<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 131 to 145.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/huffington-post-rimin-dutt-ivan-mehta-march-24-2017-why-we-should-all-worry-about-the-mandatory-imposition-of-aadhaar"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/round-table-on-privacy-and-data-protection-at-nipfp"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/hindu-op-ed-sunil-abraham-march-31-2017-how-aadhaar-compromises-privacy-and-how-to-fix-it"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/analysis-of-key-provisions-of-aadhaar-act-regulations"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/hindu-businessline-shriya-mohan-the-aadhaar-of-all-things"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/trishi-jindal-and-s-vivek-beyond-the-pdp-bill"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/economic-and-political-weekly-july-17-2021-amber-sinha-pallavi-bedi-aman-nair-techno-solutionist-responses-to-covid-19"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/times-of-india-sandhya-soman-and-pratiksha-ramkumar-nov-7-2012-law-yet-to-catch-up-with-tech-enabled-peeping-toms"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/thinkdigit-internet-kul-bhushan-nov-15-2012-india-ranks-second-globally-in-accessing-private-details-of-users"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/livemint-october-18-2012-surabhi-agarwal-courts-approval-needed-to-tap-phones"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy-perspectives-on-the-2012-2013-goa-beach-shack-policy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/daily-pioneer-columnists-oct-29-2012-apar-gupta-bolstering-right-to-remain-private"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/manorama-may-2-2017-jikku-varghese-jacob-biggest-blast-on-aadhaar-leak-so-far-govt-sites-leaked-data-of-13-crore-people"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-wire-may-1-2015-130-million-aadhaar-numbers-were-made-public-says-new-report"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/livemint-may-2-2017-komal-gupta-govt-may-have-made-135-million-aadhaar-numbers-public-cis-report"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/huffington-post-rimin-dutt-ivan-mehta-march-24-2017-why-we-should-all-worry-about-the-mandatory-imposition-of-aadhaar">
    <title>Why We Should All Worry About The Mandatory Imposition Of Aadhaar</title>
    <link>https://cis-india.org/internet-governance/news/huffington-post-rimin-dutt-ivan-mehta-march-24-2017-why-we-should-all-worry-about-the-mandatory-imposition-of-aadhaar</link>
    <description>
        &lt;b&gt;It appears that with each passing day, the government is linking an increasing number of benefits and government services to the 12-digit biometric-based Aadhaar number for Indians, despite growing concerns around its data privacy and security.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Rimin Dutt and Ivan Mehta was published by &lt;a class="external-link" href="http://www.huffingtonpost.in/2017/03/24/why-we-should-all-worry-about-the-mandatory-imposition-of-aadhaa_a_22009826/"&gt;Huffington Post&lt;/a&gt; on March 24, 2017. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Aadhaar, which collects among other information, citizens' iris scans and fingerprints and stores them into a centralised database for a prolonged time with only loose guidelines and no pre-existing laws to ensure the privacy of that data, is now linked to no less than 38 government schemes, including the government's latest directive –- that Aadhaar become mandatory for tax filing and securing PAN numbers -- introduced by Finance Minister Arun Jaitley earlier this week.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Jaitley openly admitted on Wednesday in the Parliament that the government, in effect, would be forcing people to get Aadhaar in an effort to increase tax compliance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aadhaar's use, by no means, is restricted to government agencies alone. A  growing number of private financial institutions are now fulfilling  their "Know Your Customer" or e-KYC formalities by making Aadhaar  compulsory. The government is also in the &lt;a href="http://economictimes.indiatimes.com/news/economy/policy/aadhaar-based-kyc-likely-across-financial-sector/articleshow/57800209.cms" target="_blank"&gt;process&lt;/a&gt; of making Aadhaar the basis of all financial transactions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the timing of the government's aggressive push of Aadhaar, in itself, is raising eyebrows among &lt;a href="https://scroll.in/article/832503/what-explains-the-desperation-to-make-aadhaar-mandatory-for-tax-returns-after-july-1-2017" target="_blank"&gt;political observers&lt;/a&gt;, there are some serious concerns about this unique experiment that deserve stronger scrutiny.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Why disregard the Supreme Court?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In making Aadhaar mandatory for filing taxes and securing core  taxpayer identity, the government has openly gone against a Supreme  Court order from last year that explicitly stated that the Aadhaar Card  scheme is "purely voluntary" and cannot be made mandatory until the  court has decided on this.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government has defended its move, saying it is allowed to do so  under the Aadhaar (Targeted Delivery of Financial and Other Subsidies,  Benefits and Services) Act 2016.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, as Gopal Krishna, a member of the Citizens Forum for Civil Liberties, &lt;a target="_blank"&gt;writes&lt;/a&gt; in Business Today, the passage of the Act by the Parliament "does not  automatically imply that any agency can make UID/Aadhaar compulsory  disregarding the Supreme Court's orders."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to Krishna, in doing so, the government is "clearly  stepping beyond" the mandate of the Aadhaar Act, and also acting in  contempt of the Parliament, according to him.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition, if tax evasion was the driving factor behind the move,  it begs the question — wouldn't forcing people to get Aadhaar actually  do the opposite by adding another layer of hassle?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indeed, tax experts have noted how this requirement may hinder tax  collection. Archit Gupta, Founder &amp;amp; CEO ClearTax.com, a tax service  provider &lt;a href="http://www.huffingtonpost.in/2017/03/22/budget-part-ii-here-are-the-highlights-of-the-sweeping-changes_a_21905740/" target="_blank"&gt;told &lt;/a&gt;&lt;i&gt;HuffPost India, "&lt;/i&gt;The  [Aadhaar] announcement is likely to be a dampener to tax filers,  specially first-timers ... FY 2016-17 filing is expected to see a large  number of first-time filers due to demonetisation efforts, and this move  may make them more guarded."&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Why not strengthen PAN?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The government already has an extensive mandate for the Permanent  Account Number (PAN) cards, which are required to validate several  important services or for undertaking transactions such as buying and  selling property or jewellery worth over ₹2 lakhs. Last year, the  government, in fact, said that the National Pension System (NPS) scheme  would accept PAN cards over Aadhaar cards to validate new customers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On Wednesday, however, Jaitley said PAN cards have been misused by  certain people to evade taxes, and there are reports that Aadhaar may  become the ultimate authenticating document. However, the continued and  growing use of PAN along with Aadhaar adds an extra layer of formalities  for citizens to access government services, which are their  constitutionally guaranteed rights.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;How safe is Aadhaar anyway?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Depending on who you talk to, the safety concerns of Aadhaar come up  as a pressing issue, especially in the wake of a recent security  incident when the Unique Identification Authority of India initiated  police action against entities associated with Axis Bank including  Suvidhaa Infoserve and e-sign provider eMudhra, which had allegedly &lt;a href="http://www.livemint.com/Industry/IKgrYL5pg3eTgfaP253XKI/Aadhaar-data-breach-triggers-privacy-concerns.html" target="_blank"&gt;engaged &lt;/a&gt;in unauthorised authentication and impersonation by illegally storing Aadhaar biometrics.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Earlier this month, in a separate incident, security researcher  Srinivas Kodali warned Indian authorities of a website that was leaking  Aadhaar demographic data of over five lakh minors, as well as the  existence several parallel databases that had key identification data  linked to Aadhaar, &lt;i&gt;Scroll &lt;/i&gt;&lt;a href="https://scroll.in/article/830589/under-the-right-to-information-law-aadhaar-data-breaches-will-remain-a-state-secret" target="_blank"&gt;reported.&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the absence of any privacy laws in India, these security concerns have assumed even greater significance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;UIDAI, the authority behind Aadhaar, has &lt;a href="https://uidai.gov.in/images/news/Press_Statement_06032017.pdf" target="_blank"&gt;maintained &lt;/a&gt;the  technology behind Aadhaar is robust and that it uses advanced  encryption to transmit and store data. It specifically denied that any  breach of centralised data took place in the Axis Bank incident, saying  the case was an isolated incident.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, in a rather ironic twist in the Aadhaar Act, which itself  contains no provisions to address privacy concerns, any legal action  against any misuse or theft of Aadhaar data can only be initiated by  UIDAI, leaving citizens with no legal recourse should a breach occur.