;br /&gt;&lt;br /&gt;According to the UIDAI, however, once biometric data is provided by the consumer while making Aadhaar-based payments, it gets encrypted and a merchant doesn’t get access to that data. The Aadhaar Act also prohibits any storing of biometric data in local devices. And yet, there are many like CIS executive director Sunil Abraham who believe it is a mistake to use biometrics for authentication, especially when payments are concerned. “Our concern with Aadhaar Pay is about the biometric component of the project,” says Abraham. “Biometrics is an identification technology. Unfortunately, it is being presented as an authentication technology. It is not a secure authentication technology as biometric data can be stolen easily. It is also irrevocable; once bio­metric data is stolen, it cannot be ­re-issued like a smart card.”&lt;br /&gt;&lt;br /&gt;Then there is the problem of availability of fingerprints. In the case of many people from rural areas and the working class, fingerprints get affected due to the manual nature of their work. This makes it difficult for this target group of UIDAI to conduct transactions properly through Aadhaar Pay. “In Rajasthan, 30 per cent of the households are not even able to procure ration using fingerprints,” says Ramanathan.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The launch of Aadhar Pay at this time becomes more challenging as there has been a decline in digital payments this January. According to RBI data, digital payments, including transactions made by using credit cards, debit cards, electronic fund transfers, digital wallets and mobile banking transactions, were 10.2 per cent lower by volume and 7 per cent lower by value in January 2017 as compared to December 2016. Also, digital transactions fell from 1,027.7 million (worth Rs 105.4 lakh crore) to 922.9 million (worth Rs 98 lakh crore). This could get worse as the RBI raised the cash withdrawal limits from Rs 24,000 to Rs 50,000 from February 20 and aims to remove all limits by mid-March.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Within digital transactions, debit and credit transactions at POS terminals dec­lined 18.6 per cent month-on-month in January, while mobile banking transactions declined by 7.6 per cent, showing that people still prefer to deal in cash. According to NPCI data, however, IMPS transactions rose by 18 per cent in January and UPI-based transactions went up from 2 million transactions (worth Rs 700 crore) in December to 4.2 million transactions (worth Rs 1,666 crore) in January.&lt;br /&gt;&lt;br /&gt;Clearly, considering India’s demography and its problems, when it comes to the security of personal and biometric data, the government and the UIDAI have many issues to clear before Aadhaar Pay can achieve any success. Moreover, there are over 100 crore mobile phones in India today, with even the lowest strata of the population having access to one. Yet mobile-­based payments and m-wallets are yet to hit that critical mass. To make Aadhaar Pay a bigger success than that could be a gigantic task.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/outlook-arindam-mukherjee-february-20-2017-no-genie-at-your-fingertips'&gt;https://cis-india.org/internet-governance/news/outlook-arindam-mukherjee-february-20-2017-no-genie-at-your-fingertips&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-02-16T16:02:31Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-hindu-april-10-2016-somesh-jha-pmo-no-to-smart-cards-insists-aadhaar">
    <title>PMO’s no to smart cards, insists on Aadhaar </title>
    <link>https://cis-india.org/internet-governance/news/the-hindu-april-10-2016-somesh-jha-pmo-no-to-smart-cards-insists-aadhaar</link>
    <description>
        &lt;b&gt;The government has decided to stop issuing new smart cards to beneficiaries of government schemes as Aadhaar is now backed by a law. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Somesh Jha was published in the Hindu on April 10, 2016. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The Prime Minister’s Office (PMO) has issued strict instructions to the Information Technology Ministry to ensure that States and the Central governmentstop issuing smart cards for new programmes for beneficiaries, and to rely on the Aadhaar-based Direct Benefit Transfer platform instead.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The move will impact ministries such as Labour, Social Justice and Health, which are in the process or have already rolled out smart cards.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government had said earlier that over 100 crore people, constituting 93 per cent of the adult population, had a unique identification (UID) number under the Aadhaar platform.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The undersigned is directed to request the department to examine the need for state and central government departments to issue separate smart cards in the light of the near universal coverage of Aadhaar and the delivery of the most public welfare benefits through Aadhaar enabled platforms,” according to a directive issued by Gulzar N, Director, PMO, to Aruna Sharma, Secretary, Department of Electronics and Information Technology.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The undersigned is also directed to request the department to prepare policy on the delivery of various public services using Aadhaar, Jan Dhan Yojana and existing platforms without the issuance of new smart cards.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Last month, Union Minister for Social Justice and Empowerment Thaawar Chand Gehlot had announced that all differently abled persons would soon get a unique identity card to avail welfare schemes. .&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;State governments had also planned to use smart card technology for welfare schemes. For instance, Odisha was mulling smart cards for construction workers in the State.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The PMO sent a separate communiqué to Labour Secretary Shankar Aggarwal in the context of a proposal to issue 40 crore smart cards to informal sector workers, called the Unorganised Workers’ Identification Number (U-WIN). The UWIN cards were to be used by these workers to access benefits under schemes such as Rashtriya Swasthya Bima Yojana , Aam Aadmi Bima Yojana , Atal Pension Yojana, Pradhan Mantri Suraksha Bima Yojana and Jeevan Jyoti Bima Yojana.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The PMO rejected the proposal noting that Aadhaar would act as a “universal unique identifier for each citizen.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Adding a UWIN number would not only duplicate work, but also introduce further problems in linking up with other databases which have already been linked with Aadhaar,” said the missive reviewed by The Hindu.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, experts are sceptical of the government’s move.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Smart cards are always better than biometrics. If that was not the case, the global financial infrastructure today will be working on biometrics and not on smart cards,” said Sunil Abraham, executive director of The Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Why are these banks working on smart cards? Smart cards work using cryptography, which is more fool-proof than biometrics. Biometrics allow for remote, covert and non-consensual identification,” Mr. Abraham said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Smart card vendors, however, said the move may not impact their market. “The demand for smart cards is massive in all the other segments such as for use in debit and credit cards or driving licenses and vehicle registration numbers,” said Deven Mehta, managing director of the Mumbai-based Smart Card IT Solutions.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-hindu-april-10-2016-somesh-jha-pmo-no-to-smart-cards-insists-aadhaar'&gt;https://cis-india.org/internet-governance/news/the-hindu-april-10-2016-somesh-jha-pmo-no-to-smart-cards-insists-aadhaar&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-04-20T02:19:18Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/will-the-magic-number-deliver-aadhaar-cslg-26042016">
    <title>"Will the Magic Number Deliver?" - Roundtable on Aadhaar at CSLG, JNU, April 26</title>
    <link>https://cis-india.org/internet-governance/news/will-the-magic-number-deliver-aadhaar-cslg-26042016</link>
    <description>
        &lt;b&gt;The Centre for the Study of Law and Governance (CSLG), Jawaharlal Nehru University (JNU), will organise a roundtable discussion on Tuesday, April 26, to discuss the Aadhaar project and Act. Along with Rajeev Chandrasekhar, Prasanna S, Apar Gupta, and Chirashree Dasgupta, Sumandro Chattapadhyay will be one of the discussants. It will  take place in the CSLG Conference Room at 6 pm.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Discussion Note&lt;/h3&gt;
&lt;p&gt;The Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Act, 2016, was enacted by the Parliament on March 16. Thereafter it has been notified on March 26.&lt;/p&gt;
&lt;p&gt;The Act empowers the UIDAI (Unique Identification Authority of India) to collect biometric and demographic information of residents to provide them with a unique number. This unique number is to be used for enumeration, identification and targeting of beneficiaries of government subsidies and services.&lt;/p&gt;
&lt;p&gt;Since the creation of the UIDAI as an executive authority in 2009, this process of enumeration has been ongoing. Recently, it was announced that more than 100 crore residents have been given their aadhaar cards. Alongside, however, legal challenges have continued in the Supreme Court.&lt;/p&gt;
&lt;p&gt;Given this context, this Roundatable Discussion will focus on the following set of questions (among others):&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;Can the Aadhaar Number enable better delivery of government subsidies and services?&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;How does the Act ensure data protection?&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Is there a right to privacy in India? What are the implications in the context of Aadhaar?&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Does the Act ensure public access to statutory remedies in case of violations?&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Did the Aadhaar Bill fulfil the requirements of a money bill?&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Discussion Format&lt;/h3&gt;
&lt;p&gt;Setting the Theme - Short Introduction to the Topic by Natasha Goyal&lt;/p&gt;
&lt;p&gt;Speakers' comments, 15 minutes each, consecutive, no power points&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;&lt;a href="https://twitter.com/rajeev_mp"&gt;Rajeev Chandrasekhar&lt;/a&gt;, Member of Parliament, Rajya Sabha&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="https://twitter.com/ajantriks"&gt;Sumandro Chattapadhyay&lt;/a&gt;, the Centre for Internet and Society&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="https://twitter.com/prasanna_s"&gt;Prasanna S&lt;/a&gt;, Lawyer&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="https://twitter.com/aparatbar"&gt;Apar Gupta&lt;/a&gt;, Advocate, Delhi High Court&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="http://www.jnu.ac.in/FacultyStaff/ShowProfile.asp?SendUserName=chirashree"&gt;Dr. Chirashree Dasgupta&lt;/a&gt;,  Centre for the Study of Law and Governance&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Open Session (Moderated Q and A)&lt;/p&gt;
&lt;p&gt;Followed by Tea&lt;/p&gt;
&lt;h3&gt;Directions to Venue&lt;/h3&gt;
&lt;p&gt;From JNU main gate, proceed straight until you get to a T-junction. Turn left. Continue until you reach a second T-junction. Turn right. Follow the road for just 0.7 km until you see a bus stop labelled “Paschimmabad.” About 50 m past the bus stop turn right at a sign that reads: “Centre for the Study of Law and Governance”. The CSLG  building is on the right. The conference room is on the first floor.&lt;/p&gt;
&lt;h3&gt;Poster&lt;/h3&gt;
&lt;img src="http://cis-india.org/internet-governance/news/will-the-magic-number-deliver-aadhaar-cslg-26042016/leadImage" alt="CSLG Roundtable Discussion - Will the Magic Number Deliver? - April 26, 6 pm" /&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/will-the-magic-number-deliver-aadhaar-cslg-26042016'&gt;https://cis-india.org/internet-governance/news/will-the-magic-number-deliver-aadhaar-cslg-26042016&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Digital India</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Biometrics</dc:subject>
    

   <dc:date>2016-04-20T10:49:58Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/telecom/blog/cis-submission-trai-note-on-interoperable-scalable-public-wifi">
    <title>CIS Submission to TRAI Consultation Note on Model for Nation-wide Interoperable and Scalable Public Wi-Fi Networks</title>
    <link>https://cis-india.org/telecom/blog/cis-submission-trai-note-on-interoperable-scalable-public-wifi</link>
    <description>
        &lt;b&gt;​This submission presents responses by the CIS on the ​Consultation Note on Model for Nation-wide Interoperable and Scalable Public Wi-Fi Networks published by the TRAI on November 15, 2016. Our analysis of the solution proposed in the Note, in brief, is that there is no need of a solution for non-existing interoperability problem for authentication and payment services for accessing public Wi-Fi networks. The proposed solution in this Note only adds to over-regulation in this sector, and does not incentivise new investment in the sector, but only establishes UIDAI and NPCI as the monopoly service providers for authentication and payment services.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The comments were authored by Japreet Grewal, Pranesh Prakash, Sharath Chandra, Sumandro Chattapadhyay, Sunil Abraham, and Udbhav Tiwari, with expert comments from Amelia Andersdotter.&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;1. Preliminary&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;1.1.&lt;/strong&gt; This submission presents responses by the Centre for Internet and Society (“CIS”) &lt;strong&gt;[1]&lt;/strong&gt; on the &lt;em&gt;Consultation Note on Model for Nation-wide Interoperable and Scalable Public Wi-Fi Networks&lt;/em&gt; (“the Note”) published by the Telecom Regulatory Authority of India (“TRAI”) on November 15, 2016 &lt;strong&gt;[2]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;1.2.&lt;/strong&gt; The CIS welcomes the effort undertaken by TRAI to map regulatory and other barriers to deployment of public Wi-Fi in India. We especially appreciate that TRAI has recognised &lt;strong&gt;[3]&lt;/strong&gt; two key barriers to provision of public Wi-Fi networks identified and highlighted in our earlier response to the &lt;em&gt;Consultation Paper on Proliferation of Broadband through Public Wi­Fi&lt;/em&gt; &lt;strong&gt;[4]&lt;/strong&gt;: 1) over regulation (including, licensing requirements, data retention, and Know Your Customer policy), and 2) paucity of spectrum &lt;strong&gt;[5]&lt;/strong&gt;.&lt;/p&gt;
&lt;h2&gt;2. General Responses&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;2.1.&lt;/strong&gt; Before responding to the specific questions posed by the Note, we would like to make the following observations.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;2.2.&lt;/strong&gt; There is no need of a solution for non-existing interoperability problem for authentication and payment services for accessing public Wi-Fi networks. The proposed solution in this Note only adds to over-regulation in this sector. The proposed solution does not incentivise new investment in the sector, but only establishes UIDAI and NPCI as the monopoly service providers for authentication and payment services.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;2.3.&lt;/strong&gt; As the TRAI has consulted widely with industry and other stakeholders before it settled on the list of priority issues contained in Section C.6 of the Note, we are surprised to find that this Note aims to address only the problem of lack of “seamless interoperable payment system for Wi-Fi networks” (Section C.6.d. Of the Note), and does not discuss and propose solutions for any other key barriers identified by the Note.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;2.4.&lt;/strong&gt; The Note fails to clarify the “interoperability” problem in the payment system for usage of public Wi-Fi networks that it is attempting to solve. The Note identifies that lack of “single standard” for “authentication and  payment  mechanisms” for accessing public Wi-Fi networks as a key impediment to provide scalable and interoperable public Wi-Fi networks across the country &lt;strong&gt;[6]&lt;/strong&gt;. By conceptualising the problem in this manner, TRAI has bundled together two completely different concerns - authentication and payment - into one and this is at the root of the problems emanating from the proposed solution in this Note.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;2.5.&lt;/strong&gt; Lack of standard process for authentication is created by over-regulation via Know Your Customer (“KYC”) policies, and selection of eKYC service provided by UIDAI as the only acceptable authentication mechanism for all users of public Wi-Fi networks across India, creating further economic and legal challenges for smaller would-be providers of public Wi-Fi networks as they assess their liabilities and start-up costs. Additionally, since this would amount to making UID/Aadhaar enrolment mandatory for any user of public wi-fi networks, it seems to create a contradiction with previously communicated policy from the UIDAI and the Government that no such obligation should arise. Supreme Court has also mandated over successive Orders that enrolment for UID/Aadhaar number should remain optional for the citizens and residents.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;2.6.&lt;/strong&gt; As was observed by the respondents to the TRAI Consultation concluded earlier this year, there is no interoperability problem that needs to be solved regarding payments for accessing public Wi-Fi networks. Payment services continue to be evolved and payment aggregator services provided by existing companies may be expected to resolve many of the outstanding issues of service proliferation in the upcoming years, at least in the absence of additional mandatory technical measures imposed by the government. Bundling of payment with authentication will only undermine the already existing independent market for payment aggregators, and further enforce mandatoriness of UID/Aadhaar number.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;2.7.&lt;/strong&gt; Further, the payment mechanism proposed would seem to worsen difficulties for tourists and foreigners in accessing public Wi-Fi in India, as well adds an additional layer of authentication in a system already identified (even in the Note itself) to be overburdened by regulations regarding KYC and data retention. Section C.6.b of the Note highlights the problems faced by foreigners and tourists when the authentication mechanism is premised upon use of One Time Password (OTP) that requires a functioning local mobile phone number. It contradicts itself later by proposing an authentication method that requires the user to not only download an application onto their mobile/desktop device, but also to enrol for UID/Aadhaar number and/or to use their existing UID/Aadhaar number. Instead of reducing the existing barriers to provision of and access to public Wi-Fi, which the Note is supposed to achieve, it creates significant new barriers.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;2.8.&lt;/strong&gt; The technological architecture advanced by the Note upholds support of governance and surveillance projects that, in addition to being costly in their implementation and thereby slowing down the objective of getting India connected, are also of questionable value to the security of the Indian polity. UID, UPI, and related projects risk undermining cyber-security through their reliance on centralised architectures and interfere with healthy competitive market dynamics between commercial and non-commercial actors.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;2.9.&lt;/strong&gt; The Note continues to only consider and enable commercial models for the provision of public Wi-Fi networks. We have identified this as a problematic assumption in our last submission &lt;strong&gt;[7]&lt;/strong&gt;. It is most crucial that TRAI does not ignore and fail to promote and facilitate the possibility of not-for-profit models that involve grassroot communities, academia, and civil society.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;2.10.&lt;/strong&gt; Last but not the least, the term “Wi-Fi” refers to a particular technology for establishing wireless local area networks. Further, the term is a trademark of the Wi-Fi Alliance &lt;strong&gt;[8]&lt;/strong&gt;. It is this not a neutral term, and it must not be used as a general and universal synonym for wireless local area networks. We recommend that TRAI may consider using a technology-neutral term, say “public wireless services” or “public networking services”, to describe the sector. Following the terminology used in the Note, we have decided to continue using the term “Wi-Fi” in this response. This does not reflect our agreement about the appropriateness of this term. Important: The recommendation for technology-neutral regulation also comes with the qualification that safeguards like regulations on Listen Before Talk and Cycle Time are required to prevent technologies like LTE-U from squatting on spectrum and interfering with connections based on other standards.&lt;/p&gt;
&lt;h2&gt;3. Specific Responses&lt;/h2&gt;
&lt;h4&gt;Q1. Is the architecture suggested in the consultation note for creating unified authentication and payment infrastructure will enable nationwide standard for authentication and payment interoperability?&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;3.1.&lt;/strong&gt; No. The proposed infrastructure is likely to be costly for a large number of actors to implement and undermine some of the ongoing innovation in the Indian digital payment services industry. Rather than being helpful, it risks introducing additional requirements on an industry that TRAI has already identified as facing a number of large challenges.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.2.&lt;/strong&gt; There is no need for a unified architecture that provides nationwide standard for authentication and payment interoperability. It does not offer any incentive towards provision of public Wi-Fi networks. Neither is there an interoperability problem at the physical or data link layers that has been pointed out, nor is government mandated interoperability required at the payment or ID layer since there are private entities that provide such interoperability (like, payment aggregators). Additionally, we believe it is inappropriate that the TRAI is trying to predict the most suitable business/technological model for digital payments to be used for accessing commercial Wi-Fi networks. India has a booming online payments industry, and it must be allowed to evolve in an enabling regulatory environment that allow for competition and ensures responsible practices.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.3.&lt;/strong&gt; The Note identifies several structural impediments to expansion of public Wi-Fi networks in India, namely paucity of backhaul connectivity infrastructure (Section C.6.a), Inadequate associated infrastructure to offer carrier  grade  Wi-Fi network (Section C.6.c), dependency of authentication mechanism on pre-existing (Indian) mobile phone connection (Section C.6.b), and limited availability of spectrum to be used for public Wi-Fi networks (Section C.6.e). All these are crucial concerns and none of them have been addressed by the architecture suggested in the Note.&lt;/p&gt;
&lt;h4&gt;Q2. Would you like to suggest any alternate model?&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;3.4.&lt;/strong&gt; Yes. The model proposed in the Note is likely to exclude several types of potential users (say, foreigners and tourists), and impose a single authentication and payment service provider for accessing public Wi-Fi networks, which may undermine both competition and security in the market for these services.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.5.&lt;/strong&gt; Internationally, there are cities and regions (say, the city of Barcelona and the Catalonia region in Spain) where public Wi-Fi networks have been provided in a pervasive and efficient manner by taking a light regulatory approach that enables opportunities for potential providers to set up their own infrastructures and additionally have access to backhaul. Further, reducing legal requirements on authentication should be considered in place of government mandated technical architectures for authentication and payment. In particular, allowing for anonymous access to Public Wi-Fi or wireless connectivity would reduce both the administrative and the technical burden on potential providers at the hyper-local level, especially for providers whose main activity it is not, and cannot be, to provide internet services (say, event venues, malls, and shops).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.6.&lt;/strong&gt; The CIS suggests the following steps towards conceptualising an “alternative model”:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;remove existing regulatory disincentives,&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;urgently explore policies to promote deployment of wired infrastructures in general, and to enable a larger range of actors, including local authorities, to invest in and deploy local infrastructures by reducing licensing requirements in particular,&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;examine spectrum requirements for provision of public Wi-Fi, and&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;provide incentives, such as allowing telecom service providers to share backhaul traffic over public Wi-Fi, and ways for telecom service providers to lower their costs if they also make Internet access available for free.&lt;/li&gt;&lt;/ol&gt;
&lt;h4&gt;Q3. Can Public Wi-Fi access providers resell capacity and bandwidth to retail users? Is “light touch regulation” using methods such as “registration” instead of “licensing” preferred for them?&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;3.7.&lt;/strong&gt; CIS holds that capacity and bandwidth are neither comparable to tangible goods nor to digital currency. They are a utility, and the provider of the utility has to accept that their customers use the utility in the way they see fit, even if that use entails sharing said capacity and bandwidth with downstream private persons or customers. Wi-Fi capabilities are currently a built-in standardised feature of all consumer routers. Any individual, community, or store with access to an internet connection and a consumer router could become a public Wi-Fi access provider at no additional cost to themselves, furthering the goals of the Indian government in its Digital India strategy to ensure public and universal access to the internet.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.8.&lt;/strong&gt; In order to exploit the opportunities awarded by a large amount of entities in the Indian society potentially becoming Public Wi-Fi providers, TRAI should require neither registration nor licensing of these actors. Imposing administrative burdens on potential public Wi-Fi access providers creates legal uncertainty and will cause a lot of actors, who may otherwise contribute to the goals of Digital India, not to do so. This is particularly true for community organisers and citizens, who may not have access to legal assistance and therefore may avoid contributing to the goals of the government.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.9.&lt;/strong&gt; Light touch regulation when it comes to both granting license to  public Wi-Fi access providers as well as authentication of retail users, however, are needed not only as an exceptional practice for such instances but as a general practice in case of entities offering public Wi-Fi services, either commercially or otherwise. Further, additional laxity in administrative responsibilities is needed to incentivise provision of free, that is non-commercial, public Wi-Fi networks.&lt;/p&gt;
&lt;h4&gt;Q4. What should be the regulatory guidelines on “unbundling” Wi-Fi at access and backhaul level?&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;3.10.&lt;/strong&gt; The Note refers to unbundling of activities related to provision of Wi-Fi but it does not define the term. It is neither explained which specific activities at access and backhaul levels must be considered for unbundling.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.11.&lt;/strong&gt; While unbundling should clearly be allowed and any regulatory hurdles to unbundling should be removed, any such decision must be taken with a focus on urgently addressing the stagnated growth in landline and backhaul, as identified in Section C.6.a of the Note. Relying only on spectrum intensive infrastructures, such as mobile base stations, for providing connectivity, creates a heavy regulatory burden for the TRAI, while simultaneously not ensuring optimal connectivity for business and private users. The CIS is concerned that the focus of the Note on standardising a government-mediated authentication and payment mechanism detracts attention from this urgent obstacle to the fulfillment of the Digital India plans of accelerated provision of broadband highways, universal access, and public, especially free, access to internet services.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.12.&lt;/strong&gt; From the example of European telecommunications legislations, implementation of policy measures to ensure that vertical integration between infrastructure (say, cables, switches, and hubs) providers and service (say, providing a subscriber with a household modem or a SIM card) providers in the telecommunications sector does not become a barrier to new market entrants has yielded much success in countries that have pursued it, like Sweden and Great Britain.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.13.&lt;/strong&gt; Further,  there should be no default assumption of bundling by the TRAI. In particular, the TRAI should consider reviewing all regulations that may cause bundling to occur when this is not necessary, and put in place in a monitoring mechanism for ensuring that bundled practises (especially in electronic networks, base station infrastructures, backhaul and similar) do not cause competitive problems or raise market entry barriers &lt;strong&gt;[9]&lt;/strong&gt;. In most EU countries, especially where the corporate structure of incumbent(s) is not highly vertically integrated, interconnection requirements for electronic network providers of wired networks in the backhaul or backbone (effectively price regulated interconnection), and a conscious effort to ensure that new market players can enter the field, have ensured a competitive telecommunications environment. TRAI may consider reviewing the European regulation on local loop unbundling (1999) and discussions on functional separation (especially by the British regulatory authority Ofcom), within an Indian context.&lt;/p&gt;
&lt;h4&gt;Q5. Whether reselling of bandwidth should be allowed to venue owners such as shop keepers through Wi-Fi at premise? In such a scenario please suggest the mechanism for security compliance.&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;3.14.&lt;/strong&gt; Yes. Venue owners should be allowed to provide public Wi-Fi service both on a commercial and non-commercial basis.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.15.&lt;/strong&gt; It is not clear from the Note and the question what type of security concerns the TRAI is seeking to address. In terms of payment security, the payment industry already has a large range of verification and testing mechanisms. The CIS objects to the mandatory introduction of the proposed payment system so as to ensure greater security for Wi-Fi access providers and the users.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.16.&lt;/strong&gt; As far as hardware-related security issues are concerned, it is again unclear why consumer equipment compliant with existing Wi-Fi standards would not be sufficiently secure in the Indian context. Wi-Fi has proven to be a sturdy technical standard, its adoption is high in multiple jurisdictions around the world, and it also enjoys great technical stability. Similar security assessments could easily be made for alternative wireless technologies, such as WiMaX.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.17.&lt;/strong&gt; The CIS foresees problems is in the allocation of risk and liability by law. The already existing legal obligation to verify the identity of each user, for instance, is likely to introduce a large administrative burden on potential Public Wi-Fi providers, which may lead to such potential providers abstaining from entering the market. Should the identification requirement be removed, however, other concerns pertaining to legal obligations may arise. These include liability for user activities on the web or on the internet (cf. copyright infringement, libel, hate speech). We propose a “safe harbour” mechanism in these cases, limiting the liability of the potential public Wi-Fi provider.&lt;/p&gt;
&lt;h4&gt;Q6. What should be the guidelines regarding sharing of costs and revenue across all entities in the public Wi-Fi value chain? Is regulatory intervention required or it should be left to forbearance and individual contracting?&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;3.18.&lt;/strong&gt; The market segments identified by the TRAI in Section F.18 of the Note should normally all be competitive markets themselves, and so do not require regulatory assistance in sharing of costs and revenues. The more elaborate the requirements imposed on each actor of each market segment identified by the TRAI in Section F.18, the more costly the roll-out of public Wi-Fi is going to be for the market actors. Such a cost is not avoided by price regulation.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.19.&lt;/strong&gt; The TRAI may instead consider introducing public funding for backhaul roll-out in remote areas, where the market is unlikely to engage in such roll-out on its own. Presently, some Indian states (such as Karnataka) are committing to public funding for wireless access in remote areas. The Union Government can assist such endeavours.&lt;/p&gt;
&lt;h2&gt;Endnotes&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;[1]&lt;/strong&gt; See: &lt;a href="http://cis-india.org/"&gt;http://cis-india.org/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[2]&lt;/strong&gt; See: &lt;a href="http://trai.gov.in/Content/ConDis/20801_0.aspx"&gt;http://trai.gov.in/Content/ConDis/20801_0.aspx&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[3]&lt;/strong&gt; See Section C.6 of the Note.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[4]&lt;/strong&gt; See: &lt;a href="http://trai.gov.in/Content/ConDis/20782_0.aspx"&gt;http://trai.gov.in/Content/ConDis/20782_0.aspx&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[5]&lt;/strong&gt; See: &lt;a href="http://cis-india.org/telecom/blog/cis-submission-to-trai-consultation-on-proliferation-of-broadband-through-public-wifi-networks"&gt;http://cis-india.org/telecom/blog/cis-submission-to-trai-consultation-on-proliferation-of-broadband-through-public-wifi-networks&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[6]&lt;/strong&gt; See Section E.11. of the Note.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[7]&lt;/strong&gt; See: &lt;a href="http://cis-india.org/telecom/blog/cis-submission-to-trai-consultation-on-proliferation-of-broadband-through-public-wifi-networks"&gt;http://cis-india.org/telecom/blog/cis-submission-to-trai-consultation-on-proliferation-of-broadband-through-public-wifi-networks&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[8]&lt;/strong&gt; See: &lt;a href="https://www.wi-fi.org/"&gt;https://www.wi-fi.org/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[9]&lt;/strong&gt; See: Monitoring bundled products in the telecommunications sector is also recommended by the OECD: &lt;a href="http://oecdinsights.org/2015/06/22/triple-and-quadruple-play-bundles-of-communication-services-towards-all-in-one-packages/"&gt;http://oecdinsights.org/2015/06/22/triple-and-quadruple-play-bundles-of-communication-services-towards-all-in-one-packages/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/telecom/blog/cis-submission-trai-note-on-interoperable-scalable-public-wifi'&gt;https://cis-india.org/telecom/blog/cis-submission-trai-note-on-interoperable-scalable-public-wifi&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Japreet Grewal, Pranesh Prakash, Sharath Chandra, Sumandro Chattapadhyay, Sunil Abraham, and Udbhav Tiwari, with expert comments from Amelia Andersdotter</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Payment</dc:subject>
    
    
        <dc:subject>Public Wireless Network</dc:subject>
    
    
        <dc:subject>TRAI</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>UID</dc:subject>
    

   <dc:date>2016-12-12T13:59:00Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/workshop-report-uidai-and-welfare-services-august-27-2016">
    <title>Workshop Report - UIDAI and Welfare Services: Exclusion and Countermeasures</title>
    <link>https://cis-india.org/internet-governance/blog/workshop-report-uidai-and-welfare-services-august-27-2016</link>
    <description>
        &lt;b&gt;This report presents summarised notes from a workshop organised by the Centre for Internet and Society (CIS) on Saturday, August 27, 2016, to discuss, raise awareness of, and devise countermeasures to exclusion due to implementation of UID-based verification for and distribution of welfare services.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Introduction&lt;/h2&gt;
&lt;p&gt;The Centre for Internet and Society  organised a workshop on "UIDAI and Welfare Services: Exclusion and Countermeasures" at the Institution of Agricultural on  Technologists on August 27 in Bangalore to discuss, raise awareness of, and devise countermeasures to exclusion due to implementation of UID-based verification for and distribution of welfare services &lt;strong&gt;[1]&lt;/strong&gt;. This was a follow-up to the workshop held in Delhi on “Understanding Aadhaar and its New Challenges” at the Centre for Studies in Science Policy, JNU on May 26th and 27th 2016 &lt;strong&gt;[2]&lt;/strong&gt;. In this report we summarise the key concerns raised and the case studies presented by the participants at the workshop held on August 27, 2016.&lt;/p&gt;
&lt;h2&gt;Implementation of the UID Project&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;Question of Consent:&lt;/strong&gt; The Aadhaar Act &lt;strong&gt;[3]&lt;/strong&gt; states that the consent of the individual must be taken at the time of enrollment and authentication  and it must be informed to him/her the purpose for which the data would be used. However, the Act does not provide for an opt-out mechanism  and  an individual is compelled to give consent to continue with the enrollment process or to complete an authentication.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Lack of Adherence to Court Orders:&lt;/strong&gt; Despite of several orders by Supreme Court stating that use of Aadhaar cannot be made mandatory for the purpose of availing benefits and services, multiple state governments and departments have made it mandatory for a wide range of purposes like booking railway tickets &lt;strong&gt;[4]&lt;/strong&gt;, linking below the poverty line ration cards with Aadhaar &lt;strong&gt;[5]&lt;/strong&gt;, school examinations &lt;strong&gt;[6]&lt;/strong&gt;, food security, pension and scholarship &lt;strong&gt;[7]&lt;/strong&gt;, to name a few.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Misleading Advertisements:&lt;/strong&gt; A concern was raised that individuals are being mislead in the necessity and purpose for enrollment into the project.  For example, people have been asked to enrol by telling them that they might get excluded from the system and cannot get services like passports,  banks, NREGA, salaries for government employees, denial of vaccinations, etc. Furthermore,  the Supreme Court has ordered Aadhaar not be mandatory, yet people are being told that documentation or record keeping cannot be done without UID number.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Hybrid Governance:&lt;/strong&gt; The participants pointed out that with the Aadhaar (Targeted delivery of financial and other subsidies, benefits and services) Act, 2016 (hereinafter referred to as Aadhaar Act, 2016 ) being partially enforced,  multiple examples of exclusion as reported in the news are demonstrating  how the Aadhaar project is creating a case of hybrid governance i.e private corporations playing a significant role in Governance. This can be seen in case of Aadhaar where we see many entities from private sector being involved in its implementation, as well as many software and hardware companies.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Lack of Transparency around Sharing of Biometric Data:&lt;/strong&gt; The fact how and why the Government is relying on biometrics for welfare schemes is unclear and not known. Also, there is no information on how biometric data that is collected through the project is being used and its ability as an authenticating device. Along with that, there is very little information on companies that have been enlisted to hold and manage data and perform authentication.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Possibility of Surveillance:&lt;/strong&gt; Multiple petitions and ongoing cases have raised concerns regarding  the possibility of surveillance, tracking, profiling, convergence of data, and the opaque involvement of private companies involved in the project.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Denial of Information:&lt;/strong&gt; In an RTI filed by one of the participant requesting to share the key contract for the project, it was refused on the grounds under section 8(1) (d) of the RTI Act, 2005. However, it was claimed that the provision would not be applicable since the contract was already awarded and any information disclosed to the Parliament should be disclosed to the citizens. The Central Information Commission issued a letter stating that the contractual obligation is over and a copy of the said agreement can be duly shared. However, it was discovered by the said participant that certain pages of the same were missing , which contained confidential information. When this issue went before appeal before the Information Commissioner, the IC gave an order to the IC in Delhi to comply with the previous order. However, it was communicated that limited financial information may be given, but not missing pages. Also, it was revealed that the UIDAI was supposed to share biometric data with NPR (by way of a MoU), but it has refused to give information since the intention was to discontinue NPR and wanted  only UIDAI to collect data.&lt;/p&gt;
&lt;h2&gt;Concerns Arising from the Report of the Comptroller and Auditor General of India (CAG) on Implementation of PAHAL (DBTL) Scheme&lt;/h2&gt;
&lt;p&gt;A presentation on the CAG compliance audit report of PAHAL on LPG &lt;strong&gt;[8]&lt;/strong&gt; revealed how the society was made to believe that UID will help deal with the issue of duplication and collection as well as use of biometric data will help. The report also revealed that multiple LPG connections have the same Aadhaar number or same bank account number in the consumer database maintained by the OMCs, the bank account number of consumers were also not accurately recorded,  scrutiny of the database revealed improper capture of Aadhaar numbers, and there was incorrect seeding of IFSC codes in consumer database. The participants felt that this was an example of how  schemes that are being introduced for social welfare  do not necessarily benefit the society, and on the contrary, has led to exclusion by design. For example, in the year 2011, by was of the The Liquefied Petroleum Gas (Regulation of Supply and Distribution) Amendment Order, 2011 &lt;strong&gt;[9]&lt;/strong&gt;, the Ministry of Petroleum and Natural Gas made the Unique Identification Number (UID) under the Aadhaar project a must for availing LPG refills. This received a lot of public pushback, which led to non-implementation of the order. In October 2012, despite the UIDAI stating that the number was voluntary, a number of services began requiring the provision of an Aadhaar number for accessing benefits. In September 2013, when the first order on Aadhaar was passed by court &lt;strong&gt;[10]&lt;/strong&gt;, oil marketing companies and UIDAI  approached the Supreme Court to change the same and allow them to make it mandatory, which was refused by the Court. Later in the year 2014, use of Aadhaar for subsidies was made mandatory.  The participants further criticised the  CAG report for revealing the manner in which linking Aadhaar with welfare schemes has allowed duplication and led to ghost beneficiaries where there is no information about who these people are who are receiving the benefits of the subsidies. For example, in Rajasthan, people are being denied their pension as they are being declared dead due to absence of information from the Aadhaar database.&lt;/p&gt;
&lt;p&gt;It was said that the statistics of duplication  mentioned in the report show how UIDAI (as it claims to ensure de-duplication of beneficiaries) is not required for this purpose and can be done without Aadhaar as well. Also, due to incorrect seeding of Aadhaar number many are being denied subsidy where there is no information regarding the number of people who have been denied the subsidy because of this.  Considering these important facts from the audit report, the discussants concluded how the statistics reflect inflated claims by UIDAI and how the problems which are said to be addressed by using Aadhaar can be dealt without it. In this context, it is important to understand how the data in the aadhaar database maybe wrong and in case of e-governance the citizens suffer. Also, the fact that loss of subsidy-not in cash, but in use of LPG cylinder - only for cooking, is ignored. In addition to that, there is no data or way to check if the cylinder is being used for commercial purposes or not as RTI from oil companies says that no ghost identities have been detected.&lt;/p&gt;
&lt;h2&gt;UID-linked Welfare Delivery in Rajasthan&lt;/h2&gt;
&lt;p&gt;One speaker presented findings on people's experiences with UID-linked welfare services in Rajasthan, collected through a 100 days trip organised to speak to people across the state on problems related to welfare governance. This visit revealed that people who need the benefits and access to subsidies most are often excluded from actual services. It was highlighted that the paperless system is proving to be highly dangerous. Some of the cases discussed included that of a disabled labourer, who was asked to get an aadhaar card, but during enrollment asked the person standing next to him to put all his  5 fingers for biometric data collection.  Due to this incorrect data, he is devoid of all subsidies since the authentication fails every time he goes to avail it. He stopped receiving his entitlements.  Though problems were anticipated, the misery of the people revealed the extent of the problems arising from the project. In another case, an  elderly woman living alone, since she could not go for Aadhaar authentication, had not been receiving the ration she is entitled to receive for the past 8 months. When the ration shop was approached to represent her case, the dealers said that they cannot provide her ration since they would require her thumb print for authentication. Later, they found out that on persuading the dealer to provide her with ration since Aadhaar is not mandatory, they found out that in their records they had actually mentioned that she was being given the ration, which was not the case. So the lack of awareness and the fact that people are entitled to receive the benefits irrespective of Aadhaar is something that is being misused by dealers. This shows how this system has become a barrier for the people, where they are also unaware about the grievance redressal mechanism.&lt;/p&gt;
&lt;h2&gt;Aadhaar and e-KYC&lt;/h2&gt;
&lt;p&gt;In this session, the use of Aadhaar for e-KYC verification was discussed The UID strategy document describes how the idea is to link UIDAI with money enabled Direct Benefit Transfer (DBT) to the beneficiaries without any reason or justification for the same. It was highlighted by one of the participants how the Reserve Bank of India (RBI) believed that making Aadhaar compulsory for e-KYC and several other banking services was a violation of the Money Laundering Act as well as its own rules and standards, however, later relaxed the rules to link Aadhaar with bank accounts and accepted its for e-KyC with great reluctance as the Department of Revenue thought otherwise. It was mentioned how allowing opening of bank accounts remotely using Aadhaar, without physically being present, was touted as a dangerous idea. However, the restrictions placed by RBI were suddenly done away with and opening bank accounts remotely was enabled via e-KYC.&lt;/p&gt;
&lt;p&gt;A speaker emphasised that with emerging FinTech services in India being tied with Aadhaar via India Stack, the following concerns are becoming critical:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;With RBI enabling creation of bank accounts remotely, it becomes difficult to to track who did e-KYC and which bank did it and hold the same accountable.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;The Aadhaar Act 2016 states that UIDAI will not track the queries made and will only keep a record of Yes/No for authentication. For example, the e-KYC to open a bank account can now be done with the help of an Aadhaar number and biometric authentication. However, this request does not get recorded and at the time of authentication, an individual is simply told whether the request has been matched or not by way of a Yes/No &lt;strong&gt;[11]&lt;/strong&gt;. Though UIDAI will maintain the authentication record, this may act as an obstacle since in case the information from the aadhaar database does not match, the person would not be able to open a bank account and would only receive a yes/no as a response to the request.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Further, there is a concern that the Aadhaar Enabled Payment System being implemented by the National Payment Corporation of India (NCPI) would allow effectively hiding of source and destination of money flow, leading to money laundering and cases of bribery. This possible as NCPI maintains a mapper where each bank account is linked (only the latest one). However, Aadhaar number can be linked with multiple bank accounts of an individual. So when a transaction is made, the mapper records the transaction only from that 1 account. But if another transaction takes place with another bank account, that record is not maintained by the mapper at NCPI since it records only transactions of the latest account seeded in that. This makes money laundering easy as the money moves from aadhaar number to aadhaar number now rather than bank account to bank account.&lt;/li&gt;&lt;/ol&gt;
&lt;h2&gt;Endnotes&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;[1]&lt;/strong&gt; See: &lt;a href="http://cis-india.org/internet-governance/events/uidai-and-welfare-services-exclusion-and-countermeasures-aug-27"&gt;http://cis-india.org/internet-governance/events/uidai-and-welfare-services-exclusion-and-countermeasures-aug-27&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[2]&lt;/strong&gt; See: &lt;a href="http://cis-india.org/internet-governance/blog/report-on-understanding-aadhaar-and-its-new-challenges"&gt;http://cis-india.org/internet-governance/blog/report-on-understanding-aadhaar-and-its-new-challenges&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[3]&lt;/strong&gt; See: &lt;a href="https://uidai.gov.in/beta/images/the_aadhaar_act_2016.pdf"&gt;https://uidai.gov.in/beta/images/the_aadhaar_act_2016.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[4]&lt;/strong&gt; See: &lt;a href="http://scroll.in/latest/816343/aadhaar-numbers-may-soon-be-compulsory-to-book-railway-tickets"&gt;http://scroll.in/latest/816343/aadhaar-numbers-may-soon-be-compulsory-to-book-railway-tickets&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[5]&lt;/strong&gt; See: &lt;a href="http://www.thehindu.com/news/national/karnataka/linking-bpl-ration-card-with-aadhaar-made-mandatory/article9094935.ece"&gt;http://www.thehindu.com/news/national/karnataka/linking-bpl-ration-card-with-aadhaar-made-mandatory/article9094935.ece&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[6]&lt;/strong&gt; See: &lt;a href="http://timesofindia.indiatimes.com/india/After-scam-Bihar-to-link-exams-to-Aadhaar/articleshow/54000108.cms"&gt;http://timesofindia.indiatimes.com/india/After-scam-Bihar-to-link-exams-to-Aadhaar/articleshow/54000108.cms&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[7]&lt;/strong&gt; See: &lt;a href="http://www.dailypioneer.com/state-editions/cs-calls-for-early-steps-to-link-aadhaar-to-ac.html"&gt;http://www.dailypioneer.com/state-editions/cs-calls-for-early-steps-to-link-aadhaar-to-ac.html&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[8]&lt;/strong&gt; See: &lt;a href="http://www.cag.gov.in/sites/default/files/audit_report_files/Union_Commercial_Compliance_Full_Report_25_2016_English.pdf"&gt;http://www.cag.gov.in/sites/default/files/audit_report_files/Union_Commercial_Compliance_Full_Report_25_2016_English.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[9]&lt;/strong&gt; See: &lt;a href="http://petroleum.nic.in/docs/lpg/LPG%20Control%20Order%20GSR%20718%20dated%2026.09.2011.pdf"&gt;http://petroleum.nic.in/docs/lpg/LPG%20Control%20Order%20GSR%20718%20dated%2026.09.2011.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[10]&lt;/strong&gt; See: &lt;a href="http://judis.nic.in/temp/494201232392013p.txt"&gt;http://judis.nic.in/temp/494201232392013p.txt&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[11]&lt;/strong&gt; Section 8(4) of the Aadhaar Act, 2016 states that "The Authority shall respond to an authentication query with a positive, negative or any other appropriate response sharing such identity information excluding any core biometric information."&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/workshop-report-uidai-and-welfare-services-august-27-2016'&gt;https://cis-india.org/internet-governance/blog/workshop-report-uidai-and-welfare-services-august-27-2016&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vanya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Payment</dc:subject>
    