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;That represents an obvious conflict of interest as it gives exclusive  power to the very authority that is responsible for the security and  confidentiality of identity information and authentication records, PRS  Legislative Research, has noted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition, the controversial Aadhaar Act contains several other  inherent dangers such as the potential to profile citizens based on the  linking of other databases with Aadhaar by studying patterns of  behaviour.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Techniques such as running computer programmes across datasets for  pattern recognition can be used for various purposes such as detecting  potential illegal activities...However, these can also lead to  harassment of innocent individuals who get identified incorrectly as  potential threats," noted PRS Legislative.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are currently no safeguards to prevent inappropriate profiling,  instances of which could increase as more and more private  organisations link their data to Aadhaar, and potentially exploit data  for&lt;a href="https://scroll.in/article/824874/what-happens-to-privacy-when-companies-have-your-aadhaar-number" target="_blank"&gt; commercial purposes&lt;/a&gt; without the consent of citizens.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The US, in comparison, has laws in place that require agencies that  collects data to submit an annual report to US Congress on all such data  mining activities.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Other unresolved concerns&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;There are several other concerns related to the widespread use of  Aadhaar card and the power it is afforded under the Aadhar act. The act  allows UIDAI to collect biometric information beyond iris and  fingerprint scans, for example, to include other bio-data such as DNA,  noted PRS.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The act also allows private agencies to use Aadhaar, which  contradicts an earlier stated objective of the scheme that sought to  restrict the use of Aadhaar for only government expenditures.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"It allows private persons to use Aadhaar as a proof of identity for  any purpose. This provision will enable private entities such as,  airline, telecom, insurance, real estate etc. companies, to require  Aadhaar as a proof of identity for availing their services," PRS has  noted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There's also the worrying prospect of Aadhaar being used as a  surveillance tool by the government, instead of an e-governance  technology, Sunil Abraham, executive director of research organisation,  Centre for Internet and Society, &lt;a href="http://www.thehindubusinessline.com/specials/india-file/aadhaar-the-12digit-conundrum/article9582271.ece" target="_blank"&gt;told &lt;/a&gt;the &lt;i&gt;The Hindu Business Line, &lt;/i&gt;adding&lt;i&gt; &lt;/i&gt;biometrics only make citizens transparent to the state and not the state transparent to citizens.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"We warned the government six years ago, but they ignored us," said Abraham.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Krishna has a more dire &lt;a href="http://www.businesstoday.in/current/economy-politics/will-aadhaar-cause-death-of-civil-rights/story/248331.html" target="_blank"&gt;warning:&lt;/a&gt; "The JAM Trinity -- Jan Dhan Yojana, Aadhaar and mobile numbers -- may  well be a fish bait to trap unsuspecting citizens into the world's  biggest transnational biometric database to turn them into subjects  under surveillance forever in the name of a set of welfare and  anti-poverty policies.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;What has been done to address the security concerns?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;It is unclear what the government or UIDAI may have done in the wake  of the security incident to upgrade its systems. According to an expert &lt;i&gt;HuffPost Post India &lt;/i&gt;talked to, many third party apps that are using Aadhar data may not be screened or audited for security, which is a huge worry.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Kodali told HuffPost India that Aadhaar has potential design issues when it comes to information security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"By design it allows anyone store information of the Aadhaar holder  through [application programming interface]. This is creating many  parallel databases with Aadhaar as a key," he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He notes that security is an afterthought for many institutions and companies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"UIDAI and the architects of Aadhaar do not accept that data can be a  liability instead of an asset," he said. "The mandatory nature of  Aadhaar without the right infrastructure and skilled workforce is not  just a cyber security issue, but a national security issue."&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;When will India get privacy laws?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;No one quite knows. But there's a growing call for a need for strict  privacy laws, given the move towards digital financial transactions and  growing e-commerce use. Most advanced economies including the US, the  UK, France, Australia and New Zealand have &lt;a href="http://www.pcquest.com/no-your-aadhaar-data-is-not-secure/" target="_blank"&gt;enacted privacy laws.&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, in India, the right to privacy still doesn't exist despite  it being recognised by even the UN charter of human rights. Article 12  of the Universal Declaration of Human Rights states, "No one shall be  subjected to arbitrary interference with his privacy, family, home or  correspondence, nor to attacks upon his honour and reputation. Everyone  has the right to the protection of the law against such interference or  attacks."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The potential for cyber criminals to misuse citizen data isn't lost on even prominent IT industry experts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Recently, the chief of IT industry body Nasscom R Chandrashekhar &lt;a href="http://tech.firstpost.com/news-analysis/nasscom-chief-saying-full-data-protection-isnt-possible-should-wake-us-from-our-digital-slumber-367183.html" target="_blank"&gt;told&lt;/a&gt; &lt;i&gt;PTI &lt;/i&gt;that  personal data of online consumers can never be fully secure,  emphasising the need for strict consumer protection laws. "More than 3  million credit card data details were misused recently. Let us face it,  these kind of security breaches will take place. There is nothing called  fully perfect security in IT," he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To be sure, Aadhaar has been lauded by several prominent experts and  economists, and it is, undoubtedly, an ambitious project to potentially  aid financial inclusion for a large population that has historically  been outside of a formal financial services net. India also has one of  the lowest tax compliance rates, making tax collection a priority for  the government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Recently, Paul Romer, World Bank's chief economist &lt;a href="https://qz.com/933907/paul-romer-on-aadhaar-world-banks-top-economist-says-indias-controversial-id-program-should-be-a-model-for-other-nations/" target="_blank"&gt;told &lt;/a&gt;&lt;i&gt;Bloomberg, "&lt;/i&gt;The  system in India is the most sophisticated that I've seen ... It's the  basis for all kinds of connections that involve things like financial  transactions. It could be good for the world if this became widely  adopted."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But given the sensitivity of citizen biometrics data and potential  for misuse, the government ought to be held accountable for its proper  use and ensure enough safeguards are put in place before its imposition  on each citizen.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;&lt;b&gt; &lt;/b&gt;&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/huffington-post-rimin-dutt-ivan-mehta-march-24-2017-why-we-should-all-worry-about-the-mandatory-imposition-of-aadhaar'&gt;https://cis-india.org/internet-governance/news/huffington-post-rimin-dutt-ivan-mehta-march-24-2017-why-we-should-all-worry-about-the-mandatory-imposition-of-aadhaar&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-03-27T15:02:10Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/round-table-on-privacy-and-data-protection-at-nipfp">
    <title>Round Table on Privacy and Data Protection at NIPFP </title>
    <link>https://cis-india.org/internet-governance/news/round-table-on-privacy-and-data-protection-at-nipfp</link>
    <description>
        &lt;b&gt;National Institute of Public Finance &amp; Policy organized a round-table on privacy and data protection on March 24, 2017 in New Delhi. &lt;/b&gt;
        &lt;p&gt;Click to see the &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/nipfp-round-table-on-privacy-and-data-protection"&gt;agenda&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/round-table-on-privacy-and-data-protection-at-nipfp'&gt;https://cis-india.org/internet-governance/news/round-table-on-privacy-and-data-protection-at-nipfp&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-03-27T16:02:59Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/hindu-op-ed-sunil-abraham-march-31-2017-how-aadhaar-compromises-privacy-and-how-to-fix-it">
    <title>How Aadhaar compromises privacy? And how to fix it?</title>
    <link>https://cis-india.org/internet-governance/blog/hindu-op-ed-sunil-abraham-march-31-2017-how-aadhaar-compromises-privacy-and-how-to-fix-it</link>
    <description>
        &lt;b&gt;Aadhaar is mass surveillance technology. Unlike targeted surveillance which is a good thing, and essential for national security and public order – mass surveillance undermines security. And while biometrics is appropriate for targeted surveillance by the state – it is wholly inappropriate for everyday transactions between the state and law abiding citizens. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The op-ed was published in the &lt;a class="external-link" href="http://www.thehindu.com/opinion/op-ed/is-aadhaar-a-breach-of-privacy/article17745615.ece"&gt;Hindu&lt;/a&gt; on March 31, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;When assessing a technology, don't ask - “what use is it being put to today?”. Instead, ask “what use can it be put to tomorrow and by whom?”. The original noble intentions of the Aadhaar project will not constrain those in the future that want to take full advantage of its technological possibilities.  However, rather than frame the surveillance potential of Aadhaar in a negative tone as three problem statements - I will propose three modifications to the project that will reduce but not eliminate its surveillance potential.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Shift from biometrics to smart cards:&lt;/b&gt;&lt;span&gt; In January 2011, the Centre for Internet and Society had written to the parliamentary finance committee that was reviewing what was then called the “National Identification Authority of India Bill 2010”. We provided nine reasons for the government to stop using biometrics and instead use an open smart card standard. Biometrics allows for identification of citizens even when they don't want to be identified. Even unconscious and dead citizens can be identified using biometrics. Smart cards, on the other hand, require pins and thus citizens' conscious cooperation during the identification process. Once you flush your smart cards down the toilet nobody can use them to identify you. Consent is baked into the design of the technology. If the UIDAI adopts smart cards, we can destroy the centralized database of biometrics just like the UK government did in 2010 under Theresa May's tenure as Home Secretary. This would completely eliminate the risk of foreign governments, criminals and terrorists using the biometric database to remotely, covertly and non-consensually identify Indians.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Destroy the authentication transaction database:&lt;/b&gt;&lt;span&gt; The Aadhaar Authentication Regulations 2016 specifies that transaction data will be archived for five years after the date of the transaction. Even though the UIDAI claims that this is a zero knowledge database from the perspective of “reasons for authentication”, any big data expert will tell you that it is trivial to guess what is going on using the unique identifiers for the registered devices and time stamps that are used for authentication.  That is how they put Rajat Gupta and Raj Rajratnam in prison. There was nothing in the payload ie. voice recordings of the tapped telephone conversations – the conviction was based on meta-data. Smart cards based on open standards allow for decentralized authentication by multiple entities and therefore eliminate the need for a centralized transaction database.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Prohibit the use of Aadhaar number in other databases:&lt;/b&gt;&lt;span&gt; We must, as a nation, get over our obsession with Know Your Customer [KYC] requirements. For example, for SIM cards there is no KYC requirement is most developed countries. Our insistence on KYC has only resulted in retardation of Internet adoption, a black market for ID documents and unnecessary wastage of resources by telecom companies. It has not prevented criminals and terrorists from using phones. Where we must absolutely have KYC for the purposes of security, elimination of ghosts and regulatory compliance – we must use a token issued by UIDAI instead of the Aadhaar number itself. This would make it harder for unauthorized parties to combine databases while at the same time, enabling law enforcement agencies to combine databases using the appropriate authorizations and infrastructure like NATGRID. The NATGRID, unlike Aadhaar, is not a centralized database. It is a standard and platform for the express assembly of sub-sets of up to 20 databases which is then accessed by up to 12 law enforcement and intelligence agencies.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;To conclude, even as a surveillance project – Aadhaar is very poorly designed. The technology needs fixing today, the law can wait for tomorrow.&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/hindu-op-ed-sunil-abraham-march-31-2017-how-aadhaar-compromises-privacy-and-how-to-fix-it'&gt;https://cis-india.org/internet-governance/blog/hindu-op-ed-sunil-abraham-march-31-2017-how-aadhaar-compromises-privacy-and-how-to-fix-it&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-04-01T07:00:06Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/analysis-of-key-provisions-of-aadhaar-act-regulations">
    <title>Analysis of Key Provisions of the Aadhaar Act Regulations </title>
    <link>https://cis-india.org/internet-governance/blog/analysis-of-key-provisions-of-aadhaar-act-regulations</link>
    <description>
        &lt;b&gt;In exercise of their powers under of the powers conferred by Aadhaar (Targeted Delivery of Financial and other Subsidies, Benefits and Services) Act, 2016, (Aadhaar Act) the UIDAI has come out with a set of five regulations in late 2016 last year. In this policy brief, we look at the five regulations, their key provisions and highlight point out the unresolved, issues, unaddressed, and created issues as result of these   regulations. &lt;/b&gt;
        &lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;This blog post was edited by Elonnai Hickok&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;h3 style="text-align: justify; "&gt;Introduction&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;At the outset it is important to note that a concerning feature of these regulations is that they intend to govern the processes of a body which has been in existence for over six years, and has engaged in all the activities sought to be governed by these policies at a massive scale, considering the claims of over one billion Aadhaar number holders. However, the regulation do not acknowledge, let alone address past processes, practices, enrollments, authentications, use of technology etc.  this fact, and there are no provisions that effectively address  the past operations of the UIDAI. Below is an analysis of the five regulations issued thus far by the UIDAI.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Unique Identification Authority of India (Transactions of Business at Meetings of the Authority) Regulations&lt;a href="#_ftn1" name="_ftnref1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;These regulations framed under clause (h) of sub-section (2) of section 54 read with sub-section (1) of section 19 of the Aadhaar Act, deal with the meetings of the UIDAI, the process following up to each meeting, and the manner in which all meetings are to be conducted.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;Provision: Sub-Regulation 3.&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Meetings of the Authority– (1) There shall be no less than three meetings of the Authority in a financial year on such dates and at such places as the Chairperson may direct and the interval between any two meetings shall not in any case, be longer than five months&lt;/p&gt;
&lt;h5 style="text-align: justify; "&gt;Observations:&lt;/h5&gt;
&lt;p style="text-align: justify; "&gt;The number of times that UIDAI would meet in a year is far too less, taking in account the significance of the responsibilities of UIDAI as the sole body for policy making for all issues related to Aadhaar. In contrast, the Telecom Regulatory Authority of India is required to meet at least once a month. Other bodies such as SEBI and IRDAI are also required to meet at least four times&lt;a href="#_ftn2" name="_ftnref2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and six times&lt;a href="#_ftn3" name="_ftnref3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; in a year respectively.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;Provision: Sub-Regulation 8 (5)&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Decisions taken at every meeting of the Authority shall be published on the website of Authority unless the Chairperson determines otherwise on grounds of ensuring confidentiality.&lt;/p&gt;
&lt;h5 style="text-align: justify; "&gt;Observations:&lt;/h5&gt;
&lt;p style="text-align: justify; "&gt;The Chairperson has the power to determine withholding publication of the decisions of the meeting on the broad grounds of ‘confidentiality’. Given the fact that the decisions taken by UIDAI as a public body can have very real implications for the rights of residents, the ground of confidentiality is not sufficient to warrant withholding publication. It is curious that instead of referring to the clearly defined exceptions laid down in other similar provisions such as the exceptions in Section 8 of the Right to Information Act, 2005, the rules merely refer to vague and undefined criteria of ‘confidentiality’.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;Provision: Sub-Regulation 14 (4)&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Members of the Authority and invitees shall sign an initial Declaration at the first meeting of the Authority for maintaining the confidentiality of the business transacted at meetings of the Authority in Schedule II.&lt;/p&gt;
&lt;h5 style="text-align: justify; "&gt;Observations:&lt;/h5&gt;