    
        <dc:subject>Data Systems</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Welfare Governance</dc:subject>
    
    
        <dc:subject>Big Data for Development</dc:subject>
    
    
        <dc:subject>Digital ID</dc:subject>
    

   <dc:date>2019-03-16T04:34:11Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/right-to-food-campaign-ranchi-convention-2016">
    <title>Right to Food Campaign, Ranchi Convention, 2016</title>
    <link>https://cis-india.org/internet-governance/news/right-to-food-campaign-ranchi-convention-2016</link>
    <description>
        &lt;b&gt;The Right to Food Campaign held its 2016 Convention in Ranchi during September 23-25, 2016. While three years have elapsed since the passage of the National Food Security Act, despite improvements in the Public Distribution System (PDS), large implementation gaps remain. This is what the Convention focused on, and gathered researchers and campaigners from across the country to share experiences and case studies on effectiveness and exclusions from the PDS. Sumandro Chattapadhyay took part in a session of the Convention to discuss how UID-linked welfare delivery is being rolled out across key programmes like provision of pension and rationed distribution of essential commodities, and their impact on people's right to welfare services.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Right to Food Campaign: &lt;a href="http://www.righttofoodcampaign.in/"&gt;Website&lt;/a&gt;.&lt;/h4&gt;
&lt;h4&gt;Right to Food Campaign: &lt;a href="https://docs.google.com/viewer?a=v&amp;amp;pid=sites&amp;amp;srcid=ZGVmYXVsdGRvbWFpbnxoYXFyb3ppcm90aXxneDo3MmQ3MTMyZjU2N2FjOGU"&gt;Cash Transfers and UID: Our Main Demands&lt;/a&gt;.&lt;/h4&gt;
&lt;h4&gt;Ranchi Convention, 2016: &lt;a href="https://docs.google.com/document/d/110_asJ1t14IWALbhWN1RjDiOV8WE-fIK2xJC5Yltyc4/edit"&gt;Programme&lt;/a&gt;.&lt;/h4&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/right-to-food-campaign-ranchi-convention-2016'&gt;https://cis-india.org/internet-governance/news/right-to-food-campaign-ranchi-convention-2016&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Data Systems</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Welfare Governance</dc:subject>
    