&lt;p style="text-align: justify; "&gt;The above provision, combined with the fact that there is no provision regarding publication of the minutes of the meetings of UIDAI raise serious questions about the transparency of  its functioning.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Unique Identification Authority of India (Enrolment and Update) Regulations&lt;a href="#_ftn4" name="_ftnref4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;These regulations, framed under  sub-section (1), and sub-clauses (a), (b), (d,) (e), (j), (k), (l), (n), (r), (s), and (v) of sub-section (2), of Section 54 of the Aadhaar Act deals with the enrolment process, the generation of an Aadhaar number, updation of information and governs the conduct of enrolment agencies and associated third parties.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;Provisions:&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Sub-Regulation 8 (2), (3) and (4)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The standard enrolment/update software shall have the security features as may be specified by the Authority for this purpose.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;All equipment used in enrolment, such as computers, printers, biometric devices and other accessories shall be as per the specifications issued by the Authority for this purpose.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The biometric devices used for enrolment shall meet the specifications, and shall be certified as per the procedure, as may be specified by the Authority for this purpose.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sub-Regulation 3 (2)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The standards for collecting the biometric information shall be as specified by the Authority for this purpose.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sub-Regulation 4 (5)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The standards of the above demographic information shall be as may be specified by the Authority for this purpose.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sub-Regulation 6 (2)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For residents who are unable to provide any biometric information contemplated by these regulations, the Authority shall provide for handling of such exceptions in the enrolment and update software, and such enrolment shall be carried out as per the procedure as may be specified by the Authority for this purpose.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sub-Regulation 14 (2)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In case of rejection due to duplicate enrolment, resident may be informed about the enrolment against which his Aadhaar number has been generated in the manner as may be specified by the Authority.&lt;/p&gt;
&lt;h5 style="text-align: justify; "&gt;Observations:&lt;/h5&gt;
&lt;p style="text-align: justify; "&gt;Though in February 2017,  the UIDAI published technical specifications for registered devices&lt;a href="#_ftn5" name="_ftnref5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, the regulations  leave unaddressed issues such as lack of appropriately defined security safeguards in the Aadhaar. There is a general trend of continued deferrals in the regulations by stating that matters would be specified later on important aspects such as rejection of applications, uploading of the enrolment packet to the CIDR, the procedure for enrolling residents with biometric exceptions, the procedure for informing residents about acceptance/rejection of enrolment application, specifying the convenience fee for updation of residents’ information, the procedure for authenticating individuals across services etc.c. There is a clear failure to exercise the mandate delegated to UIDAI, leaving key matters to determined at a future unspecified date. The delay and ambiguity around when regulations will be defined is  all the more problematic  in light of the fact that the project has been implemented since 2010 and the Aadhaar number is now mandatory for availing a number of services.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further it is important to note that a number of policies put out by the UIDAI predate these regulations, on which the regulations are  completely silent, thus neither endorsing previous policies  nor suggesting that they may be revisited. Further, the regulations choose to not engage with the question of operation of the Aadhaar project, enrolment and storage of data etc prior to the notification of these regulations, or the policies which these regulations may regularise. For instance, the regulations do not specify any measures to deal with issues arising out of enrolment devices used prior to the development of the February 2017 specifications.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;Provision: Sub-Regulation 32&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;The Authority shall set up a contact centre to act as a central point of contact for resolution of queries and grievances of residents, accessible to residents through toll free number(s) and/ or e-mail, as may be specified by the Authority for this purpose.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) The contact centre shall:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Provide a mechanism to log queries or grievances and provide residents with a unique reference number for further tracking till closure of the matter;&lt;/li&gt;
&lt;li&gt;Provide regional language support to the extent possible;&lt;/li&gt;
&lt;li&gt;Ensure safety of any information received from residents in relation to their identity information;&lt;/li&gt;
&lt;li&gt;Comply with the procedures and processes as may be specified by the Authority for this purpose.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;(3) Residents may also raise grievances by visiting the regional offices of the Authority or through any other officers or channels as may be specified by the Authority.&lt;/p&gt;
&lt;h5 style="text-align: justify; "&gt;Observations:&lt;/h5&gt;
&lt;p style="text-align: justify; "&gt;While the setting up of a grievance redressal mechanism under the regulations is a welcome move, there is little clarity about the procedure to be followed, nor is a timeline for it specified. The chapter on grievance redressal is in fact one of the shortest chapters in the regulations. The only provision in this chapter deals with the setting up of a contact centre, a curious choice of term for what is supposed to be the primary quasi judicial grievance redressal body for the Aadhaar project. In line with the indifferent and insouciant terminology of ‘contact centre’, the chapter is restricted to the matters of the logging of queries and grievances by the contact centre, and does not address the matter of procedure or timelines, and even the substantive provisions about the nature of redress available. Furthermore, the obligation on the contact centre to protect information received is limited to ‘ensuring safety’ an ambiguous standard that does not speak to any other standards in Indian law.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Aadhaar (Authentication) Regulations, 2016&lt;a href="#_ftn6" name="_ftnref6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;These regulations, framed under  sub-section (1), and sub-clauses (f) and (w) of sub-section (2) of Section 54 of the Aadhaar Act deals with the authentication framework for Aadhaar numbers, the governance of authentication agencies and the procedure for collection, storage of authentication data and records.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;Provisions:&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Sub-Regulation 5 (1)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the time of authentication, a requesting entity shall inform the Aadhaar number holder of the following details:—&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) the nature of information that will be shared by the Authority upon authentication;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) the uses to which the information received during authentication may be put; and&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(c) alternatives to submission of identity information&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sub-Regulation 6 (2)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A requesting entity shall obtain the consent referred to in sub-regulation (1) above in physical or preferably in electronic form and maintain logs or records of the consent obtained in the manner and form as may be specified by the Authority for this purpose.&lt;/p&gt;
&lt;h5 style="text-align: justify; "&gt;Observations:&lt;/h5&gt;
&lt;p style="text-align: justify; "&gt;Sub-regulation 5 mentions that at the time of authentication, requesting entities shall inform the Aadhaar number holder of alternatives to submission of identity information for the purpose of authentication. Similarly, sub-regulation 6 mentions that requesting entity shall obtain the consent of the Aadhaar number holder for the authentication. However, in neither of the above circumstances do the regulations specify the clearly defined options that must be made available to the Aadhaar number holder in case they do not wish submit identity information, nor do the regulations specify the procedure to be followed in case the Aadhaar number holder does not provide consent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Most significantly, this provision does little by way of allaying the fears raised by the language in Section 8 (4) of the Aadhaar Act which states that UIDAI “shall respond to an authentication query with a positive, negative or any other appropriate response sharing such identity information.” This section gives a very wide discretion to UIDAI to share personal identity information with third parties, and the regulations do not temper or qualify this power in any way.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;Sub-Regulation 11 (1) and (4)&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;The Authority may enable an Aadhaar number holder to permanently lock his biometrics and temporarily unlock it when needed for biometric authentication.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Authority may make provisions for Aadhaar number holders to remove such permanent locks at any point in a secure manner.&lt;/p&gt;
&lt;h5 style="text-align: justify; "&gt;Observations:&lt;/h5&gt;
&lt;p style="text-align: justify; "&gt;A welcome provision in the regulation is that of biometric locking which allows Aadhaar number holders to permanently lock his biometrics and temporarily unlock it only when needed for biometric authentication. However, in the same breath, the regulation also provides for the UIDAI to make provisions to remove such locking without any specified grounds for doing so.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;Provision: Sub-Regulation 18 (2), (3) and (4)&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;The logs of authentication transactions shall be maintained by the requesting entity for a period of 2 (two) years, during which period an Aadhaar number holder shall have the right to access such logs, in accordance with the procedure as may be specified.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Upon expiry of the period specified in sub-regulation (2), the logs shall be archived for a period of five years or the number of years as required by the laws or regulations governing the entity, whichever is later, and upon expiry of the said period, the logs shall be deleted except those records required to be retained by a court or required to be retained for any pending disputes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The requesting entity shall not share the authentication logs with any person other than the concerned Aadhaar number holder upon his request or for grievance redressal and resolution of disputes or with the Authority for audit purposes. The authentication logs shall not be used for any purpose other than stated in this sub-regulation.&lt;/p&gt;
&lt;h5 style="text-align: justify; "&gt;Observations:&lt;/h5&gt;
&lt;p style="text-align: justify; "&gt;While it is specified that the authentication logs collected by the requesting entities shall not be shared with any person other than the concerned Aadhaar number holder upon their request or for grievance redressal and resolution of disputes or with the Authority for audit purposes, and that the authentication logs may not be used for any other purpose, the maintenance of the logs for a period of seven years seems excessive. Similarly, the UIDAI is also supposed to store Authentication transaction data for over five years. This is in violation of the widely recognized data minimisation principles which seeks that data collectors and data processors delete personal data records when the purpose for which it has been collected if fulfilled. While retention of data for audit and dispute-resolution purpose is legitimate, the lack of specification of security standards and the overall lack of transparency and inadequate grievance redressal mechanism greatly exacerbate the risks associated with data retention.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Aadhaar (Sharing of Information) Regulations, 2016 and Aadhaar (Data security) Regulations, 2016&lt;a href="#_ftn7" name="_ftnref7"&gt;&lt;sup&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Framed under the powers conferred by sub-section (1), and sub-clause (o) of sub-section (2), of Section 54 read with sub-clause (k) of sub-section (2) of Section 23, and sub-sections&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) and (4) of Section 29, of the Aadhaar Act, the Sharing of Information regulations look at the restrictions on sharing of identity information collected by the UIDAI and requesting entities. The Data Security regulation, framed under powers conferred by clause (p) of subsection (2) of section 54 of the Aadhaar Act, looks at security obligations of all service providers engaged by the UIDAI.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;Provision: Sub-Regulation 6 (1)&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;All agencies, consultants, advisors and other service providers engaged by the Authority, and ecosystem partners such as registrars, requesting entities, Authentication User Agencies and Authentication Service Agencies shall get their operations audited by an information systems auditor certified by a recognised body under the Information Technology Act, 2000 and furnish certified audit reports to the Authority, upon request or at time periods specified by the Authority.&lt;/p&gt;
&lt;h5 style="text-align: justify; "&gt;Observations:&lt;/h5&gt;
&lt;p style="text-align: justify; "&gt;The regulation states that audits shall be conducted by an information systems auditor certified by a recognised body under the Information Technology Act, 2000. However, there is no such certifying body under the Information Technology Act. This suggests a lack of diligence in framing the rules, and will inevitably to lead to inordinate delays, or alternately, a lack of a clear procedure in the appointment of  an auditor. Further, instead of prescribing a regular and proactive process of audits, the regulation only limits audits to when requested or as deemed appropriate by UIDAI. This is another, in line of many provisions, whose implication is power being concentrated in the hands of  UIDAI, with little scope for accountability and transparency.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Conclusion&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In conclusion, it must be stated that the regulations promulgated by the UIDAI leave a lot to be desired. Some of the most important issues raised against the Aadhaar Act, which were delegated to the UIDAI’s rule making powers have not been addressed at all. Some of the most important issues such as data security policies, right to access records of Aadhaar number holders, procedure to be followed by the grievance redressal bodies, uploading of the enrolment packet to the CIDR, procedure for enrolling residents with biometric exceptions, procedure for informing residents about acceptance/rejection of enrolment application have left unaddressed and ‘may be specified’ at a later data. These failures leave a gaping hole especially in light of the absence of a comprehensive data protection legislation in India, as well the speed and haste with the enrolment and seeding has been done by the UIDAI, and the number of services, both private and public, which are using or planning to use the Aadhaar number and the authentication process as a primary identifier for residents.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Available at &lt;a href="https://uidai.gov.in/legal-framework/acts/regulations.html"&gt;https://uidai.gov.in/legal-framework/acts/regulations.html&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;a href="https://www.irda.gov.in/ADMINCMS/cms/frmGeneral_Layout.aspx?page=PageNo62&amp;amp;flag=1"&gt;https://www.irda.gov.in/ADMINCMS/cms/frmGeneral_Layout.aspx?page=PageNo62&amp;amp;flag=1&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://www.sebi.gov.in/acts/boardregu.html"&gt;http://www.sebi.gov.in/acts/boardregu.html&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Available at &lt;a href="https://uidai.gov.in/legal-framework/acts/regulations.html"&gt;https://uidai.gov.in/legal-framework/acts/regulations.html&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Available at:  https://uidai.gov.in/images/resource/aadhaar_registered_devices_2_0_09112016.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Available at &lt;a href="https://uidai.gov.in/legal-framework/acts/regulations.html"&gt;https://uidai.gov.in/legal-framework/acts/regulations.html&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;&lt;sup&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Available at &lt;a href="https://uidai.gov.in/legal-framework/acts/regulations.html"&gt;https://uidai.gov.in/legal-framework/acts/regulations.html&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/analysis-of-key-provisions-of-aadhaar-act-regulations'&gt;https://cis-india.org/internet-governance/blog/analysis-of-key-provisions-of-aadhaar-act-regulations&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>UIDAI</dc:subject>
    
    
        <dc:subject>Biometrics</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    

   <dc:date>2017-04-03T14:05:01Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/hindu-businessline-shriya-mohan-the-aadhaar-of-all-things">
    <title>The Aadhaar of all things</title>
    <link>https://cis-india.org/internet-governance/news/hindu-businessline-shriya-mohan-the-aadhaar-of-all-things</link>
    <description>
        &lt;b&gt;From a severely critical stand against Aadhaar in 2014, the Modi-led BJP in power has made a sharp U-turn to bulldoze its way into having every Indian scanned, tagged and labelled. A timeline of the country’s chequered date with the unique identification project.&lt;/b&gt;