    
        <dc:subject>Biometrics</dc:subject>
    
    
        <dc:subject>Big Data for Development</dc:subject>
    
    
        <dc:subject>UID</dc:subject>
    

   <dc:date>2019-03-16T04:40:52Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/scroll-m-rajshekhar-how-private-companies-are-using-aadhaar-to-deliver-better-services-but-theres-a-catch">
    <title>How private companies are using Aadhaar to try to deliver better services (but there's a catch)</title>
    <link>https://cis-india.org/internet-governance/news/scroll-m-rajshekhar-how-private-companies-are-using-aadhaar-to-deliver-better-services-but-theres-a-catch</link>
    <description>
        &lt;b&gt;They are gathering more information on you.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;section class="columns large-6 normal-article-content scroll-article-content article-content"&gt;
&lt;div class="article-body"&gt;
&lt;p&gt;The article by M. Rajshekhar was &lt;a class="external-link" href="http://scroll.in/bulletins/40/delays-in-indias-infrastructure-projects-has-a-large-impact-on-key-social-indicators"&gt;published in Scroll.in&lt;/a&gt; on December 22, 2016. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;In  2006, Ajay Trehan set up AuthBridge, a background verification company  in Gurgaon. That was a time when business process outsourcing was  booming. Global companies like Citibank were relocating back-office  functions to India. Outfits like AuthBridge sprang up in response to  help these companies find qualified staffers. They vetted applicants by  running identity checks, verifying education and employment records,  doing reference checks and more.&lt;/p&gt;
&lt;p&gt;Ten years later, AuthBridge’s  client profile has changed. With rising insecurity over crimes in  India’s cities, like the December 2012 gangrape in Delhi, or the rape of  a young woman in an Uber taxi in 2014, local companies – sizeably from  e-commerce and businesses with delivery services – have also started  vetting employees and partners to check if they have any criminal  history.  “Now, we have about 700-800 clients,” said Trehan. “Of them,  just 20%-30% are foreign companies.”&lt;/p&gt;
&lt;p&gt;AuthBridge’s verification  process has changed too. Earlier, its employees used to physically  verify the credentials of an applicant by travelling to her school or  college, meeting her previous employer, vetting her identity papers with  the government department that issued them, and so on.&lt;/p&gt;
&lt;p&gt;Now they simply run a query on an electronic database.&lt;/p&gt;
&lt;h3 class="cms-block-heading cms-block"&gt;&lt;b&gt;Aadhaar enters the private sector&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;Aadhaar,  as India’s Unique Identity Project is called, aims to give a 12-digit  unique identity number to all residents by collecting their fingerprint  and iris scans. As of September, its database, maintained by the Unique  Identity Authority of India, held the names, addresses and biometric  information of more than 105 crore people.&lt;/p&gt;
&lt;p&gt;The project was created  by the United Progressive Alliance government in 2009 to reduce  leakages in the country’s welfare programmes.&lt;/p&gt;
&lt;p&gt;But, quietly, a  range of private sector companies have started using it. This includes  verification firms like Authbridge, banks like HDFC, telecommunications  companies like Reliance Jio, among others.&lt;/p&gt;
&lt;p&gt;So far, most  discussions on Aadhaar have focused on its utility for welfare delivery  and the risk of government surveillance. But as private sector companies  incorporate Aadhaar into their systems, fresh questions and concerns  are emerging about what this means. A recent tweet by a journalist that  went viral encapsulated these concerns.&lt;/p&gt;
&lt;figure class="cms-block-embed-twitter cms-block-embed cms-block"&gt; &lt;/figure&gt;
&lt;p&gt;To understand the rewards and risks of the use of Aadhaar by  private companies, here is a detailed look at how they are using it.&lt;/p&gt;
&lt;h3 class="cms-block-heading cms-block"&gt;&lt;b&gt;Five ways of using Aadhaar&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;The first way in which companies are using Aadhaar is &lt;b&gt;pure authentication. &lt;/b&gt;This  is how Authbridge uses Aadhaar. It sends a name and Aadhaar number to  the Unique Identity Authority’s server, which responds to say whether  they have matched.&lt;/p&gt;
&lt;p&gt;Apart from background verification companies,  Aadhaar-based authentication can also be used by employers. “A factory  hiring women or a security agency hiring guards and wanting to be sure  these people are who they claim to be,” said Pramod Varma, the chief  architect and technology advisor for the Aadhaar project.&lt;/p&gt;
&lt;p&gt;It could  also be used by regulated entities with strong Know Your Customer or  KYC norms like banks or telecommunications companies. In the old days of  branch-based banking, KYC was not a problem, said Varma, since “the  bank manager knew all his customers”. But now, KYC is much harder since  banks have moved to “core banking with millions of accounts in the  server”. Instant Aadhaar-authentication, he said, is useful for  verifying customers.&lt;/p&gt;
&lt;p&gt;The second is &lt;b&gt;authentication plus&lt;/b&gt;.  Here, at the time of authentication, a company also downloads the  customer’s data from the Aadhaar database. This is what companies like  Reliance Jio are doing.&lt;/p&gt;
&lt;p&gt;When a customer provides his Aadhaar  number to the company, the company not only runs a query on the Aadhaar  database to verify the name and number, it also downloads other  information about the customer held on the server, like address, date of  birth and gender.&lt;/p&gt;
&lt;p&gt;This data can be used to electronically fill  out the Know Your Customer forms, replacing what is right now a manual  process, said Anupam Varghese, the head (products) of Eko India  Financial Services, a financial services startup in the phone banking  and remittances segment.&lt;/p&gt;
&lt;p&gt;It is a disruptive proposition that  companies find useful. In India, the cost of enrolling customers is so  high, said Abhishek Sinha, the founder of Eko, that it prices a set of  financial products beyond the reach of most Indians. “Authenticating a  credit card customer and vetting her identity papers will cost anywhere  between Rs 150-Rs 200,” he said. A company can recover that investment  only if the customer racks up at least Rs 10,000 on the card, assuming a  2% margin on card transactions.&lt;/p&gt;
&lt;p&gt;With its instant authentication  and automatic form filling, Aadhaar-based electronic Know Your Customer,  said Sinha, slashes those costs and makes it easier for companies to  offer financial products which become viable even with a smaller volume  of transactions. This allows the growth of financial products for less  affluent customer segments.&lt;/p&gt;
&lt;p&gt;Subsequently, these companies might pad up those databases by adding their own data. This is a third model of using Aadhaar: &lt;b&gt;authentication plus private database&lt;/b&gt;.&lt;/p&gt;
&lt;p&gt;For instance, &lt;a href="http://scroll.in/article/805467/how-the-government-gains-when-private-companies-use-aadhaar"&gt;TrustID&lt;/a&gt;,  a mobile app which claims it can verify “your maid, driver,  electrician, tutor, tenant and all service professionals” using Aadhaar,  wants users to rate the services of the people they eventually employ.  In effect, it is &lt;a href="http://scroll.in/article/805467/how-the-government-gains-when-private-companies-use-aadhaar"&gt;creating&lt;/a&gt; a private database.&lt;/p&gt;
&lt;p&gt;Others, like Eko, are adding financial transaction histories to the Aadhaar data.&lt;/p&gt;
&lt;p&gt;While these three uses are built around Aadhaar-based authentication, the remaining three uses – &lt;b&gt;database sharing, data broking, &lt;/b&gt;&lt;b&gt;deduplication&lt;/b&gt;&lt;b&gt; &lt;/b&gt;– pivot around use of just the Aadhaar number. They are based on recent changes in how companies use customer data.&lt;/p&gt;
&lt;h3 class="cms-block-heading cms-block"&gt;&lt;b&gt;The customer data boom&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;Customer data has acquired centrality for several Indian companies, particularly startups in e-commerce and financial services.&lt;/p&gt;
&lt;p&gt;In  some sectors, Varma said, “the cost of switching [between rival  companies] is very low,” which heightens the need for customisation.  “The better you can serve, they more sticky you get for a customer.” In  other sectors, said Varghese, competition chips away at margins. Which  is another reason to try and come up with better services and products.&lt;/p&gt;
&lt;p&gt;This is where data can help.&lt;/p&gt;
&lt;p&gt;In  a conversation in October, Nandan Nilekani, software entrepreneur and  the first chairperson of the Unique Identity Authority of India,  explained why. “Companies like Ola compete with global companies like  Uber which have a tremendous advantage in that they have more data –  more customers globally – and better algorithms,” he said. If Ola has 5  million customers, Uber has 100 million. Which means Uber’s algorithms –  thanks to pattern recognition and machine learning – will be more  accurate.&lt;/p&gt;
&lt;p&gt;For all these reasons, said Varma, companies in a  handful of business verticals are trying to create “a 360 degree view of  their customer”.&lt;/p&gt;
&lt;p&gt;What has enabled this is a couple of  technological trends. The ability to store and process data, said  Nilekani, has gone up enormously in the last 15 years. At the same time,  data itself has proliferated as electronic devices like mobile phones  create records of voice, photos, messages and the locations of  customers.&lt;/p&gt;
&lt;p&gt;“All this is realtime data. So, on scale, speed and frequency, we have seen a jump,” said Nilekani.&lt;/p&gt;
&lt;p&gt;This rising appetite for data is resulting in a couple of novel outcomes.&lt;/p&gt;
&lt;h3 class="cms-block-heading cms-block"&gt;&lt;b&gt;Enter, the sharing of customer data&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;Indian companies have begun sharing databases.&lt;/p&gt;
&lt;p&gt;A  good example is an experimental partnership between Eko, the banking  and remittances company, and Capital Float, a financial services startup  which gives short term loans.&lt;/p&gt;
&lt;p&gt;The two companies worked out an  arrangement where Eko shared a part of its database about its  distributors with Capital Float. This shared information contained  aggregated and anonymised information on distributors and their working  capital positions, said Varghese. Capital Float evaluated the database  and came back with a list of distributors it could lend to. Eko, then,  forwarded these offers to the distributors. After taking their consent,  data about the distributors who were interested in the loans was shared  with Capital Float.&lt;/p&gt;
&lt;p&gt;On the surface, this is a counter-intuitive  development: if customer data holds the key to competitive advantage,  companies should closely safeguard their data.&lt;/p&gt;
&lt;p&gt;But as it turns out, there are strong reasons to share data.&lt;/p&gt;
&lt;p&gt;Both  Eko and Capital Float, for instance, are small, specialised players in  the financial services market which is dominated by banks. Data sharing  is one way to compete with banks by offering complementary services to  customers.&lt;/p&gt;
&lt;p&gt;It is not clear how endemic data-sharing will get.  According to Varma, it will be used selectively. “I cannot see  organisations sharing databases at will,” he said. “They will be shared  only if they can be used to offer an additional service to the client.”&lt;/p&gt;
&lt;p&gt;But a programmer who works at iSpirt, a product software evangelising association&lt;b&gt; &lt;/b&gt;based  in Bangalore, and who did not want to be identified, said the trend  will grow. In the financial sector, as new players like mobile wallet  companies acquire more customers, banks that refuse to share data will  miss out on emergent markets, he said. “Keeping everything behind closed  doors – not participating in data exchanges – is now harmful,” he said.&lt;/p&gt;
&lt;p&gt;Sunil Abraham, who heads the Centre For Internet and Society,  foresees the rise of another kind of data-sharing – by companies that  aggregate customer data from multiple sources and market that to  clients. These could be data brokers like US-based Acziom, he said.  These could also be more specialised firms like medical transcription  companies, which simultaneously serve hospitals, insurance and  pharmaceutical companies.&lt;/p&gt;
&lt;p&gt;The question is: what does all this have to do with Aadhaar?&lt;/p&gt;
&lt;h3 class="cms-block-heading cms-block"&gt;&lt;b&gt;The utility of Aadhaar&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;Aadhaar makes it easier to &lt;b&gt;compare and combine diverse databases.&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;This is what India’s microfinance companies are doing. As &lt;i&gt;Scroll.in&lt;/i&gt; reported &lt;a href="http://scroll.in/article/817366/despite-the-supreme-court-you-need-aadhaar-to-get-a-loan-from-microfinance-companies"&gt;recently&lt;/a&gt;,  Microfinance Institutions Network, an association of microlenders, has  told its member companies to seed the Aadhaar numbers of their borrowers  into their databases. By searching the databases for the Aadhaar number  of a prospective borrower, it will be possible to identify if she has  already taken too many loans.&lt;/p&gt;
&lt;p&gt;This is a scenario Nilekani bristles  at. “You do not need Aadhaar for that,” he said. “You can triangulate  databases using email or phone number or name.”&lt;/p&gt;
&lt;p&gt;But the iSpirt  programmer said, “With Aadhaar, the level of certainty is higher than  what you would get by using name, phone number or email.” Between  databases, the spelling of names might vary. Phone numbers change,  especially in a country like India where prepaid mobile connections  outnumber postpaid connections. Only a small part of the country’s  population uses email. With Aadhaar, said the programmer, it gets easier  to correlate databases.&lt;/p&gt;
&lt;p&gt;Aadhaar, added Varma, can also be used  to clean up databases. Banks, he said, can use the Aadhaar number to  create better customer profiles by identifying all accounts owned by a  person. This is the fifth use – &lt;b&gt;deduplication&lt;/b&gt;&lt;b&gt;. &lt;/b&gt;&lt;/p&gt;
&lt;h3 class="cms-block-heading cms-block"&gt;&lt;b&gt;What it all means&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;The  implications are obvious. A lot of companies already had databases  about their customers. Now, as Nilekani said, technology is allowing the  collection of ever greater amounts of information about us. The sharing  of databases means companies will have ever more detailed customer  profiles.&lt;/p&gt;
&lt;p&gt;In a sense, we are entering a future where multiple  databases – including several that we are not even aware of – will  contain information about us. A hospital and an insurance company might  share their records. Or intermediary companies, which service both of  them, might create their own databases.&lt;/p&gt;
&lt;p&gt;This information will  materially affect our lives. As already happens online, companies will  increasingly base their products on algorithms that parse data about our  behaviour and then offer a customised price – which could be geared to  serve or exploit us.&lt;/p&gt;
&lt;p&gt;These algorithms, as &lt;i&gt;Propublica&lt;/i&gt; &lt;a class="link-external" href="https://www.propublica.org/series/machine-bias" rel="nofollow" target="_blank"&gt;reported&lt;/a&gt;, can be &lt;a class="link-external" href="https://www.propublica.org/series/machine-bias" rel="nofollow" target="_blank"&gt;opaque&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;In  a sense, much of this is a familiar trajectory. The United States too,  as the iSpirt programmer said, “saw a lot of irresponsible data sharing  without enough control for civilians”.&lt;/p&gt;
&lt;p&gt;That is where India is heading as well. As &lt;i&gt;Scroll &lt;/i&gt;noted in its &lt;a href="http://scroll.in/article/805467/how-the-government-gains-when-private-companies-use-aadhaar"&gt;article&lt;/a&gt; about TrustID, when the company creates scores for the workers who use  its app, they might not always be aware of that rating – or be in a  position to challenge that rating.&lt;/p&gt;
&lt;p&gt;There are large questions here.  Who owns the data about you in a company’s database? Take your  information in, say, Ola’s database – the address from where you get  picked up or dropped, the phone number, the places you visit most often.  Is the data owned by you, Ola or the driver? Should you have a say if a  company wants to share this data? If you grant permission, how does one  ensure it is used correctly?&lt;/p&gt;
&lt;p&gt;Right now, as the next story in this series will show, this is a poorly regulated landscape.&lt;/p&gt;
&lt;p&gt;&lt;i&gt;This is the third part in a series on the expansion of Aadhaar and the concerns around it. The first two parts can be read &lt;a href="http://scroll.in/tags/38792/identity-project"&gt;here.&lt;/a&gt;&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;i class="mail-us-section"&gt;We welcome your comments at &lt;a href="mailto:?Subject=How%20private%20companies%20are%20using%20Aadhaar%20to%20try%20to%20deliver%20better%20services%20%28but%20there%27s%20a%20catch%29&amp;amp;to=letters@scroll.in" target="_blank"&gt;letters@scroll.in.&lt;/a&gt;&lt;/i&gt; 
&lt;ul class="article-tags-list"&gt;
&lt;/ul&gt;
&lt;/section&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/scroll-m-rajshekhar-how-private-companies-are-using-aadhaar-to-deliver-better-services-but-theres-a-catch'&gt;https://cis-india.org/internet-governance/news/scroll-m-rajshekhar-how-private-companies-are-using-aadhaar-to-deliver-better-services-but-theres-a-catch&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-12-23T02:04:59Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comments-on-the-report-of-the-committee-on-digital-payments-dec-2016">
    <title>Comments on  the Report of the Committee on Digital Payments (December 2016)</title>
    <link>https://cis-india.org/internet-governance/blog/comments-on-the-report-of-the-committee-on-digital-payments-dec-2016</link>
    <description>
        &lt;b&gt;The Committee on Digital Payments constituted by the Ministry of Finance and chaired by Ratan P. Watal, Principal Advisor, NITI Aayog, submitted its report on the "Medium Term Recommendations to Strengthen Digital Payments Ecosystem" on December 09, 2016. The report was made public on December 27, and comments were sought from the general public. Here are the comments submitted by the Centre for Internet and Society.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;1. Preliminary&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;1.1.&lt;/strong&gt; This submission presents comments by the Centre for Internet and Society (“CIS”) &lt;strong&gt;[1]&lt;/strong&gt; in response to the report of the Committee on Digital Payments, chaired by Mr. Ratan P. Watal, Principal Advisor, NITI Aayog, and constituted by the Ministry of Finance, Government of India (“the report”) &lt;strong&gt;[2]&lt;/strong&gt;.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;2. The Centre for Internet and Society&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;2.1.&lt;/strong&gt; The Centre for Internet and Society, CIS, is a non-profit organisation that undertakes interdisciplinary research on internet and digital technologies from policy and academic perspectives. The areas of focus include digital accessibility for persons with diverse abilities, access to knowledge, intellectual property rights, openness (including open data, free and open source software, open standards, and open access), internet governance, telecommunication reform, digital privacy, and cyber-security.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;2.2.&lt;/strong&gt; CIS is not an expert organisation in the domain of banking in general and payments in particular. Our expertise is in matters of internet and communication governance, data privacy and security, and technology regulation. We deeply appreciate and are most inspired by the Ministry of Finance’s decision to invite entities from both the sectors of finance and information technology. This submission is consistent with CIS’ commitment to safeguarding general public interest, and the interests and rights of various stakeholders involved, especially the citizens and the users. CIS is thankful to the Ministry of Finance for this opportunity to provide a general response on the report.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;3. Comments&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.1.&lt;/strong&gt; CIS observes that the decision by the Government of India to withdraw the legal tender character of the old high denomination banknotes (that is, Rs. 500 Rs. 1,000 notes), declared on November 08, 2016 &lt;strong&gt;[3]&lt;/strong&gt;, have generated &lt;strong&gt;unprecedented data about the user base and transaction patterns of digital payments systems in India, when pushed to its extreme use due to the circumstances&lt;/strong&gt;. The majority of this data is available with the National Payments Corporation of India and the Reserve Bank of India. CIS requests the authorities concerned to consider &lt;strong&gt;opening up this data for analysis and discussion by public at large and experts in particular, before any specific policy and regulatory decisions are taken&lt;/strong&gt; towards advancing digital payments proliferation in India. This is a crucial opportunity for the Ministry of Finance to embrace (open) data-driven regulation and policy-making.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.2.&lt;/strong&gt; While the report makes a reference to the European General Data Protection Directive, it does not make a reference to any substantive provisions in the Directive which may be relevant to digital payments. Aside from the recommendation that privacy protections around the purpose limitation principle be relaxed to ensure that payment service providers be allowed to process data to improve fraud monitoring and anti-money laundering services, the report is silent on significant privacy and data protection concerns posed by digital payments services. &lt;strong&gt;CIS strongly warns that the existing data protection and security regulations under Information Technology (Reasonable security practices and procedures and sensitive personal data or information), Rules are woefully inadequate in their scope and application to effectively deal with potential privacy concerns posed by digital payments applications and services.&lt;/strong&gt; Some key privacy issues that must be addressed either under a comprehensive data protection legislation or a sector specific financial regulation are listed below. The process of obtaining consent must be specific, informed and unambiguous and through a clear affirmative action by the data subject based upon a genuine choice provided along with an option to opt out at any stage. The data subjects should have clear and easily enforceable right to access and correct their data. Further, data subjects should have the right to restrict the usage of their data in circumstances such as inaccuracy of data, unlawful purpose and data no longer required in order to fulfill the original purpose.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.3.&lt;/strong&gt; The initial recommendation of the report is to “[m]ake regulation of payments independent from the function of central banking” (page 22). This involves a fundamental transformation of the payment and settlement system in India and its regulation. &lt;strong&gt;We submit that a decision regarding transformation of such scale and implications is taken after a more comprehensive policy discussion, especially involving a wider range of stakeholders&lt;/strong&gt;. The report itself notes that “[d]igital payments also have the potential of becoming a gateway to other financial services such as credit facilities for small businesses and low-income households” (page 32). Thus, a clear functional, and hence regulatory, separation between the (digital) payments industry and the lending/borrowing industry may be either effective or desirable. Global experience tells us that digital transactions data, along with other alternative data, are fast becoming the basis of provision of financial and other services, by both banking and non-banking (payments) companies. We appeal to the Ministry of Finance to adopt a comprehensive and concerted approach to regulating, enabling competition, and upholding consumers’ rights in the banking sector at large.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.4.&lt;/strong&gt; The report recognises “banking as an activity is separate from payments, which is more of a technology business” (page 154). Contemporary banking and payment businesses are both are primarily technology businesses where information technology particularly is deployed intimately to extract, process, and drive asset management decisions using financial transaction data. Further, with payment businesses (such as, pre-paid instruments) offering return on deposited money via other means (such as, cashbacks), and potentially competing and/or collaborating with established banks to use financial transaction data to drive lending decisions, including but not limited to micro-loans, it appears unproductive to create a separation between banking as an activity and payments as an activity merely in terms of the respective technology intensity of these sectors. &lt;strong&gt;CIS firmly recommends that regulation of these financial services and activities be undertaken in a technology-agnostic manner, and similar regulatory regimes be deployed on those entities offering similar services irrespective of their technology intensity or choice&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.5.&lt;/strong&gt; The report highlights two major shortcomings of the current regulatory regime for payments. Firstly “the law does not impose any obligation on the regulator to promote competition and innovation in the payments market” (page 153). It appears to us that the regulator’s role should not be to promote market expansion and innovation but to ensure and oversee competition. &lt;strong&gt;We believe that the current regulator should focus on regulating the existing market, and the work of the expansion of the digital payments market in particular and the digital financial services market in general be carried out by another government agency, as it creates conflict of interest for the regulator otherwise.&lt;/strong&gt; Secondly, the report mentions that Payment and Settlement Systems Act does not “focus the regulatory attention on the need for consumer protection in digital payments” and then it notes that a “provision was inserted to protect funds collected from customers” in 2015 (page 153). &lt;strong&gt;This indicates that the regulator already has the responsibility to ensure consumer protection in digital payments. The purview and modalities of how this function of course needs discussion and changes with the growth in digital payments&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.6.&lt;/strong&gt; The report identifies the high cost of cash as a key reason for the government’s policy push towards digital payments. Further, it mentions that a “sample survey conducted in 2014 across urban and rural neighbourhoods in Delhi and Meerut, shows that despite being keenly aware of the costs associated with transacting in cash, most consumers see three main benefits of cash, viz. freedom of negotiations, faster settlements, and ensuring exact payments” (page 30). It further notes that “[d]igital payments have significant dependencies upon power and telecommunications infrastructure. Therefore, the roll out of robust and user friendly digital payments solutions to unelectrified areas/areas without telecommunications network coverage, remains a challenge.” &lt;strong&gt;CIS much appreciates the discussion of the barriers to universal adoption and rollout of digital payments in the report, and appeals to the Ministry of Finance to undertake a more comprehensive study of the key investments required by the Government of India to ensure that digital payments become ubiquitously viable as well as satisfy the demands of a vast range of consumers that India has&lt;/strong&gt;. The estimates about investment required to create a robust digital payment infrastructure, cited in the report, provide a great basis for undertaking studies such as these.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.7.&lt;/strong&gt; CIS is very encouraged to see the report highlighting that “[w]ith the rising number of users of digital payment services, it is absolutely necessary to develop consumer confidence on digital payments. Therefore, it is essential to have legislative safeguards to protect such consumers in-built into the primary law.” &lt;strong&gt;We second this recommendation and would like to add further that financial transaction data is governed under a common data protection and privacy regime, without making any differences between data collected by banking and non-banking entities&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.8.&lt;/strong&gt; We are, however, very discouraged to see the overtly incorrect use of the word “Open Access” in this report in the context of a payment system disallowing service when the client wants to transact money with a specific entity &lt;strong&gt;[4]&lt;/strong&gt;. This is not an uncommon anti-competitive measure adopted by various platform players and services providers so as to disallow users from using competing products (such as, not allowing competing apps in the app store controlled by one software company). &lt;strong&gt;The term “Open Access” is not only the appropriate word to describe the negation of such anti-competitive behaviour, its usage in this context undermines its accepted meaning and creates confusion regarding the recommendation being proposed by the report.&lt;/strong&gt; The closest analogy to the recommendation of the report would perhaps be with the principle of “network neutrality” that stands for the network provider not discriminating between data packets being processed by them, either in terms of price or speed.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.9.&lt;/strong&gt; A major recommendation by the report involves creation of “a fund from savings generated from cash-less transactions … by the Central Government,” which will use “the trinity of JAM (Jan Dhan, Adhaar, Mobile) [to] link financial inclusion with social protection, contributing to improved Social and Financial Security and Inclusion of vulnerable groups/ communities” (page 160-161). &lt;strong&gt;This amounts to making Aadhaar a mandatory ID for financial inclusion of citizens, especially the marginal and vulnerable ones, and is in direct contradiction to the government’s statements regarding the optional nature of the Aadhaar ID, as well as the orders by the Supreme Court on this topic&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.10.&lt;/strong&gt; The report recommends that “Aadhaar should be made the primary identification for KYC with the option of using other IDs for people who have not yet obtained Aadhaar” (page 163) and further that “Aadhaar eKYC and eSign should be a replacement for paper based, costly, and shared central KYC registries” (page 162). &lt;strong&gt;Not only these measures would imply making Aadhaar a mandatory ID for undertaking any legal activity in the country, they assume that the UIDAI has verified and audited the personal documents submitted by Aadhaar number holders during enrollment.&lt;/strong&gt; A mandate for &lt;em&gt;replacement&lt;/em&gt; of the paper-based central KYC agencies will only remove a much needed redundancy in the the identity verification infrastructure of the government.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.11.&lt;/strong&gt; The report suggests that “[t]ransactions which are permitted in cash without KYC should also be permitted on prepaid wallets without KYC” (page 164-165). This seems to negate the reality that physical verification of a person remains one of the most authoritative identity verification process for a natural person, apart from DNA testing perhaps. &lt;strong&gt;Thus, establishing full equivalency of procedure between a presence-less transaction and one involving a physically present person making the payment will only amount to removal of relatively greater security precautions for the former, and will lead to possibilities of fraud&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.12.&lt;/strong&gt; In continuation with the previous point, the report recommends promotion of “Aadhaar based KYC where PAN has not been obtained” and making of “quoting Aadhaar compulsory in income tax return for natural persons” (page 163). Both these measures imply a replacement of the PAN by Aadhaar in the long term, and a sharp reduction in growth of new PAN holders in the short term. &lt;strong&gt;We appeal for this recommendation to be reconsidered as integration of all functionally separate national critical information infrastructures (such as PAN and Aadhaar) into a single unified and centralised system (such as Aadhaar) engenders massive  national and personal security threats&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.13.&lt;/strong&gt; The report suggest the establishment of “a ranking and reward framework” to recognise and encourage for the best performing state/district/agency in the proliferation of digital payments. &lt;strong&gt;It appears to us that creation of such a framework will only lead to making of an environment of competition among these entities concerned, which apart from its benefits may also have its costs. For example, the incentivisation of quick rollout of digital payment avenues by state government and various government agencies may lead to implementation without sufficient planning, coordination with stakeholders, and precautions regarding data security and privacy&lt;/strong&gt;. The provision of central support for digital payments should be carried out in an environment of cooperation and not competition.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.14.&lt;/strong&gt; CIS welcomes the recommendation by the report to generate greater awareness about cost of cash, including by ensuring that “large merchants including government agencies should account and disclose the cost of cash collection and cash payments incurred by them periodically” (page 164). It, however, is not clear to whom such periodic disclosures should be made. &lt;strong&gt;We would like to add here that the awareness building must simultaneously focus on making public how different entities shoulder these costs. Further, for reasons of comparison and evidence-driven policy making, it is necessary that data for equivalent variables are also made open for digital payments - the total and disaggregate cost, and what proportion of these costs are shouldered by which entities&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.15.&lt;/strong&gt; The report acknowledges that “[t]oday, most merchants do not accept digital payments” and it goes on to recommend “that the Government should seize the initiative and require all government agencies and merchants where contracts are awarded by the government to provide at-least one suitable digital payment option to its consumers and vendors” (page 165). This requirement for offering digital payment option will only introduce an additional economic barrier for merchants bidding for government contracts. &lt;strong&gt;We appeal to the Ministry of Finance to reconsider this approach of raising the costs of non-digital payments to incentivise proliferation of digital payments, and instead lower the existing economic and other barriers to digital payments that keep the merchants away&lt;/strong&gt;. The adoption of digital payments must not lead to increasing costs for merchants and end-users, but must decrease the same instead.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.16.&lt;/strong&gt; As the report was submitted on December 09, 2016, and was made public only on December 27, 2016, &lt;strong&gt;it would have been much appreciated if at least a month-long window was provided to study and comment on the report, instead of fifteen days&lt;/strong&gt;. This is especially crucial as the recently implemented demonetisation and the subsequent banking and fiscal policy decisions taken by the government have rapidly transformed the state and dynamics of the payments system landscape in India in general, and digital payments in particular.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Endnotes&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;[1]&lt;/strong&gt; See: &lt;a href="http://cis-india.org/"&gt;http://cis-india.org/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[2]&lt;/strong&gt; See: &lt;a href="http://finmin.nic.in/reports/Note-watal-report.pdf"&gt;http://finmin.nic.in/reports/Note-watal-report.pdf&lt;/a&gt; and &lt;a href="http://finmin.nic.in/reports/watal_report271216.pdf"&gt;http://finmin.nic.in/reports/watal_report271216.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[3]&lt;/strong&gt; See: &lt;a href="http://finmin.nic.in/cancellation_high_denomination_notes.pdf"&gt;http://finmin.nic.in/cancellation_high_denomination_notes.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[4]&lt;/strong&gt; Open Access refers to “free and unrestricted online availability” of scientific and non-scientific literature. See: &lt;a href="http://www.budapestopenaccessinitiative.org/read"&gt;http://www.budapestopenaccessinitiative.org/read&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comments-on-the-report-of-the-committee-on-digital-payments-dec-2016'&gt;https://cis-india.org/internet-governance/blog/comments-on-the-report-of-the-committee-on-digital-payments-dec-2016&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Sumandro Chattapadhyay and Amber Sinha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Digital ID</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Digital Economy</dc:subject>
    