        &lt;p&gt;The article by Shriya Mohan was published in the &lt;a class="external-link" href="http://www.thehindubusinessline.com/blink/cover/the-aadhaar-of-all-things/article9609603.ece"&gt;Hindu Businessline &lt;/a&gt;on March 31, 2017. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;You’ve probably read the WhatsApp joke about a post-Aadhaar scenario in  2020 India. A man orders pizza over phone. He is asked for his Aadhaar  number first. He then orders a family-size seafood pizza, only to be  reminded by the attendant about his high blood pressure and cholesterol  levels (thanks to his Aadhaar history visible to everybody “on the  system”) and is advised to order the low-fat Hokkien Mee pizza instead,  based on his recent search history on Hokkien cuisine. As if this isn’t  creepy enough, the pizza guy refuses a card payment, citing the man’s  maxed-out credit cards, advises against ATM withdrawal owing to his  massive overdraft and even decides to hold off the free cola offer given  his dire health situation. When the man turns livid, he is told to mind  his language, given that in 2007 he was already imprisoned for verbally  abusing a policeman!&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;2020 is two and a half years away, and the WhatsApp scenario appears less incredulous by the day.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;By the government’s latest estimate, 112,01,12,468 Aadhaar cards have  been issued since January 2009, when the Unique Identification Authority  of India (UIDAI) was set up under the Planning Commission. So if you  are an adult Indian resident without an Aadhaar card, you are in a two  per cent minority (98 per cent adults are covered).&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Last week, Finance Minister Arun Jaitley said the 12-digit number would  be the single monolith identity for all Indians in the coming years,  replacing every other identity card. The government is serious because  each week a new scheme is added to the three dozen schemes in which  Aadhaar has been made mandatory. All the 84 schemes under the direct  subsidy benefit transfer programme are expected to follow suit.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Here are just a few instances in which you should be ready to whip out  your Aadhaar card — a free midday meal at a government school, access to  Sarv Shiksha Abhiyan, LPG subsidy and foodgrains under the public  distribution system, six scholarship schemes for students with  disabilities, getting your EPF pensions, booking a train ticket online,  getting a backward caste quota or benefit, and, according to the most  recent directive in the Finance Bill, filing your tax returns.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Why did a dispensation so critical of Aadhaar in 2014 make a sharp  U-turn to bulldoze its way into having every single Indian citizen  scanned, tagged and labelled?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The earliest felt need for an identification project can be traced to  the Kargil Review Committee, instituted by the Vajpayee Government in  1999, in the wake of the Indo-Pak war. The Krishnaswamy Subrahmanyam-led  panel had recommended a citizenship database for the identification of  legitimate Indian citizens living in border areas.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;As outlined in a Scroll article, this quickly expanded to include all  Indians under the Multipurpose National Identity Card project, which was  pilot tested in a few villages. The Citizenship Act was also amended to  give a legislative backing to the scheme, which built on the Bharatiya  Janata Party’s general stance against illegal immigrants.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;The search for identity&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The Citizenship Act was amended in 2004 by the incumbent Congress  government to make way for the National Population Register (NPR), a  database of the identities of all Indian residents, maintained by the  Registrar General and Census Commissioner of India.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Eventually, in 2009, Aadhaar, or UIDAI, surfaced as a 12-digit  identification number that served as proof of identity and address —  meaning, it applies to all residents whether they are citizens or not,  unlike with the NPR. Aadhaar, which means ‘basis’ in Hindi, is intended  to be an all-encompassing substratum of identities that can provide  “instant access to services like banking, mobile phone connections and  other government and non-government services”. The United Progressive  Alliance government managed to link it to its Direct Benefit Transfer  (DBT) system for subsidies provided to targeted groups.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;As the main Opposition party, the BJP had felt that the Aadhaar number  ought to have been given only to Indian citizens, and not all residents,  which, in its view, would include millions of illegal immigrants.&lt;/p&gt;
&lt;p class="_hoverrDone body" style="text-align: justify; "&gt;Nandan Nilekani, the former CEO of IT giant Infosys, was appointed UIDAI  chairman in July 2009. The first Aadhaar number was issued in September  2010, and then the pace accelerated: 100 million by November 2011, 200  million by February 2012 and 500 million by end of 2013. “We felt speed  was strategic. Doing and scaling things quickly was critical. If you  move very quickly it doesn’t give opposition the time to consolidate,”  Nilekani told Forbes India in a 2013 interview.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Here’s the part most of us forget: The largest opposition that Nilekani was referring to at that time was the BJP.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“The people who thought of themselves as having given birth to IT in  this country refused to listen to a common man like me. Even the SC has  demanded answers,” Narendra Modi, then Gujarat chief minister, had said  and alleged that the Aadhaar programme was a bundle of lies to loot the  country’s treasury.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;As the BJP’s prime ministerial candidate for the 2014 Lok Sabha  elections, days ahead of delivering the party’s biggest-ever victory, he  had tweeted: “On Aadhaar, neither the Team that I met nor PM could  answer my Qs on security threat it can pose. There is no vision, only  political gimmick.” Recently, when Aadhaar enrolments had crossed the  billion mark, this tweet was dug out prominently.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;The U-turn&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;So, what changed? How did the Aadhaar’s primary opposition become it’s key crusader?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;There were two meetings that supposedly changed the destiny of the  Aadhaar project. In the first week of June 2014, as Nilekani was  vacating his government-allotted Lutyen’s bungalow as UIDAI chief, he  met Modi and Jaitley and persuaded the new regime to persist with  Aadhaar. The more important meeting was with Vijay Madan, the UIDAI  director general and mission director. According to a Governance Now  article, when the UID team spoke of the potential savings from plugging  subsidy leakages, and weeding out “ghost beneficiaries”, Modi asked them  to give a precise estimate. The figure was “up to ₹50,000 crore a year”  or a good 9.4 per cent of India’s ₹5,31,177-crore fiscal deficit.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Modi in his keenness to showcase the arrival of “acche din” immediately  sought a 100-crore enrolment target at the ‘earliest’, putting paid to  speculations that the new government would shelve the UIDAI project. A  funding of ₹2,039.64 crore was formalised in the 2014-2015 Budget  presented a week later, to create the infrastructure to enrol 30 crore  people to add to the 70 crore already enrolled. The UIDAI targeted the  1-billion mark by the end of that fiscal.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Money bill to beat legal hurdles&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;It was in November 2012 that the SC admitted a PIL filed by retired  Karnataka High Court judge KS Puttaswamy and advocate Parvesh Khanna,  questioning the government’s decision to issue Aadhaar even as the  National Identification Authority of India Bill 2010 was pending before  the Rajya Sabha since December 3, 2010. They argued that there was no  legislative backing for obtaining personal information. Also, the  proposed law was rejected by the Parliamentary Standing Committee on  Finance.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The PIL argued that linking the Aadhaar number with food security, LPG  subsidy, the Employees’ Provident Fund and other direct benefit  transfers made the enrolment mandatory, thereby falsifying the  government’s claim that it was voluntary. Several other PILs too voiced  similar privacy concerns.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Currently, there are two legal strictures governing the validity of  Aadhaar: the apex court order of October 15, 2015, limiting the card’s  voluntary use to six schemes (PDS, MGNREGA, LPG, NEPS and social  assistance programmes) and prohibiting the government from making it  mandatory for receiving any benefits or services; and the Aadhaar  (Targeted Delivery of Financial and Other Subsidies, Benefits and  Services) Act, 2016, which is under challenge today. Both strictures  have distinct operational status, but petitioners argue that recent  government directives making Aadhaar mandatory are leading them to  wonder whether the SC’s interim order is overshadowed by the Aadhaar Act  or if the government is defying the court.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;On March 3, 2016, in a surprise move, to put all dissent to rest, the  Aadhaar Act was introduced as a Money Bill in Parliament to give it  legislative backing. Things moved pretty fast thereon. On March 11, the  Aadhaar Act 2016 was passed in the Lok Sabha. On March 26, the Act was  notified. Accusing the BJP-led NDA government of showing “utter  contempt” for the Rajya Sabha by taking the Money Bill route, senior  Congress leader Jairam Ramesh challenged it in the Supreme Court in  April. He likened the use of the Money Bill, which was passed overruling  amendments moved in the Rajya Sabha, to “knocking a nail in the coffin  of the Upper House”.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The government’s move took many, including Aadhaar advocates, by  surprise. “We need to separate Aadhaar as identity from its specific  functionality for which it’s used,” says Praveen Chakravarty, a senior  fellow at the IDFC institute and a former member of Nilekani’s core  team. He believes that just as a voter ID alone isn’t enough to vote,  seeing the ownership of an Aadhaar card as key for any transaction is  “fear-mongering”. Its use will still involve a process of checks and  balances.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;But can’t thumb prints be replicated with Fevicol?