    
        <dc:subject>Digital Access</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Digital Security</dc:subject>
    
    
        <dc:subject>Data Revolution</dc:subject>
    
    
        <dc:subject>Digital Payment</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital India</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Demonetisation</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    

   <dc:date>2017-01-12T12:32:22Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/economic-times-indulekha-aravind-january-15-2017-the-soon-to-be-launched-aadhaar-pay-will-let-you-make-purchases-using-your-fingerprint">
    <title>The soon-to-be launched Aadhaar Pay will let you make purchases using your fingerprint</title>
    <link>https://cis-india.org/internet-governance/news/economic-times-indulekha-aravind-january-15-2017-the-soon-to-be-launched-aadhaar-pay-will-let-you-make-purchases-using-your-fingerprint</link>
    <description>
        &lt;b&gt;Paying for your groceries and other goods by using your biometrics instead of an e-wallet, debit card or cash seems to be the next phase in the Centre’s ambitious push to shift the country to a “less cash” economy, as its mandarins term it.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Indulekha Aravind was &lt;a class="external-link" href="http://economictimes.indiatimes.com/news/economy/policy/the-soon-to-be-launched-aadhaar-pay-will-let-you-make-purchases-using-your-fingerprint/articleshow/56542475.cms"&gt;published in the Economic Times&lt;/a&gt; on 15 January 2017. Sunil Abraham was &lt;a class="external-link" href="http://economictimes.indiatimes.com/et-now/experts/sunil-abraham-on-aadhaars-misuse-during-demonetisation/videoshow/56544492.cms"&gt;consulted for this&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ajay  Bhushan Pandey, CEO of the Unique Identification Authority of India  (UIDAI), says it will be rolling out Aadhaar-enabled payment system, or  Aadhaar Pay, for merchants in the next few weeks. This will be an app  for merchants that enables them to receive payments through biometric  authentication of the customer, provided their bank accounts are linked  to their Aadhaar number. "A pilot is under way in fair price shops in  Andhra Pradesh where shopkeepers are accepting payments from PDS  beneficiaries. The results are very encouraging," says Pandey.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The idea takes off from the existing Aadhaar-enabled payment system (AEPS) used by bank business correspondents (BCs) in rural areas to disburse and accept cash, using micro ATMs. "We are trying to tweak this so that a similar device can be used by a local merchant," says Pandey. Adoption will depend on two factors: merchants’ acceptance of it and whether they can use an app rather than a micro ATM. The biggest advantage through this method of payment, says Pandey, is that the customer will not need a credit or debit card, or even a smartphone.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img alt="The soon-to-be launched Aadhaar Pay will let you make purchases using your fingerprint" class="gwt-Image" src="http://img.etimg.com/photo/56542603/page-19-1.jpg" title="The soon-to-be launched Aadhaar Pay will let you make purchases using your fingerprint" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  limits for transactions using AEPS, such as the number of daily  transactions, will be left to the discretion of the banks. In the long  term, the AEPS will be migrated to the BHIM (Bharat Interface for Money)  platform but the rollout of Aadhaar Pay will happen before that. Post  demonetisation, banking BC’s number of transactions using AEPS has leapt  from 4-5 lakh to 14-15 lakh, says Pandey. According to Reserve Bank of  India data on electronic payment systems, the total volume of such  transactions  jumped from 671 million in November 2016 to 957 million in December. USSD-based payments, which can be done using a basic feature phone, are among the biggest beneficiaries: the volume rose from just 7,000 in November to 1,02,000 in December, and value of transactions from over Rs 7,000 to over Rs 1 lakh. Prepaid payment instruments — mainly mobile wallets — rose from 59 million to 88 million in the same period (and value from Rs 1,300 crore to Rs 2,100 crore).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While Aadhaar Pay is likely to ride the demonetisation wave if it is launched soon, certain concerns remain, as the list is how secure such a payment system will be. The UIDAI CEO says it is a paramount concern for the organisation, too. "We are using the latest technology to ensure the information stays encrypted end to-end, so that information is not leaked or misused. In the months to come, we will strengthen the security."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Wary About Security&lt;/b&gt; &lt;br /&gt; Sunil Abraham, executive director of the Centre for Internet and  Society, a think tank that has been analysing the Aadhaar project for  six years, outlines several reasons why Aadhaar-based biometrics is  inappropriate for authentication in payments, unlike card-based payments  that use cryptography.  &lt;br /&gt; &lt;br /&gt; "With biometrics, there is always  an error ratio. It is imprecise matching, whereas with cryptography  (smart cards), there is no false positive or  negative. You either have the key (PIN) or you don’t. It is also very  cheap to defeat biometric authentication — even an unlettered person can  do it," says Abraham. It would be easy enough, he says, to replicate  someone else’s fingerprint by pressing it against lukewarm wax and  filling the mould with glue to get a dummy finger. In contrast,  compromising a smart card requires more cost and effort, from  tech-savviness to machines such as a skimmer that will read the card.  "And once you are compromised,you are compromised forever. You can’t change it, like a debit card PIN."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Using  Aadhaar for authentication had proved to be a failure during the  exchange of currency notes following demonetisation, he adds, pointing  to how the poor and the middle class stood in queues for money while  stacks of new currency were recovered from the homes of businessmen and  bureaucrats. "When you have bank officials who are corrupt, giving them  your biometrics is giving them more ammunition for corruption." To catch  the criminals, law enforcement agencies had to resort to CCTV footage,a  relatively older technology, he says. Others point out that while it  may be secure, certain factors stand in the way of making  biometrics-based payment authentication a large-scale success. Amrish  Rau, CEO of PayU India, a payment gateway provider, cites a list of  reasons why it would inevitably take off but only in 5-10 years.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"For  one, the technology is not yet good enough. There are also bandwidth  and data constraints in sending biometric data," says Rau. Even in more  mature markets, it has yet to find widespread acceptance, he says,  pointing to the slow adoption of Apple Pay and Samsung Pay in the US.  "It’s not the answer today.” This is in contrast to NITI Aayog CEO  Amitabh Kant’s recent remarks that cards and PoS machines would become  redundant by 2020 because Indians would be making payments using their  thumb (biometrics).  "... my view is that in the next two and a half years, India will make  all its debit cards, credit cards, all ATM machines, all PoS machines  totally irrelevant,” Kant had said at a Pravasi Bharatiya Divas session  in Bengaluru.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;UIDAI’s Pandey is more circumspect. “I wouldn’t say who would replace  what. But from the government’s side we are encouraging all modes of  digital payment. India has a diverse population and some people might  prefer using a card, others a wallet. Collectively, they will contribute  to a less-cash society.”&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/economic-times-indulekha-aravind-january-15-2017-the-soon-to-be-launched-aadhaar-pay-will-let-you-make-purchases-using-your-fingerprint'&gt;https://cis-india.org/internet-governance/news/economic-times-indulekha-aravind-january-15-2017-the-soon-to-be-launched-aadhaar-pay-will-let-you-make-purchases-using-your-fingerprint&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Demonetisation</dc:subject>
    
    
        <dc:subject>Digital Payment</dc:subject>
    
    
        <dc:subject>Digital Governance</dc:subject>
    
    
        <dc:subject>Digital Economy</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital Money</dc:subject>
    
    
        <dc:subject>Video</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Biometrics</dc:subject>
    

   <dc:date>2017-01-16T03:14:22Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/bloomberg-mayank-jain-january-17-2017-dangers-of-aadhaar-based-payments-that-no-one-is-talking-about">
    <title>The Dangers Of Aadhaar-Based Payments That No One Is Talking About</title>
    <link>https://cis-india.org/internet-governance/news/bloomberg-mayank-jain-january-17-2017-dangers-of-aadhaar-based-payments-that-no-one-is-talking-about</link>
    <description>
        &lt;b&gt;Less than three months ago, India’s banking sector was hit by a data breach which compromised 32 lakh debit cards and led to fraudulent transactions worth Rs 1.3 crore.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Mayank Jain was &lt;a class="external-link" href="http://www.bloombergquint.com/business/2017/01/17/the-dangers-of-aadhaar-based-payments-that-no-one-is-talking-about"&gt;published by Bloomberg&lt;/a&gt; on January 17, 2017. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The incident started a debate around security of payment systems. But the debate had just about begun when the government’s demonetisation decision dragged attention away from it. Now as the dust settles and as the government starts to push newer means of digital payments, the focus is back on the security of systems being seen as an alternative to cash.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One such system is Aadhaar-based payments which could potentially allow citizens to pay anytime anywhere with the tap of a finger.&lt;br /&gt;&lt;br /&gt;In theory, it sounds simple.&lt;br /&gt;&lt;br /&gt;The Aadhaar-based payment system runs on the existing Aadhaar infrastructure through which a person’s biometrics are used to authenticate the user. Once authenticated, the user can transfer funds directly from one bank account to another without going through a mobile wallet or a card.&lt;br /&gt;&lt;br /&gt;The payment system requires a smartphone, a working internet connection and a biometric authentication device with the merchant. The customer needn’t have a card or a phone as long as he or she has an Aadhaar-seeded bank account.&lt;br /&gt;&lt;br /&gt;National Payments Corporation of India has developed this payments infrastructure over the existing Aadhaar-Enabled Payments System, the railroad on which the public distribution system has been functioning for years now.&lt;br /&gt;&lt;br /&gt;Amitabh Kant, chief executive officer of the government policy think tank NITI Aayog said, earlier this month, that all cards and point-of-sale machines will become redundant in the country in the next two-and-a-half years as Aadhaar-based payments become popular.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img class="lazy" src="http://images.assettype.com/bloombergquint%2F2017-01%2Ff3e25ea3-f10b-4059-a95d-412cd4f32caf%2FKey%20Facts%20About%20Aadhaar%20Payments%20Payments%20Payments01.png?auto=format&amp;amp;q=60&amp;amp;w=1024&amp;amp;fm=pjpeg" /&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;A Double-Edged Sword&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;While payments authenticated by biometrics sound like a good idea in a country where less than one in three people actually own a smartphone, there are fears that integrating biometrics with digital payments could prove to be a security headache.&lt;br /&gt;&lt;br /&gt;The first part of the problem is that Aadhaar, while effective, is not a fool-proof method of authentication and identification failures are not uncommon. Building a payment system atop the Aadhaar system will simply transfer some of these vulnerabilities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img class="lazy" src="http://images.assettype.com/bloombergquint%2F2017-01%2F12a47aa6-10f1-4687-a471-a463f876e6d2%2FHow%20Aadhaar%20Payment%20Works.png?auto=format&amp;amp;q=60&amp;amp;w=1024&amp;amp;fm=pjpeg" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The possibility of transaction failures due to a biometric mismatch are real, admitted a former high-ranking official from the Unique Identification Authority of India (UIDAI) who spoke to BloombergQuint on the condition of anonymity.&lt;br /&gt;&lt;br /&gt;Officially, the false reject rate – rejection of a biometric when it’s actually correct – is set at a maximum of 2 percent for devices that get certified from the UIDAI. On the ground, however, failure rates vary widely, said the official quoted above.&lt;br /&gt;&lt;br /&gt;According to the official statistics on UIDAI, more than 16 lakh Aadhaar-authentication requests failed in the past week. The type of errors encountered ranged from the biometric data not matching the database to demographic details not checking out.&lt;br /&gt;&lt;br /&gt;The failure rates on Aadhaar Enabled Payment System for interbank transactions (which is a part of all Aadhaar authentication requests) were found to be as high as 60 percent by the Watal Committee on digital payments which published its report in December.&lt;br /&gt;&lt;br /&gt;Additionally, newer security threats may also emerge if the scope of Aadhaar is widened. These include identity theft if a person’s biometrics are compromised from the payment system, phishing attempts, and the difficulty in revoking access once biometric information is compromised.&lt;br /&gt;&lt;br /&gt;Biometrics aren’t an exact science, the official quoted above said, while adding that possible glitches have to be weighed against the benefits of offering a widely accessible non-cash mode of payment to citizens.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;How Easy Is It To Beat The System?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham, executive director of Bangalore based research organisation Center for Internet and Society (CIS) said that one way to assess how secure a system is to understand the cost and effort that goes into breaching it.&lt;br /&gt;&lt;br /&gt;In the case of Aadhaar-based payment systems, the costs may not be high.&lt;br /&gt;&lt;br /&gt;“There’s the gummy finger method which essentially requires some Fevicol or gum to duplicate someone’s fingerprint which can be enough to transact on someone’s behalf without them being there,” said Abraham in a phone conversation with BloombergQuint. “An average person can’t clone a smart card. Just fevicol and glue can help you make a gummy finger. The biometric lobby will say that advanced scanners defeat the gummy finger attack but more advanced scanners are also more expensive.”&lt;br /&gt;&lt;br /&gt;Also, using more sensitive devices could push up the instance of false rejection of transactions, said Abraham.&lt;br /&gt;&lt;br /&gt;There are other concerns. Like the fact that devices used for Aadhaar identification could store personal information, which, in turn, could be susceptible to a breach.&lt;/p&gt;
&lt;blockquote class="quoted" style="text-align: justify; "&gt;There are five main components in an Aadhaar app transaction – the customer, the vendor, the app, the back-end validation software, and the Aadhaar system itself. There are also two main external concerns – the security of the data at rest on the phone and the security of the data in transit. At all seven points, the customer’s data is vulnerable to attack. &lt;br /&gt;Bhairav Acharya, Program Fellow, New America&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Acharya, who works at a U.S.-based think tank called New America and focuses on cyber-law, said the key concern is that Aadhaar data can be stolen and misused.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The app and validation software are insecure, the Aadhaar system  itself is insecure, the network infrastructure is insecure, and the laws  are inadequate.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The biometric data collected on the  authentication device at a merchant location can potentially be stored  on the device as well as the smartphone of a merchant for a long time.  Abraham added that there is a possibility that non-certified devices  will enter the market, which can store data and use it in the future to  do fraudulent transactions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The concerns over potential misuse of  biometric data by private agencies has also been highlighted by the  Supreme Court of India. Earlier this month, the apex court refused to  expedite the hearing on a petition regarding Aadhaar being utilised for  multiple use cases by private companies. It, however, &lt;a href="http://economictimes.indiatimes.com/articleshow/56352843.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst" target="_blank"&gt;&lt;ins&gt;observed&lt;/ins&gt;&lt;/a&gt; that private agencies collecting biometric data “is not a great idea”.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Deficient Privacy Laws&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Apar Gupta, a Delhi-based lawyer working on cyber security, says that  the lack of strong privacy protecting provisions is another concern  that should be kept in mind while moving towards an Aadhaar-based  payment system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The data stays for a long time with the  stakeholders in the system. The requesting agency can keep it for seven  years and the UIDAI can store it for five years. There are insufficient  safeguards and there’s an absence of privacy law and an independent  privacy regulator,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Acharya agreed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India does not  have the necessary laws to deal with a decentralised,  biometrically-authenticated, mobile payments system, according to  Acharya.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Moreover, current laws and policies regarding the  Aadhaar project, particularly the centralised database, are inadequate  from the point of view of data security and end-user privacy,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Abraham of CIS said the issue is wider than Aadhaar. The problem is the lack of a strong data security law.&lt;/p&gt;
&lt;blockquote class="quoted" style="text-align: justify; "&gt;We only have a minimal data security law under the Section 43A of the Information and Technology Act which only applies to the private sector. There’s no law that applies to the government. Even 43A has not been applied consistently. There’s no place for you to go and complain if your identity has been compromised.&lt;br /&gt;Sunil Abraham, Executive Director, Centre for Internet &amp;amp; Society&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Gupta noted that, in the event of an identity threat, avenues of recourse are also limited. He said the best option is an appeal in the civil court, which is a long drawn out process.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In final analysis, according to Abraham, credit and debit cards are easier to secure as access can be revoked quickly.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The trouble with biometrics is that the chain of trust is harder to  establish because too many people can get access to biometrics and then  you need to devise these convoluted solutions like hardware secure  zones,” Abraham said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“So the advantage of going with a smart card  is that it can be easily re-secured, but with biometrics, once I  compromise it, it’s lifelong.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/bloomberg-mayank-jain-january-17-2017-dangers-of-aadhaar-based-payments-that-no-one-is-talking-about'&gt;https://cis-india.org/internet-governance/news/bloomberg-mayank-jain-january-17-2017-dangers-of-aadhaar-based-payments-that-no-one-is-talking-about&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Payment</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital Money</dc:subject>
    