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“Sure, there could be failures, as there are with any system. But this  is a far more foolproof method than any we’ve had before.  Internationally also, biometric is to authenticate a higher level of  security.”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;The argument for privacy&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“Aadhaar has the potential to improve welfare service delivery. But it  has to be achieved in an inclusive manner befitting a truly liberal  society and not through coercion,” says Chakravarty.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;His only misgiving is with the use of the Money Bill to introduce the  Aadhaar, without any right to privacy. “It should have gone through the  process of debate in Parliament. Then it wouldn’t have been passed  without a strong right to privacy safeguard,” he says, pointing that  even a junior UIDAI officer can access the data of anybody he/she  chooses.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“Aadhaar inverts the idea of transparency. It makes people transparent  but the State opaque,” says legal expert Usha Ramanathan, a legal expert  and anti-Aadhaar crusader.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The use of Aadhar as verification at every instance can help piece  together very detailed information about citizens. These include banking  transactions, online purchases, travel itineraries, mobile phone usage,  location history and practically anything that can be electronically  recorded and verified with an Aadhaar.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;In February this year, the UIDAI filed a police case against Axis Bank  and others for alleged unauthorised authentication and impersonation  attempts by illegally storing Aadhaar biometrics.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The latest outcry over breached privacy involved a screenshot of  cricketer Mahendra Singh Dhoni’s personal details that went viral on  Twitter. The UIDAI blacklisted the agency that revealed Dhoni’s Aadhaar  details after his wife complained to the IT Minister. A recent Scroll  report shows the UIDAI received 1,390 similar complaints but took no  action.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;There are legitimate fears such an information database might eventually  be misused, for instance in racial profiling or revealing voting  preferences.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;In January this year, Hyderabad-based ECIL developed a biometric-enabled  mobile terminal for instant authentication of a voter “to prevent  rigging of votes”. Till August 2015, the Election Commission was working  on seeding Aadhaar data with that of voter ID card, in an attempt to  weed out fake voters. However, the poll panel stopped this exercise  after the SC ruled that Aadhaar be made compulsory only for PDS and LPG  distribution.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;a href="http://www.thehindubusinessline.com/blink/cover/nandan-nilekani-demonising-of-aadhaar-is-irresponsible/article9608232.ece" target="_blank"&gt;Nilekani, in an interview to BLink&lt;/a&gt;,  insisted that the Aadhaar has more privacy regulations than any other  service in the world. He also pointed out that all election commission  data is already online, and anyone can look up any voter’s name, date of  birth, gender and address.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Additionally, social media profiles too are shared publicly of our own volition.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Concurring with this view, Chakravarty says, “It is surprising that  we’re perfectly okay with giving all our life information to a  32-year-old named Mark Zuckerberg. However, this is voluntary. Whether  we fully know consequences or not is another matter altogether.”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;With the Finance Bill requiring all PAN cards to be linked to Aadhaar,  there is added concern over privacy. Sunil Abraham, founder of the  Centre for Internet and Society, says Aadhaar runs the risk of being  used fraudulently. “If I want to get you in trouble, I can make a large  purchase of gold against your Aadhaar number, which is linked to your  PAN,” he explains.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;He advocates for a system where different government departments don’t  store Aadhaar numbers in their databases but instead use a token issued  by UIADI kiosks. This would prevent proliferation of the number.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Technical glitches&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;In February this year, Modi claimed in the Lok Sabha that plugging  leakages through Aadhaar had saved the government ₹14,000 crore. And  that nearly four crore fake ration cards have been seized till date.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;One method of establishing a fake ration card is if the owner has not  availed himself of his ration. Ever since Aadhaar’s biometric  identification has been linked to point-of-sale (POS) machines at ration  shops, residents have had to queue up with a prayer on their lips. A  lot could go wrong — the biometric might not recognise them or, worse,  there could be a network failure, forcing everyone to return home  empty-handed. In both instances, while ration shop owners should ideally  mark such transactions under ‘Transactions with “N” response from  Aadhaar’, they invariably mark them under “Household yet to take  ration”, implying that the beneficiary has chosen not to take home her  share.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The February 2017 data for 22 ration shops across Delhi, accessed on the  Department of Food &amp;amp; Supplies website, shows that none have a  single beneficiary marked under “N”. At a Delhi Cantonment outlet, of  the 1,038 registered beneficiaries only 168 have been marked “Y”, or  ‘Yes’, showing they have taken their rations. Another 871 have been  marked “Household yet to take ration” and none have been marked ‘N’ to  indicate glitches in the Aadhaar authentication.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;As Amrita Johri of citizens’ action group Satark Nagrik Sangathan  explains, “Aadhaar relies on internet and electricity. This might seem  like a problem only of rural areas. But we don’t have to go far. In  South Delhi’s East Mehraam Nagar, there is a ration shop with no mobile  signal and no network. Officials said we have to show that Aadhaar is a  success, so the shop’s POS machine was finally hung on a jamun tree to  get it to work.”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;She questions the government’s reluctance to acknowledge the many instances of failure in the project.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Frighteningly, three consecutive failed attempts could lead to the card  being placed in an abeyance list and possibly invalidated.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Top performers and laggards&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Delhi is rated one of the better performing States/union territories,  while Rajasthan has one of the worst records with the maximum number of  biometric and network failures.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;According to the government’s 2017 monthly estimates, 27 per cent of the  residents whose Aadhaar cards have been seeded to the PDS were denied  rations owing to biometric or network failure. This figure would be  higher if the unseeded cards are also taken into account.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Nikhil Dey, founder of Rajasthan’s Mazdoor Kisan Shakti Sangathan (MKSS)  says his organisation is fighting with its back against a wall.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“Nearly 73 lakh households get their monthly rations in this State,  where a little over a crore households are eligible to receive them.  We’re not even talking about exclusions here,” says Dey. Besides network  failure, there are many instances of the old and sick who are unable to  visit the shop to physically verify themselves.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“Back-up options such as OTP (one-time password) or facial recognition  only work in theory,” says Dey. He alleges that shop owners often fudge  the OTP system by punching in their own numbers and stealing the quotas  of genuine beneficiaries.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;He too believes that several names have been struck off as dead to  project that the Aadhaar has weeded out a high number of fake social  security pension ers.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Nilekani applauds Andhra Pradesh for its progress in the Aadhaar project  by investing in infrastructure to eliminate technical glitches. J  Satyanarayana, the UIDAI’s part-time chairperson, told BLink in an email  interview that Aadhaar has led to transparency and efficiency in nearly  all government schemes in AP.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;During March 2017, 42.29 lakh (93.02 per cent) pensioners received their  payment through Aadhaar-based biometric authentication, he says, adding  that real-time monitoring systems are in place.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“The entire PDS (rations) is linked to Aadhaar,” he says. As many as  1.21 crore (87.39 per cent) card holders collected their ration this  month, and 95.94 lakh received wages (totalling ₹5,283 crore under  MNREGA through Aadhaar-enabled systems, he informs.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Neighbouring Telangana too is known for its 99 per cent Aadhaar  enrollment, leading to an impressive 80 per cent of its population  accessing the PDS.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;BP Acharya, special chief secretary in Telangana’s planning department  says, “Aadhaar’s use can perhaps be most seen in Telangana’s speedy  clearances, investment promotion, creating licences and clearances for  shops and establishments.”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Telangana took the Aadhaar database project one step further through its  Citizen 360 programme. In August 2014, months after the State was newly  formed, it conducted one of the largest household surveys in a single  day, covering one crore households. This data was integrated with the  Aadhaar database and now links different benefits on the same platform.  Now the Aadhaar identity is linked to other details such as the holder’s  driving licence and even crime record.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The UIDAI holds out AP and Telangana as shining examples of Aadhaar’s  efficiency when backed by the right network and infrastructure. But for  the lakhs of biometric factory rejects who are denied their rights,  Aadhaar can only mean a mass experiment gone horribly wrong.&lt;/p&gt;