    
        <dc:subject>Digital India</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    

   <dc:date>2017-01-17T14:39:53Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/wall-street-journal-gabriele-parussini-january-13-2017-indias-digital-id-rollout-collides-with-rickety-reality">
    <title>India’s Digital ID Rollout Collides With Rickety Reality</title>
    <link>https://cis-india.org/internet-governance/news/wall-street-journal-gabriele-parussini-january-13-2017-indias-digital-id-rollout-collides-with-rickety-reality</link>
    <description>
        &lt;b&gt;India’s new digital identification system, years in the making and now being put into widespread use, has yet to deliver the new era of modern efficiency it promised for shop owner Om Prakash and customer Daya Chand.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Gabriele Parussini was published in the &lt;a class="external-link" href="http://www.wsj.com/articles/snags-multiply-in-indias-digital-id-rollout-1484237128?mod=e2fb"&gt;Wall Street Journal&lt;/a&gt; on January 13, 2017. Hans Varghese Mathews was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;At first, it drove both men up a tree.&lt;br /&gt;&lt;br /&gt;The system, which relies on fingerprints and eye scans to eventually provide IDs to all 1.25 billion Indians, is also expected to improve the distribution of state food and fuel rations and eventually facilitate daily needs such as banking and buying train tickets.&lt;br /&gt;&lt;br /&gt;But Mr. Prakash couldn’t confirm his customers’ identities until he dragged them to a Java plum tree in a corner of his village near New Delhi’s international airport. That was the only place to get the phone signal needed to tap into the government database.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“I hopped on a chair and put my finger in the machine,” said Mr.  Chand, a 60-year-old taxi driver. Getting his state food ration “used to  be much easier,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In &lt;a class="none icon" href="http://blogs.wsj.com/briefly/2017/01/13/indias-massive-aadhaar-biometric-identification-program-the-numbers/"&gt;a system so vast&lt;/a&gt;, even small glitches can leave millions of people empty-handed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="none icon" href="http://blogs.wsj.com/indiarealtime/2012/10/03/getting-indias-id-project-back-on-track/"&gt;The government began building the system&lt;/a&gt;,  called Aadhaar, or “foundation,” with great fanfare in 2009, led by a  team of pioneering technology entrepreneurs. Since then, almost 90% of  India’s population has been enrolled in what is now the world’s largest  biometric data set.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prime Minister Narendra Modi, who set aside  early skepticism about the Aadhaar project after taking power in 2014,  is betting that it can help India address critical problems such as  poverty and corruption, while also saving money for the government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But the technology is colliding with the rickety reality of India,  where many people live off the grid or have fingerprints compromised by  manual labor or age.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Panna Singh, a 55-year-old day laborer in  the northwestern state of Rajasthan who breaks stones used to build  walls, says the machine recognized his scuffed-up fingerprints only a  couple of times.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“I’ve come twice today,” he said at a ration shop in the village of Devdungri. “That’s a full day of work, gone.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Iris scans are meant to resolve situations where fingerprints don’t work, but shops don’t yet have iris scanners.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ajay Bhushan Pandey, chief executive of the government agency that  oversees Aadhaar, said kinks will be ironed out as the system is used,  as is the case with software rollouts. It works 92% of the time, and  that will rise to 95%, he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“On the scale of what [Aadhaar]  has achieved, the rollout has been remarkably smooth,” said Nandan  Nilekani, the Infosys co-founder who spearheaded the project. “I don’t  see any issues that are disproportionate to the size of project.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An  Aadhaar ID is intended to be a great convenience, replacing the  multitude of paperwork required by banks, merchants and government  agencies. The benefits are only just beginning, backers say, as the  biometric IDs are linked to programs and services.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But in rural  areas, home to hundreds of millions of impoverished Indians dependent on  subsidies, the impact of technical disruptions has already been  evident.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After walking for two hours across rough underbrush in  Rajasthan to get kerosene for the month, Hanja Devi left empty-handed  because the machine couldn’t match her fingerprint with her Aadhaar  number.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It’s always so difficult” using the system, said Ms. Devi, who lives  with her husband and a nephew on 1,500 rupees ($22) a month.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ranjit  Singh, who operates the shop, said five of the 37 customers before Ms.  Devi also left the shop empty-handed, a failure rate of over 15%.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A shop manager in a neighboring village said identification had failed for a similar portion of his 500 customers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Any biometric recognition system of Aadhaar’s size is bound to show  duplicates, meaning some people’s biometric identifiers will match  someone else’s when they try to enroll.The new system hasn’t eliminated  attempts at fraud. In August, police in Rajasthan accused two shop  managers of linking their fingerprints to a multitude of cards and  stealing for months the rations of dozens of clients.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Hans Varghese Mathews, a mathematician at the Bangalore-based Center for  Internet and Society, used the results of a test run by Aadhaar  officials on a sample of 84 million people to extrapolate the figure for  India’s total population. The error level is less than 1%, but in the  world’s second-most populous country, the snag would still affect about  11 million people, he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Government officials disputed the calculation, saying the number of  duplicates would be much smaller—and that it would take only seven  analysts to manage the error caseload.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As for trouble connecting to the registry, better infrastructure,  including steadier internet connections, will eventually also help, Mr.  Pandey said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For now, Mr. Prakash has found a way to cope without  climbing trees. After scouring the village, he set up a shack in a spot  with enough bandwidth for his fingerprint scanner to work. It is hardly  efficient. He issues receipts in the morning at the shack, then goes  back to his shop to hand out the grains. Customers have to line up  twice, sometimes for hours.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Prakash has applied to the  government to operate without biometric identification, but his request  was turned down, he said. “They said: ‘You have to keep trying.’ ”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/wall-street-journal-gabriele-parussini-january-13-2017-indias-digital-id-rollout-collides-with-rickety-reality'&gt;https://cis-india.org/internet-governance/news/wall-street-journal-gabriele-parussini-january-13-2017-indias-digital-id-rollout-collides-with-rickety-reality&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Biometrics</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-01-17T15:35:04Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/epw-27-february-2016-hans-varghese-mathews-flaws-in-uidai-process">
    <title>Flaws in the UIDAI Process </title>
    <link>https://cis-india.org/internet-governance/blog/epw-27-february-2016-hans-varghese-mathews-flaws-in-uidai-process</link>
    <description>
        &lt;b&gt;The accuracy of biometric identification depends on the chance of a false positive: the probability that the identifiers of two persons will match. Individuals whose identifiers match might be termed duplicands. When very many people are to be identified success can be measured by the (low) proportion of duplicands. The Government of India is engaged upon biometrically identifying the entire population of India. An experiment performed at an early stage of the programme has allowed us to estimate the chance of a false positive: and from that to estimate the proportion of duplicands. For the current population of 1.2 billion the expected proportion of duplicands is 1/121, a ratio which is far too high. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in &lt;a class="external-link" href="http://www.epw.in/journal/2016/9/special-articles/flaws-uidai-process.html"&gt;Economic &amp;amp; Political Weekly&lt;/a&gt;, Journal » Vol. 51, Issue No. 9, 27 Feb, 2016.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;A legal challenge is being mounted in the Supreme Court, currently, to the programme of biometric identification that the Unique Identification Authority of India (UIDAI) is engaged upon: an identification preliminary and a requisite to providing citizens with “Aadhaar numbers” that can serve them as “unique identiﬁers” in their transactions with the state. What follows will recount an assessment of their chances of success. We shall be using data that was available to the UIDAI and shall employ only elementary ways of calculation. It should be recorded immediately that an earlier technical paper by the author (Mathews 2013) has been of some use to the plaintiffs, and reference will be made to that in due course.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Aadhaar numbers themselves may or may not derive, in some way, from the biometrics in question; the question is not material here. For our purposes a biometric is a numerical representation of some organic feature: like the iris or the retina, for instance, or the inside of a ﬁnger, or the hand taken whole even. We shall consider them in some more detail later. The UIDAI is using ﬁngerprints and iris images to generate a combination of biometrics for each individual. This paper bears on the accuracy of the composite biometric identiﬁer. How well those composites will distinguish between individuals can be assessed, actually, using the results of an experiment conducted by the UIDAI itself in the very early stages of its operation; and our contention is that, from those results themselves, the UIDAI should have been able to estimate &lt;i&gt;how many individuals would have their biometric identiﬁers matching those of some other person&lt;/i&gt;, under the best of circumstances even, when any good part of population has been identiﬁed.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/Flaws_in_the_UIDAI_Process_0.pdf"&gt;Read the full article here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;The author thanks Nico Temme of the Centrum Wiskunde &amp;amp; Informatica in The Netherlands for the bounds he derived on the chance of a false positive. He is particularly grateful to the anonymous referee of this journal who, through two rounds of comment, has very much improved the presentation of the results. A technical supplement to this paper is placed on the EPW website along with this paper&lt;/i&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/epw-27-february-2016-hans-varghese-mathews-flaws-in-uidai-process'&gt;https://cis-india.org/internet-governance/blog/epw-27-february-2016-hans-varghese-mathews-flaws-in-uidai-process&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>hans</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2016-03-06T10:40:59Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/a-comparison-of-the-2016-aadhaar-bill-and-the-2010-nidai-bill">
    <title>A comparison of the 2016 Aadhaar Bill, and the 2010 NIDAI Bill</title>
    <link>https://cis-india.org/internet-governance/blog/a-comparison-of-the-2016-aadhaar-bill-and-the-2010-nidai-bill</link>
    <description>
        &lt;b&gt;This blog post does a clause-by-clause comparison of the provisions of National Identification Authority of India Bill, 2010 and the Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Act, 2016
&lt;/b&gt;
        
&lt;ul id="docs-internal-guid-400d9138-596b-bafd-2e9b-46f6530d6e51"&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;h3 style="text-align: justify;" dir="ltr"&gt;Title&lt;/h3&gt;
&lt;/li&gt;&lt;/ul&gt;
&amp;nbsp;
&lt;p style="text-align: justify;" dir="ltr"&gt;2010 Bill: The Bill was titled as the National Identification Authority of India Bill, 2010.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2016 Bill : The Bill has been titled as the Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Act, 2016.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;h3 style="text-align: justify;" dir="ltr"&gt;Purpose/Object Clause&lt;/h3&gt;
&lt;/li&gt;&lt;/ul&gt;
&amp;nbsp;
&lt;p style="text-align: justify;" dir="ltr"&gt;2010 Bill: The purpose of Bill was stated to provide for the establishment of the National Identification Authority of India to issue identification numbers to residents of India as well as certain other classes of individuals , to facilitate access to benefits and services, to which they are entitled.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2016 Bill : The purpose of this Bill has been stated to ensure targeted delivery of subsidies, benefits and services to residents of India in an efficient and transparent manner by assigning unique identity numbers to such individuals.&lt;/p&gt;
&amp;nbsp;
&lt;ul&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;h3 style="text-align: justify;" dir="ltr"&gt;Definitions&lt;/h3&gt;
&lt;/li&gt;&lt;/ul&gt;
&amp;nbsp;
&lt;ol&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2010 Bill: “Authentication” was defined as the process in which the Aadhaar number, along with other attributes (including biometrics) are submitted to the Central Identities Data Repository for verification, done on the basis of information, data or documents available with the Repository.&lt;/p&gt;
2016 Bill : “Authentication” has been defined as the process by which the Aadhaar number, along with demographic or biometric information of an individual is submitted to the Central Identities Data Repository for the purpose of verification, done on the basis of the correctness of (or lack of) information available with it.&lt;/li&gt;&lt;/ol&gt;
&amp;nbsp;
&lt;ol start="2"&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2010 Bill: “Authentication Record” was not defined in the previous Bill.&lt;/p&gt;
2016 Bill : “Authentication Record” &amp;nbsp;has been defined under clause 2(d) &amp;nbsp;as the record of the time of authentication, the identity of the entity requesting such record and the response provided by the Authority for this purpose.&amp;nbsp;
&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ol start="3"&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2010 Bill: “Authority” was defined under clause 2(d) as National Identification Authority of India established under provisions of the Bill.&amp;nbsp;&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2016 Bill :“Authority” has been defined under clause 2(e) as Unique Identification Authority of India established under provisions of the Bill.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/p&gt;
&lt;ol start="4"&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2010 Bill: “Benefit” was not defined in the previous Bill. &amp;nbsp;&lt;/p&gt;
2016 Bill : “Benefit” has been defined under clause 2(f) as any advantage, gift, reward, relief, or payment (either in cash or kind), or such other benefits, which is provided to an
&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;individual/ a group of individuals as notified by the Central Government.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ol start="5"&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2010 Bill: “Biometric Information” was defined under clause 2(e) as a set of biological attributes of an individual as may be specified by regulations.&lt;/p&gt;
2016 Bill : “Biometric Information” has been defined under clause 2(g) as biological attributes of an individual like photograph, fingerprint, Iris scan, or other such biological
&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;attributes as may be specified by regulations.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ol start="6"&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2010 Bill: “Core Biometric Information” was not defined in the previous Bill.&lt;/p&gt;
2016 Bill : “Core Biometric Information” has been defined under clause 2(j) as biological attribute of an individual like fingerprint, Iris scan, or such other biological attribute as
&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;may be specified by regulations.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ol start="7"&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2010 Bill: “Demographic Information” was defined under clause 2(h) as information specified in the regulations for the purpose of issuing an Aadhaar number, like information relating to the name, age, gender and address of an individual (other than race, religion, caste, tribe, ethnicity, language, income or health), and such other information.&lt;/p&gt;
2016 Bill : “Demographic Information” has been defined under clause 2(k) as information of an individual as may be specified by regulations for the purpose of issuing an Aadhaar number like information relating to the name, date of birth, address and other relevant information, excluding race, religion, caste, tribe, ethnicity, language, records of entitlement, income or medical history of an individual.
&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ol start="8"&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2010 Bill: “Enrolling Agency” was defined under clause 2(i) as an agency appointed by the Authority or the Registrars for collecting information under the Act.&lt;/p&gt;
2016 Bill : “Enrolling Agency” has been defined under clause 2(l) as an agency appointed by the Authority or a Registrar for collecting demographic and biometric information of individuals under this Act.
&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ol start="9"&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2010 Bill: “Member” was defined under clause 2(l) to include the Chairperson and a part-time Member of the Authority appointed under the provisions of the Bill.&lt;/p&gt;
2016 Bill : “Member” has been defined under clause 2(o) &amp;nbsp;to include the Chairperson and Member of the Authority appointed under the provisions of the Bill.
&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ol start="10"&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2010 Bill: “Records of Entitlement” was not defined under the previous Bill.&lt;/p&gt;
2016 Bill : &amp;nbsp;“Records of Entitlement” has been defined under clause 2(r) as the records of benefits, subsidies or services provided to, or availed by, any individual under any programme.
&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ol start="11"&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2010 Bill: “Requesting Entity” was not defined under the previous Bill.&lt;/p&gt;
2016 Bill : “Requesting Entity” has been defined under clause 2(u) as an agency or person that submits information of an individual comprising of the Aadhaar number and&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;demographic or biometric information to the Central Identities Data Repository for the purpose of authentication.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ol start="12"&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2010 Bill: “Resident” was defined under clause 2(q) as an individual usually residing in a village, rural area, town, ward, demarcated area (demarcated by the Registrar General of Citizen Registration) within a ward in a town or urban area in India.&lt;/p&gt;
2016 Bill : “Resident” has been defined under clause 2(v) as an individual who has resided in India for a period or periods amounting in all to one hundred and eighty-two days or more in the twelve months immediately preceding the date of application for enrolment.
&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ol start="13"&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2010 Bill: &amp;nbsp;“Review Committee” was defined under clause 2(r) as the Identification Review Committee constituted under the provisions of the Bill.&lt;/p&gt;
2016 Bill : “Review Committee” has not been defined under the Bill.
&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ol start="14"&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2010 Bill: “Service” was not defined in the previous Bill.&lt;/p&gt;
2016 Bill : “Service” has been defined under clause 2 (w) as any provision, facility, utility or any other assistance provided in any form to an individual or a group of individuals as may be notified by the Central Government.
&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ol start="15"&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2010 Bill: “Subsidy” was not defined in the previous Bill.&lt;/p&gt;
2016 Bill : “Subsidy” has been defined under clause 2(x) as any form of aid, support, grant, subvention, or appropriation (either in cash or kind), as may be notified by the Central Government, given to an individual or a group of individuals.
&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;h3 style="text-align: justify;" dir="ltr"&gt;Enrolment&lt;/h3&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ol&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;strong&gt;Aadhaar Numbers&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2016 Bill : Under clause 3(2) of the Bill, it is stated that at the time of enrolment, The enrolling agency shall inform the individual undergoing enrolment the following details:&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;(a) the manner in which the information so collected shall be used,&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;(b) the nature of recipients with whom the information is intended to be shared during authentication,and&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;(c) the existence of a right to access information, the procedure for making such requests for access, and details of the person/department in-charge to whom such requests can be&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;made.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ol start="2"&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;strong&gt;Properties of Aadhaar Number&amp;nbsp;&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2010 Bill : Clause 4 (3) stated that subject to authentication, the Aadhaar number shall be accepted as a proof of identity of the Aadhaar number holder.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2016 Bill : Clause 4 (3) states that subject to authentication, the Aadhaar number (either in physical or electronic form) shall be accepted as a proof of identity of the Aadhaar&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;number holder.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The Explanation under this clause states that for the purpose of this provision, “electronic form” shall have the same meaning as assigned to it in section 2 (1) (r) of the Information Technology Act, 2000.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;h3 style="text-align: justify;" dir="ltr"&gt;Authentication&lt;/h3&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ol&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;strong&gt;Proof of Aadhaar number necessary for receipt of certain subsidies, benefits and services, etc.&amp;nbsp;&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2016 Bill : Under clause 7 of the Bill it is provided that for the purpose of establishing an individual's identity as a condition to receipt a a subsidy, benefit or service. the Central or State Government (as the case may be), require that such individual undergo authentication, or furnish proof of possession of Aadhaar number. In case the Aadhaar number has not been assigned to an individual, such individual must make an application for enrolment.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The Proviso states that the individual shall be offered alternate and viable means of identification for delivery of the subsidy, benefit or service, in an Aadhaar number is not assigned to an individual.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ol start="2"&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;strong&gt;Authentication of Aadhaar number&amp;nbsp;&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2010 Bill: Clause 5 of the Bill stated that authentication of the Aadhaar number shall be performed by the Authority, in relation to the holders’ biometric and demographic information, subject to such conditions and on payment of the prescribed fees. Also, it was provided that the Authority shall respond to an authentication query with a positive, negative or other appropriate response (excluding any demographic and biometric information).&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2016 Bill : The Bill states that authentication of the Aadhaar number shall be performed by the Authority, in relation to the holders’ biometric and demographic information, subject to such conditions and on payment of the prescribed fees.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Clause 8 (2) provides that unless otherwise provided in the Act, the requesting entity shall—&amp;nbsp;&lt;/p&gt;
&lt;ol&gt;&lt;li style="list-style-type: lower-alpha;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;For the purpose of authentication, obtain the consent of an individual before collecting his identity information, and&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: lower-alpha;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;ensure that the identity information of an individual is only used for submission to the Central Identities Data Repository for authentication.&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Clause 8 (3) provides that the following details shall be informed by the requesting entity to the individual submitting his identity information for the purpose of authentication:&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&amp;nbsp; a. the nature of information that may be shared upon authentication;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&amp;nbsp; b. the uses to which the information received during authentication may be put by the requesting entity; and&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&amp;nbsp; c. alternatives to submission of identity information to the requesting entity.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Clause 8(4) states that the Authority shall respond to an authentication query with a positive, negative or other appropriate response (excluding any core biometric information).&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ol start="3"&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;strong&gt;Prohibition on requiring certain information.&amp;nbsp;&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2010 Bill: Clause 9 of the Bill prohibited the Authority to make an individual give information pertaining to his race, religion, caste, tribe, ethnicity, language, income or health.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2016 Bill : This provision has been removed from the 2016 Bill.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;h3 style="text-align: justify;" dir="ltr"&gt;Unique Identification Authority Of India&lt;/h3&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ol&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;strong&gt;Establishment of Authority&amp;nbsp;&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2010 Bill: Clause 11(1) of the Bill stated that the Central Government shall establish an Authority called as the National Identification Authority of India, to exercise the powers conferred on it and to perform the functions assigned to it under this Act. Also, clause 11(3) provided that the head office of the Authority shall be in the National Capital Region, referred to in section 2(f) of the National Capital Region Planning Board Act, 1985.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2016 Bill : Clause 11(1) of the Bill states that the Central Government shall establish an Authority called as the Unique Identification Authority of India, responsible for the processes of enrolment, authentication and perform such other functions assigned to it under this Act. Also, clause 11(3) provides that the head office of the Authority shall be in New Delhi.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ol start="2"&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;strong&gt;Composition of Authority&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2010 Bill: Clause 12 provided that the Authority shall consist of a Chairperson and two part-time Members, to be appointed by the Central Government. &amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2016 Bill : Clause 12 of the Bill provides that the Authority shall consist of a Chairperson (appointed on part-time or full- time basis) , two part-time Members, and the chief executive officer (who shall be Member-Secretary of the Authority), to be appointed by the Central Government.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ol start="3"&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;strong&gt;Qualifications for appointment of Chairperson and Members of Authority&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2010 Bill: Clause 13 provided that the Chairperson and Members of the Authority shall be persons of ability, integrity and outstanding calibre having experience and knowledge in the matters relating to technology, governance, law, development, economics, finance, management, public affairs or administration.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2016 Bill : Clause 13 provides that the Chairperson and Members of the Authority shall be persons of ability and integrity having experience and knowledge of at least ten years in matters relating to technology, governance, law, development, economics, finance, management, public affairs or administration.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ol start="4"&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;strong&gt;Term of office and other conditions of service of Chairperson.&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2010 Bill: Proviso to Clause 14 (1) stated that &amp;nbsp;the Chairperson of the Unique Identification Authority of India, who would have been appointed before the commencement of this Act by notification A-43011/02/2009-Admn.I (Vol.II) dated the 2nd July, 2009, shall continue as a Chairperson of the Authority for the term for which he had been appointed. Clause 14(4) prohibited the Chairperson from holding any other office during the period of holding his office in the Authority. Proviso to clause 14 (5) stated the salary, allowances and the other terms and conditions of service of the Chairperson shall not be varied to his disadvantage after his appointment.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2016 Bill : These provisions have not been included in the Bill.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ol start="5"&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;strong&gt;Removal of Chairperson and Members&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2010 Bill: &amp;nbsp;Clause 15 (2) stated that unless a reasonable opportunity of being heard has been duly provided, the Chairperson or a Member shall not be removed under clauses (d) or (e) of sub-section (1).&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2016 Bill : Clause 15 (2) stated that unless a reasonable opportunity of being heard has been duly provided, the Chairperson or a Member shall not be removed under clauses (b), (d) or (e) of sub-section (1).&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ol start="6"&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;strong&gt;Restrictions on Chairperson or Members on employment after cessation of office&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2010 Bill: Clause 16 (a) provided that the Chairperson or a member, who ceases to hold office, shall not accept any employment in, or connected with the management or administration of, any person which has been associated with any work under the Act, for a period of three years from the date on which they cease to hold office, without previous approval of the Central Government.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The proviso to this clause stated that this provision shall not apply to any employment under the Central Government, State Government, local authority, any statutory authority or any corporation established by or under any Central, State or provincial Act or a Government Company, as defined in section 617 of the Companies Act, 195.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2016 Bill: Clause 16 (a) provides that the Chairperson or a member, who ceases to hold office, shall not accept any employment in, or connected with the management of any organisation, company or any other entity which has been associated with any work done or contracted out by the Authority (whether directly or indirectly), during his tenure as Chairperson or Member, as the case may be, for a period of three years from the date on which he ceases to hold office, without previous approval of the Central Government.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The proviso to this clause stated that this provision shall not apply to any employment under the Central Government, State Government, local authority, any statutory authority or any corporation established by or under any Central, State or provincial Act or a Government Company, as defined in clause (45) of section 2 of the Companies Act, 2013.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ol start="7"&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;strong&gt;Functions of Chairperson&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2010 Bill: Clause 17 of the Bill provided that the Chairperson shall have powers of general superintendence, direction in the conduct of the affairs of the Authority, preside over the meetings of the Authority, and exercise and discharge such other powers and functions of the Authority as prescribed, without prejudice to any of the provisions of the Act.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2016 Bill : Clause 17 of the Bill states that the Chairperson shall preside over the meetings of the Authority, and exercise and discharge such other powers and functions of the Authority as prescribed, without prejudice to any of the provisions of the Act.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ol start="8"&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;strong&gt;Chief Executive Officer&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2010 Bill: Clause 20 (1) of the Bill stated that a chief executive officer, not below the rank of the Additional Secretary to the Government of India, who shall be the Member-Secretary of the Authority,shall be appointed by the Central Government.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2016 Bill : Clause 18 (1) stated that a chief executive officer, not below the rank of the Additional Secretary to the Government of India, shall be appointed by the Central Government. In the list of its responsibilities, clause 18 (2) (e) additionally provides for performing such other functions, or exercising such other powers, as may be specified by regulations.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ol start="9"&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;strong&gt;Meetings&amp;nbsp;&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2010 Bill: Clause 18 (4) provided that all decisions of the Authority shall be authenticated by the signature of the Chairperson or any other Member who is authorised by the Authority for this purpose.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2016 Bill : Clause 19 (4) provided that all decisions of the Authority shall be signed by the Chairperson, any other Member or the Member-Secretary authorised by the Authority.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ol start="10"&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;strong&gt;Vacancies, etc., not to invalidate proceedings of Authority&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2010 Bill: Clause 19 (b) of the Bill stated that No act or proceeding of the Authority shall be invalid merely by reason of any defect in the appointment of a person as a Member of the Authority&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2016 Bill : Clause 20 (b) of the Bill stated that No act or proceeding of the Authority shall be invalid merely by reason of any defect in the appointment of a person as Chairperson or Member of the Authority&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ol start="11"&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;strong&gt;Powers and functions of Authority&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;Clause 23 (2) (k)&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2010 Bill: Clause 23 (2) (k) provided that the powers and functions of the Authority may include sharing the information of Aadhaar number holders, with their written consent, with such agencies engaged in delivery of public benefits and public services as the Authority may by order direct, in a manner as specified by regulations.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2016 Bill : Clause 23 (2) (k) provides that the powers and functions of the Authority may include sharing the information of Aadhaar number holders, subject to the provisions of this Act.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Clause 23 (2) (r)&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2010 Bill : Clause 23 (2) (r) stated that the powers and functions of the Authority may include specifying, by regulation, the policies and practices for Registrars, enrolling agencies and other service providers.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2016 Bill : Clause 23 (2) (r) states that the powers and functions of the Authority may include evolving of, and specifying, by regulation, the policies and practices for Registrars, enrolling agencies and other service providers.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;h3 style="text-align: justify;" dir="ltr"&gt;Grants, Accounts and Audit and Annual Report&lt;/h3&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2010 Bill: Clause 25 provided that &amp;nbsp;the fees or revenue collected by the Authority shall be credited to the Consolidated Fund of India and the entire amount so credited be transferred to the Authority.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2016 Bill : Clause 25 &amp;nbsp;states that the fees or revenue collected by the Authority shall be credited to the Consolidated Fund of India.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;h3 style="text-align: justify;" dir="ltr"&gt;Identity Review Committee&lt;/h3&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2010 Bill: Clause 28 of the Bill provided for establishment of the Identity Review Committee, consisting of three members (including the chairperson) who are persons of eminence, ability, integrity and having knowledge and experience in the fields of technology, law, administration and governance, social service, journalism, management or social sciences. Clause 29 of the Bill enlisted several functions to be undertaken by the Review Committee so constituted.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2016 Bill: These provisions have been removed from the Bill.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;h3 style="text-align: justify;" dir="ltr"&gt;Protection of Information&lt;/h3&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ol&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;strong&gt;Security and confidentiality of information&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2010 Bill: Clause 30 (2) of the Bill stated that the Authority shall take measures (including security safeguards) to ensure security and protection of information in possession/control of the Authority (including information stored in the Central Identities Data Repository), against any loss, unauthorised access, use or unauthorised disclosure of the same.&lt;/p&gt;
&lt;p&gt;2016 Bill : Clause 28 (3) states that &amp;nbsp;the Authority shall take measures to ensure security and protection of information in possession/control of the Authority (including information stored in the Central Identities Data Repository), against access, use or disclosure not permitted under this Act or regulations made thereunder, and against accidental or intentional destruction, loss or damage.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;A new provision-clause 28(4)- states that the Authority shall undertake the following additional measures for protection of information:&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;(a) adopt and implement appropriate technical and organisational security measures,&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;(b) ensure that the agencies, consultants, advisors or other persons appointed or engaged for performing any function of the Authority under this Act, have in place appropriate technical and organisational security measures for the information, and&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;(c) ensure that the agreements or arrangements entered into with such agencies, consultants, advisors or other persons, impose obligations equivalent to those imposed on the Authority under this Act, and require such agencies, consultants, advisors and other persons to act only on instructions from the Authority.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ol start="2"&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;strong&gt;Restriction on sharing information&amp;nbsp;&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2010 Bill: The Bill did not provide for restrictions on sharing of information.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2016 Bill: This new provision under Clause 29 states that no core biometric information, collected or created under this Act, shall be—&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;(a) shared with anyone for any reason whatsoever; or&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;(b) used for any purpose other than generation of Aadhaar numbers and authentication under this Act.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Also, the identity information, other than core biometric information, collected or created&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;under this Act may be shared only in accordance with the provisions of this Act as specified under Regulations.&lt;/p&gt;
&lt;p&gt;Clause 29 (3) prohibits usage of identity information available with a requesting entity for any purpose, other than that specified to the individual at the time of submitting any identity information for authentication, or disclosed further, except with the prior consent of the individual to whom such information relates.&lt;/p&gt;
&lt;p&gt;Clause 29 (4) prohibits publication, displaying or publicly posting of the Aadhaar number or core biometric information collected or created under this Act in respect of an Aadhaar number holder, except for the purposes as may prescribed in Law.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ol start="3"&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;strong&gt;Biometric information deemed to be sensitive personal information.&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;2010 Bill: The Bill did not contain provisions stating that the biometric information shall be deemed to be sensitive personal information for the purpose of this Act.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2016 Bill: Clause 30 states that the biometric information collected and stored in electronic form shall be deemed to be “electronic record” and “sensitive personal data or information”, and the provisions contained in the Information Technology Act, 2000 and the rules made thereunder shall apply to such information,to the extent not in derogation of the provisions of this Act.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;The Explanation defines&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;(a) “electronic form” - as defined under section 2 (1) (r) &amp;nbsp;of the Information Technology Act, 2000,&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;(b) “electronic record” as defined under section 2 (1) (t) &amp;nbsp;of the Information Technology Act, 2000&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;(c)“sensitive personal data or information” - as defined under clause (iii) of the&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Explanation to section 43A of the Information Technology Act, 2000.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ol start="4"&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;strong&gt;Security and confidentiality of information&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2010 Bill: Clause 30 (2) of the Bill stated that the Authority shall take measures (including security safeguards) to ensure security and protection of information in possession/control of the Authority (including information stored in the Central Identities Data Repository), against any loss, unauthorised access, use or unauthorised disclosure of the same.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2016 Bill : Clause 28 (3) states that &amp;nbsp;the Authority shall take measures to ensure security and protection of information in possession/control of the Authority (including information stored in the Central Identities Data Repository), against access, use or disclosure not permitted under this Act or regulations made thereunder, and against accidental or intentional destruction, loss or damage.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;A new provision-clause 28(4)- states that the Authority shall undertake the following additional measures for protection of information:&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;(a) adopt and implement appropriate technical and organisational security measures,&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;(b) ensure that the agencies, consultants, advisors or other persons appointed or engaged for performing any function of the Authority under this Act, have in place appropriate technical and organisational security measures for the information, and&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;(c) ensure that the agreements or arrangements entered into with such agencies, consultants, advisors or other persons, impose obligations equivalent to those imposed on the Authority under this Act, and require such agencies, consultants, advisors and other persons to act only on instructions from the Authority.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ol start="5"&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;strong&gt;Alteration of demographic information or biometric information.&amp;nbsp;&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2016 Bill : Clause 31 (4) prohibits alteration of identity information in the Central Identities Data Repository, except in the manner provided in this Act or regulations made thereof.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ol start="6"&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;strong&gt;Access to own information and records of requests for authentication.&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2016 Bill : Clause 32 (3) provides that the Authority shall not collect, keep or maintain any information about the purpose of authentication, either by itself or through any entity under its control.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ol start="7"&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;strong&gt;Disclosure of information in certain cases&amp;nbsp;&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2010 Bill: The provision creates an exception under Clause 33 for the purposes of disclosure of information in certain cases like disclosure (including identity information or details of authentication) made pursuant to an order of a competent court; or disclosure (including identity information) made in the interests of national security in pursuance of directions issued by an officer(s) not below the rank of Joint Secretary or equivalent in the Central Government specifically authorised in this behalf by an order of the Central Government.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2016 Bill : The provision creates an exception under Clause 33 for the purposes of disclosure of information in certain cases like disclosure (including identity information or details of authentication) made pursuant to an order not inferior to that of a District Judge (provided that the court order shall be made only after giving an opportunity of hearing to the Authority); or disclosure (including identity information or authentication records) made in the interests of national security in pursuance of directions issued by an officer not below the rank of Joint Secretary to the Government of India, authorised in this behalf by an order of the Central Government.&lt;/p&gt;
&lt;p&gt;The proviso to Clause 33 (2) states that every direction so issued shall be reviewed by an Oversight Committee consisting of the Cabinet Secretary and the Secretaries to the Government of India in the Department of Legal Affairs and the Department of Electronics and Information Technology, before it takes effect.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The second proviso states that any such direction so issued shall be valid for a period of three months from the date of its issue, which may be extended for a further period of three months after the review by the Oversight Committee.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;h3 style="text-align: justify;" dir="ltr"&gt;Offences and Penalties&lt;/h3&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ol&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;strong&gt;Penalty for impersonation at time of enrolment.&amp;nbsp;&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2010 Bill: The penalty for impersonation was prescribed under Clause 34 &amp;nbsp;as imprisonment for a term which may extend to three years and fine which may extend to ten thousand rupees.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2016 Bill : The penalty for impersonation was prescribed under Clause 34 &amp;nbsp;as imprisonment for a term which may extend to three years, or with fine which may extend to ten thousand rupees, or both.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ol start="2"&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;strong&gt;Penalty for unauthorised access to the Central Identities Data Repository&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2010 Bill: Clause 38 (g) stated that any person not authorised by the Authority, &amp;nbsp;provides any assistance to any person to do any of the acts mentioned under sub-clauses (a)-(f) shall be punishable. If anyone, who is not authorised by the Authority, performs any activity as listed under (a)-(i), shall be punishable with imprisonment for a term which may extend to three years and shall be liable to a fine which shall not be less than one crore rupees.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2016 Bill : Clause 38 (g) stated that any person not authorised by the Authority, &amp;nbsp;reveals any information in contravention of sub-section section 28 (5), or shares, uses or displays information in contravention of section 29 or assists any person in any of the acts mentioned under sub-clauses (a)-(f) shall be punishable. If anyone, who is not authorised by the Authority, performs any activity as listed under (a)-(i), shall be punishable with imprisonment for a term which may extend to three years and shall be liable to a fine which shall not be less than ten lakh rupees. Additionally, the Explanation states that the expression “computer source code” shall have the meaning assigned to it in the Explanation to section 65 of the Information Technology Act, 2000.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ol start="3"&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;strong&gt;Penalty for unauthorised use by requesting entity and noncompliance with intimation requirements&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2010 Bill: Clause 40 of the Bill prescribed penalty for manipulating biometric information and stated that a person who gives/attempts to give any biometric information which does not pertain to him for the purpose of getting an Aadhaar number, authentication or updating his information, shall be punishable with imprisonment for a term which may extend to three years or with a fine which may extend to ten thousand rupees or with both.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2016 Bill:&amp;nbsp; Clause 40 prescribes penalty for a person, being a requesting entity, uses the identity information of an individual in contravention of clause 8(3) , to be punishable with imprisonment which may extend to three years or with a fine which may extend to ten thousand rupees or, in the case of a company, with a fine which may extend to one lakh rupees or with both. Clause 41 of the Bill states that Whoever, being an enrolling agency or a requesting entity, fails to comply with the requirements of clause 3(2)-list of details to be informed to the individual undergoing enrolment, and clause 8(3)-informing individual undergoing enrolment details for the purpose of authentication, shall be punishable with imprisonment which may extend to one year, or with a fine which may extend to ten thousand rupees or, in the case of a company, with a fine which may extend to one lakh rupees or with both.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ol start="4"&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;strong&gt;General Penalty&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2010 Bill: For an offence committed under the Act or rules made thereunder, for which no specific penalty was provided, the penalty was prescribed as imprisonment for a term which may extend to three years, or fine as prescribed.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2016 Bill &amp;nbsp;: For an offence committed under the Act or rules made thereunder, for which no specific penalty was provided, the penalty was prescribed as imprisonment for a term which may extend to one year, or fine as prescribed.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;h3 style="text-align: justify;" dir="ltr"&gt;Miscellaneous&lt;/h3&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ol&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;strong&gt;Power of Central Government to supersede Authority.&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2010 Bill: Clause 47(1)(c) stated that if at any time the Central Government is of the opinion that such circumstances exist which render it necessary in the public interest to supersede the Authority, may do so in the manner prescribed under this provision.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2016 Bill : Clause 48(1)(c) states that if at any time the Central Government is of the opinion that a public emergency exists, then the Central Government may supersede the Authority, in the manner prescribed under this provision.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ol start="2"&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;strong&gt;Power to remove difficulties.&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2010 Bill: The proviso to Clause 56(1) stated that an no order by Central Government, which may appear necessary to remove a difficulty in giving effect to the provisions of this Act, shall be made under this section after the expiry of two years from the commencement of this Act.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2016 Bill : The proviso to Clause 58(1) stated that an no order by Central Government, which may appear necessary to remove a difficulty in giving effect to the provisions of this Act, shall be made under this section after the expiry of three years from the commencement of this Act.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ol start="3"&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;strong&gt;Savings&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2010 Bill: Clause 57 provided that any action taken by the Central Government under the Resolution of the Government of India, Planning Commission bearing notification number A-43011/02/ 2009-Admin.I, dated the 28th January, 2009, shall be deemed to have been done or taken under the corresponding provisions of this Act.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2016 Bill : Clause 59 states that any action take by Central Government under &amp;nbsp;the Resolution of the Government of India, Planning Commission bearing notification number A-43011/02/2009-Admin. I, dated the 28th January, 2009, or by the Department of Electronics and Information Technology under the Cabinet Secretariat Notification bearing notification number S.O. 2492(E), dated the 12th September, 2015, as the case may be, shall be deemed to have been validly done or taken under this Act.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;h3 style="text-align: justify;" dir="ltr"&gt;Statement of Objects and Reasons&lt;/h3&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;2010 Bill: The Bill stated that the Central Government decided to issues &amp;nbsp;unique identification numbers to all residents in India, which involves collection of demographic, as well as biometric information. &amp;nbsp;The Unique Identification Authority of India was constituted as an executive body by the Government, vide its notification dated the 28th January, 2009. The Bill addressed and enlisted several issues with the issuance of &amp;nbsp;unique identification numbers which should be addressed by law and attract penalties, such as security and confidentiality of information, imposition of obligation of disclosure of information so collected in certain cases, impersonation at the time of enrolment, unauthorised access to the Central Identities Data Repository, manipulation of biometric information, investigation of certain acts constituting offence, and unauthorised disclosure of the information collected for the purposes of issuance of the numbers. To make the said Authority a statutory one, the National Identification Authority of India Bill, 2010 was proposed to establish the National Identification Authority of India to issue identification numbers and authenticate the Aadhaar number to facilitate access to benefits and services to such individuals to which they are entitled and for matters connected therewith or incidental thereto.Apart from the above mentioned purposes, The National Identification Authority of India Bill, 2010 also seeks to provide for the Authority to exercise powers and discharge functions so prescribed , ensure that the Authority does not require any individual to give information pertaining to his race, religion, caste, tribe, ethnicity, language, income or health, may engage entities to establish and maintain the Central Identities Data Repository and to perform any other functions as may be specified by regulations, constitute the &amp;nbsp;Identity Review Committee and take measures to ensure that the information in the possession or control of the Authority is secured and protected against any loss, unauthorised access or use or unauthorised disclosure thereof.&lt;/p&gt;
&lt;span id="docs-internal-guid-400d9138-596d-34f7-a004-875694b1e54e"&gt;2016 Bill: The Bill states that correct identification of targeted beneficiaries for delivery of subsidies, services, frants, benefits, etc has become a challenge for the Government and has proved to be a major hindrance for successful implementation of these programmes. In the absence of a credible system to authenticate identity of beneficiaries, it is difficult to ensure that the subsidies, benefits and services reach to intended beneficiaries. The Unique Identification Authority of India was established by a resolution of the Government of India, Planning Commission vide notification number A-43011/02/ 2009-Admin.I, dated the 28th January, 2009, to lay down policies and implement the Unique Identification Scheme of the Government, by which residents of India were to be provided unique identity number. Upon successful authentication, this number would serve as proof of identity for identification of beneficiaries for transfer of benefits, subsidies, services and other purposes. With increased use of the Aadhaar number, steps to ensure security of such information need to be taken and offences pertaining to certain unlawful actions, created. It has been felt that the processes of enrolment, authentication, security, confidentiality and use of Aadhaar related information must be made statutory. For this purpose, the Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Bill, 2016 seeks to provide for issuance of Aadhaar numbers to individuals on providing his demographic and biometric information to the Unique Identification Authority of India, requiring Aadhaar numbers for identifying an individual for delivery of benefits, subsidies, and services, authentication of the Aadhaar number, establishment of the Unique Identification Authority of India, maintenance and updating the information of individuals in the Central Identities Data Repository, state measures pertaining to security, privacy and confidentiality of information in possession or control of the Authority including information stored in the Central Identities Data Repository and identify offences and penalties for contravention of relevant statutory provisions.&lt;/span&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/a-comparison-of-the-2016-aadhaar-bill-and-the-2010-nidai-bill'&gt;https://cis-india.org/internet-governance/blog/a-comparison-of-the-2016-aadhaar-bill-and-the-2010-nidai-bill&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Vanya Rakesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>UID</dc:subject>
    

   <dc:date>2016-03-09T04:08:01Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/richa-mishra-hindu-businessline-march-13-2017-the-12-digit-conundrum">
    <title>The 12-digit conundrum</title>
    <link>https://cis-india.org/internet-governance/news/richa-mishra-hindu-businessline-march-13-2017-the-12-digit-conundrum</link>
    <description>
        &lt;b&gt;Even as the Centre plans to link as many as 500 schemes to Aadhaar, concerns over data safety are rising. Richa Mishra reports.&lt;/b&gt;
        &lt;p class="body" style="text-align: justify; "&gt;The article by Richa Mishra was published in the       &lt;a href="http://www.thehindubusinessline.com/specials/india-file/aadhaar-the-12digit-conundrum/article9582271.ece"&gt;Hindu         Businessline&lt;/a&gt; on March 13, 2017. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p class="body" style="text-align: justify; "&gt;The developments of last few weeks       seem to have made real some of the worst fears about Aadhaar. In       February, UIDAI (Unique Identification Authority of India) filed a       police complaint alleging attempts of unauthorised authentication       and impersonation of data related to Aadhaar. Since then, each and       every machinery within the government has been trying to convince       otherwise, that Aadhaar database is safe and secure, and that the       data is protected both by the best available advanced technology       as well as by the stringent legal provisions in the Aadhaar Act.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Not everyone is convinced. Critics       say, biometrics only make the citizen transparent to the State, it       does not make the State transparent to citizens. “We warned the       government six years ago, but they ignored us,” said Sunil       Abraham, Executive Director of Bengaluru-based research       organisation, Centre for Internet and Society. According to him,       the legislation implementing Aadhaar has almost no data protection       guarantees for citizens. He also believes that by opting for       biometrics instead of smart cards the government is using       surveillance technology instead of e-governance technology.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“Biometrics is remote, covert and       non-consensual identification technology. It is totally       inappropriate for authentication. This has only increased the       fragility of Indian cyber security,” he stresses.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;However, officials associated with       UIDAI dismiss these arguments. Collecting biometrics does not pose       any threat to the right to privacy because people have been giving       their thumb impression for ages, they say. “The biometrics are       encrypted at source and kept safe and secure. Unauthorised sharing       and leakage of the data does not happen. Fears related to       collection of biometrics are not justified,” an official at the       helm of affairs said. He requested anonymity.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“However, as and when we find that       some suspicious activity or misuse is happening, we will strike at       the very beginning itself. UIDAI has full authentication       regulation under the Aadhaar Act that has to be followed. It       specifies in what manner authorities can use Aadhaar,” the       official pointed out.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;b&gt;On the ground&lt;/b&gt;&lt;/div&gt;
&lt;p class="body" style="text-align: justify; "&gt;Even as the debate over data       security rages, the &lt;i&gt;aam aadmi &lt;/i&gt; seem to be little       perturbed about the alleged risks involved. For Padmini, who works       as a domestic help in East Delhi and is the sole bread earner for       her family of four, the Aadhaar card meant access to all       government benefits.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“&lt;i&gt;Koi farak nahi padta, kaun         dekhta hai mera card. Mujhko &lt;/i&gt;LPG cylinder &lt;i&gt;ka paisa bank         mein mil jata hai,”&lt;/i&gt; (It doesn’t matter to me who sees my       card. The subsidy for LPG gets transferred to my account) she       says. “&lt;i&gt;Baccho ke school admission mein bhi zaroorat pada,&lt;/i&gt;”       (I needed it to get my children’s admission in school), she added.       Sukh, a cab driver also uses it to get the LPG subsidy.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;While everyone &lt;i&gt;BusinessLine &lt;/i&gt;talked       to were convinced that Aadhaar was not a citizenship card, the       more aware ones saw it as a door that gave access to government       schemes.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;While they had a point, government       officials are careful to make it clear that Aadhaar is not       mandatory. But the popular perception increasingly points to the       opposite view, especially after it emerged that Aadhaar might be       made mandatory for children to receive midday meals at schools.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Another senior government official       said, “Aadhaar is not mandatory under any welfare scheme of the       government and no one is being deprived of a service or benefit       for the want of Aadhaar…it’s required for availing a       service/subsidy/benefit that accrues through the Consolidated Fund       of India.” He added that those who do not have the 12-digit number       would be provided with the facility to enrol by the Requiring       Agency. “And till the time Aadhaar is assigned, alternative IDs       would be allowed,” he said.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;If a school which has to get Aadhaar       enrolment done for its students puts the Aadhaar numbers of its       students on its site and the same is used by someone, you can’t       blame us, the official argues. Then, who is accountable?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Pushing for Aadhaar, the UIDAI       officials cite the example of Kerala’s Department of General       Education (DGE), which has integrated Aadhaar with the student       databases and has thereby optimised the teacher-student ratio and       identified the schools with excess teachers. In a single academic       year, 3,892 excess teacher posts were identified.&lt;/p&gt;
&lt;p class="_hoverrDone body" style="text-align: justify; "&gt;“Due to this exercise,       no new posts have been sanctioned for the last two years,       resulting in notional savings of ₹540 crore per annum,” said a       UIDAI official. After student enrolment in the state was linked to       Aadhaar since 2012-2013, the head count of pupils have fallen by 5       lakh. Similar trends have been reported in Haryana. Critics have       also pointed out the possible security risk in using AadhaarPay,       the Andriod-based app. Merchants can download the app in their       phone and install a fingerprint scanner linked to the phone.       Customers with Aadhaar numbers can use their fingerprints (like       the secret PIN in case of debit cards) to do a transaction. While       doubts have been raised about the safety of fingerprint data,       officials in the know blame the controversy on the “card lobbies.”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“Thirty crore Indians have no       mobiles. They find it difficult to handle password, pin or card,       this is where AadhaarPay will come handy,” the official added.       “They don’t need a smart phone or feature phone. They don’t need a       debit card.&lt;/p&gt;
&lt;p class="_hoverrDone body" style="text-align: justify; "&gt;“Today more than 112       crore people have the Aadhaar card. Approximately, 52.95 crore       people have linked their Aadhaar numbers to their bank accounts.       We already have a system of Aadhaar authentication in place,” the       official added.&lt;/p&gt;
&lt;p class="_hoverrDone body" style="text-align: justify; "&gt;Government officials are       at pain to point out the larger benefits of Aadhaar, including       savings of more than ₹49,000 crore by plugging leakages in       government schemes like PDS. Government plans to increase the       number of welfare schemes linked to Aadhaar from 36 to over 500.       While the intent is good, concerns remain.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/richa-mishra-hindu-businessline-march-13-2017-the-12-digit-conundrum'&gt;https://cis-india.org/internet-governance/news/richa-mishra-hindu-businessline-march-13-2017-the-12-digit-conundrum&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-03-14T13:50:05Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-guardian-march-21-2017-no-id-no-benefits">
    <title>No ID, no benefits: thousands could lose lifeline under India’s biometric scheme</title>
    <link>https://cis-india.org/internet-governance/news/the-guardian-march-21-2017-no-id-no-benefits</link>
    <description>
        &lt;b&gt;Controversial Aadhaar card restricts fundamental rights, argue critics, limiting access to free school meals and exposing 1 billion people to privacy risks.&lt;/b&gt;
        &lt;p&gt;The article was published in the &lt;a class="external-link" href="https://www.theguardian.com/global-development/2017/mar/21/no-id-no-benefits-thousands-could-lose-lifeline-india-biometric-scheme-aadhaar-card"&gt;Guardian&lt;/a&gt; on March 21, 2017. Sumandro Chattapadhyay was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img alt="An Aadhaar biometric identity card, which will be mandatory for Indians to access many essential government services and benefits." class="responsive-img maxed" src="https://i.guim.co.uk/img/media/cfb15b17bf824d857a561f3167b26793cb2e5583/0_136_4000_2400/master/4000.jpg?w=300&amp;amp;q=55&amp;amp;auto=format&amp;amp;usm=12&amp;amp;fit=max&amp;amp;s=5253b0eb088c65cfdc3b013302b0eb76" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span class="discreet"&gt;An Aadhaar biometric identity card, which will be mandatory for Indians  to access many essential government services and benefits. Photograph: Bloomberg/Getty Images&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Hundreds of thousands of people in &lt;a class="u-underline" href="https://www.theguardian.com/world/india"&gt;India&lt;/a&gt; could be left without essential government services and benefits –  including free school meals and uniforms, food subsidies and pensions –  under new rules that make access to more than three dozen state-funded  schemes conditional on showing identification.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Over the past month, citizens have been notified that they have to prove their identity with a biometric ID, known as an &lt;a class="u-underline" href="https://uidai.gov.in/"&gt;Aadhaar card&lt;/a&gt;,  to be eligible to use various services. Booking railway tickets online,  applying for some jobs, and getting fuel subsidies will also be  dependent on showing the controversial card.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aadhaar cards were introduced by the Indian government in 2009, and  rolled out by prime minister Narendra Modi in 2014. They record personal  biometric data, including fingerprints and eye scans, which the  government says allows it to ensure that welfare services are being  delivered to those who really need them, and saving billions of rupees  by reducing welfare fraud.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The &lt;a class="u-underline" href="https://uidai.gov.in/"&gt;Unique Identification Authority of India&lt;/a&gt; (UIDAI), which oversees the Aadhaar programme, says that more than 1.13  billion people have been enrolled on an official database. But  activists say that hundreds of thousands of Indians and migrants are  still undocumented and could miss out on their fundamental rights  because of the new rules.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“What if a Facebook account was necessary to log in to the internet,  and what if Facebook was owned by the government of the US?” asked  Sumandro Chattapadhyay, research director at the Centre for Internet and  Society (CIS), a thinktank with offices in Bangalore and Delhi. “We are  building a system that will decide whether a child will eat or not on  an afternoon based on [the] quality of internet connectivity and  cleanliness of the child’s thumbprint.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Chattapadhyay argued that Aadhaar, which is effectively being forced  upon Indians, and which is used increasingly by private companies,  exposed more than a billion people to huge privacy risks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The  Aadhaar ID is being connected to digital communications via sim card  registration, it is being connected to financial transactions via bank  accounts, and all Indian citizens are being forced to enrol for it  against the threat of losing out from welfare services,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The potential of unmonitored and unregulated use of such linked data  by the private sector is massive. It does not matter if the Indian  state will finally go ahead with implementing this system or not. The  fact that [it] is considering such a system is scary enough.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nanu Bhasin, spokesperson at the ministry of women and child  development, confirmed that the order to link Aadhaar to government  schemes had come directly from the Modi government. “There are leakages  in the system,” she said. “This will plug leakages.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Bhasin said Aadhaar was now mandatory: “You have to take it, it is  necessary. You cannot take the right to a benefit if you don’t have the  Aadhaar card.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;She said she did not know if those who did not want to enrol  in the scheme because of potential privacy risks would still be able to  receive benefits. “You have bank accounts, there you give all your  details, everything. Why make a fuss [about privacy] for Aadhaar?” she  said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of the most contentious new rules introduced this month, and  coming into force in July, requires children to show Aadhaar cards to  get free school meals. The notice led to a media storm in India, where  malnutrition rates are high and nearly &lt;a class="u-underline" href="http://www.worldbank.org/en/news/feature/2013/05/13/helping-india-combat-persistently-high-rates-of-malnutrition"&gt;60 million children&lt;/a&gt; are underweight.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On 7 March the government said &lt;a class="u-underline" href="http://pib.nic.in/newsite/PrintRelease.aspx?relid=158933"&gt;alternative forms of ID would be accepted&lt;/a&gt; for free school meals where people did not yet have Aadhaar cards, and  urged schools and childcare centres to enrol all attendees.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Activists argue that setting any barriers to free school meals is  unethical and unconstitutional. Ambarish Rai, national convenor of the  Right to Education Forum, said: “This is a very insensitive decision of  the government. How can you make it mandatory? It is a clear-cut  violation of the Right to Education Act 2009.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Compulsory identification could deter school attendance if children  struggle to get free school meals or uniforms, said Swati Narayan,  visiting research scholar from the LSE and food activist. “India’s  school meal programme covers almost 100 million children – the largest  in the world. Instead of creating unnecessary barriers, the focus should  be on how to improve these modest meals by adding eggs, fruit and  nutritious foods to the menu.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Glitches in the Aadhaar system have already led to reports of people  being unfairly denied government subsidies. In February, the news  website Scroll &lt;a class="u-underline" href="https://scroll.in/article/829071/in-jharkhand-compulsory-biometric-authentication-for-rations-sends-many-away-empty-handed"&gt;recorded a number of people in the state of Jharkhand being denied rice subsidies&lt;/a&gt; because of problems with Aadhaar card machines.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The constitutional validity of the government’s new orders is  currently being debated in court, with questions raised as to whether  the Indian parliament can restrict fundamental rights enshrined in the  constitution, and whether the government has the power to force citizens  to enrol.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2015, a supreme court order had ruled that the scheme was purely  voluntary, and that it could not become mandatory with a court ruling.  But in 2016, parliament passed the &lt;a class="u-underline" href="https://www.google.co.uk/url?sa=t&amp;amp;rct=j&amp;amp;q=&amp;amp;esrc=s&amp;amp;source=web&amp;amp;cd=6&amp;amp;ved=0ahUKEwi_2pSUx-XSAhUMjpAKHV1bDLIQFgg7MAU&amp;amp;url=https%3A%2F%2Fuidai.gov.in%2Fimages%2Fthe_aadhaar_act_2016.pdf&amp;amp;usg=AFQjCNHDmJKdO8jdfGZJKLKRJQpHdf1Frw&amp;amp;sig2=ds56EfksGTNm2PpBKqhjtA&amp;amp;cad=rja"&gt;Aadhaar Act&lt;/a&gt;, which allowed the government to require identification for government services.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Khagesh Jha, a lawyer and activist, argued that the act was  fundamentally unconstitutional. “Rescued children, children who have  been trafficked or those who have been forced into child labour – [you]  can’t expect them to hold an Aadhaar card or documents like a birth  certificate. Right to education is a fundamental right, and is protected  by the core of the constitution. It cannot be challenged by any other  document.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;UIDAI, the agency overseeing Aadhaar, issued a statement saying the government had &lt;a class="u-underline" href="http://pib.nic.in/newsite/PrintRelease.aspx?relid=158849"&gt;made savings of more than 490bn rupees&lt;/a&gt; (£6bn) in the past two and a half years, thanks to schemes linking  government benefits to Aadhaar. It added that during the past seven  years, there had been no report of a breach or leak of residents’ data.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-guardian-march-21-2017-no-id-no-benefits'&gt;https://cis-india.org/internet-governance/news/the-guardian-march-21-2017-no-id-no-benefits&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-03-22T14:27:25Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