&lt;table class="plain" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p class="body"&gt;&lt;b&gt;&lt;i&gt;Aadhaar Timeline&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;2006&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The ministry of communications and information technology approves the  ‘Unique ID for Below Poverty Line (BPL) families’ project under the  chairmanship of Arvind Virmani, then principal advisor, Planning  Commission&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;2008&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Empowered group of ministers formed by former Prime Minister Manmohan  Singh decides to collate two schemes — the National Population Register  under the Citizenship Act, 1955 and the UID project — to conceive  Aadhaar.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;2009&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Planning Commission issues a notification to constitute the Unique Identification Authority of India (UIDAI).&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Government appoints Infosys co-founder Nandan Nilekani as the first  chairman of UIDAI, with the rank and status of a cabinet minister.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;2012&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Former Karnataka high court judge justice K Puttaswamy files a public  interest litigation before the Supreme Court (SC) declaring that Aadhaar  violates an individual’s right to privacy and that the scheme lacks  legislative backing.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;2014&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;In an interim order, the SC restrains the UIDAI from transferring  biometric information with an Aadhaar number to any other agency without  the individual’s consent in writing.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;2015&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Three-judge bench of the apex court rules the unique identity number is  not mandatory to avail of benefits from government programmes,  restricting the use of Aadhaar to beneficiaries of the public  distribution system and subsidies on cooking gas and kerosene, and  refers the question on privacy to a larger constitution bench.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Centre moves SC seeking a review and modification of the August 11  interim order. A five-judge constitution bench modifies the same and  extends the use of Aadhaar to Mahatma Gandhi National Rural Employment  Guarantee Scheme, Jan Dhan Yojana, pensions and the Employees’ Provident  Fund scheme.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;2016&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Finance minister Arun Jaitley announces in the budget speech that the  government will offer statutory backing for Aadhaar. The Lok Sabha  passes the Aadhaar (Targeted Delivery of Financial and Other Subsidies,  Benefits and Services) Bill, 2016 as a Money Bill, rejecting Rajya Sabha  recommendations.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;2017&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Aadhaar is made mandatory for three dozen schemes with 84 more expected  under direct benefit transfers, including midday meal scheme and  universal education.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;SC again rules that Aadhaar cannot be made mandatory for welfare schemes.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/hindu-businessline-shriya-mohan-the-aadhaar-of-all-things'&gt;https://cis-india.org/internet-governance/news/hindu-businessline-shriya-mohan-the-aadhaar-of-all-things&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-04-03T15:46:23Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/trishi-jindal-and-s-vivek-beyond-the-pdp-bill">
    <title>Beyond the PDP Bill: Governance Choices for the DPA</title>
    <link>https://cis-india.org/internet-governance/blog/trishi-jindal-and-s-vivek-beyond-the-pdp-bill</link>
    <description>
        &lt;b&gt;This article  examines the specific governance choices the Data Protection Authority (DPA) in India  must deliberate on vis-à-vis its standard-setting function, which are distinct from those it will encounter as part of its enforcement and supervision functions.&lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;The Personal Data Protection Bill, 2019, was introduced in the Lok Sabha on 11 December 2019. It lays down an overarching framework for personal data protection in India. Once revised and approved by Parliament, it is likely to establish the first comprehensive data protection framework for India. However, the provisions of the Bill are only one component of the forthcoming data protection framework It further proposes setting up the Data Protection Authority (DPA) to oversee the final enforcement, supervision, and standard-setting. The Bill consciously chooses to vest the responsibility of administering the framework with a regulator instead of a government department. As an independent agency, the DPA is expected to be autonomous from the legislature and the Central Government and capable of making expert-driven regulatory decisions in enforcing the framework.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Furthermore, the DPA is not merely an implementing authority; it is also expected to develop privacy regulations for India by setting standards. As such, it will set the day-to-day obligations of regulated entities under its supervision. Thus, the effectiveness with which it carries out its functions will be the primary determinant of the impact of this Bill (or a revised version thereof) and the data protection framework set out under it.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The final version for the PDP Bill may or may not provide the DPA with clear guidance regarding its functions. In this article, we emphasise the need to look beyond the Bill and instead examine the specific governance choices the DPA must deliberate on vis-à-vis its standard-setting function, which are distinct from those it will encounter as part of its enforcement and supervision functions.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;A brief timeline of the genesis of a distinct privacy regulator for India&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The vision of an independent regulator for data protection in India emerged over the course of several intervening processes that set out to revise India’s data protection laws. In fact, the need for a dedicated data protection regulation for India, with enforceable obligations and rights, was debated years before the &lt;a href="https://thewire.in/government/privacy-aadhaar-supreme-court"&gt;Aadhaar&lt;/a&gt;, &lt;a href="https://www.thehindu.com/news/national/urgent-need-for-data-protection-laws-experts/article23314655.ece"&gt;Cambridge Analytica&lt;/a&gt;, and &lt;a href="https://www.livemint.com/opinion/online-views/pegasus-has-given-privacy-legislation-a-jab-of-urgency-11628181453098.html"&gt;Pegasus&lt;/a&gt;&lt;sup&gt; &lt;/sup&gt;revelations captured the public imagination and mainstreamed conversations on privacy.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The &lt;a href="https://cis-india.org/internet-governance/draft-bill-on-right-to-privacy"&gt;Right to Privacy Bill, 2011&lt;/a&gt;, which never took off, recognised the right to privacy in line with Article 21 of the Constitution of India, which pertains to the right to life and personal liberty. The Bill laid down express conditions for collecting and processing data and the rights of data subjects. It also proposed setting up a Data Protection Authority (DPA) to supervise and enforce the law and advise the government in policy matters. Upon review by the Cabinet, it was &lt;a href="https://cis-india.org/internet-governance/draft-bill-on-right-to-privacy"&gt;suggested&lt;/a&gt; that the Authority be revised to an Advisory Council, given its role under the Bill was limited.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Subsequently, in 2012, the AP Shah Committee Report &lt;a href="https://cis-india.org/internet-governance/blog/report-of-group-of-experts-on-privacy.pdf"&gt;recommended&lt;/a&gt; a principle-based data protection law, focusing on set standards while refraining from providing granular rules, to be enforced through a co-regulatory structure. This structure would consist of central and regional-level privacy commissioners, self-regulatory bodies, and data protection officers appointed by data controllers. There were also a few private members’ bills &lt;a href="https://saveourprivacy.in/media/all/Brief-PDP-Bill-25.12.2020.pdf"&gt;introduced&lt;/a&gt; between 2011 and 2019.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;None of these efforts materialised, and the regulatory regime for data protection and privacy remained embedded within the Information Technology Act, 2000, and the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011 (SPDI Rules). Though the &lt;a href="https://www.meity.gov.in/writereaddata/files/GSR313E_10511%281%29_0.pdf"&gt;SPDI Rules&lt;/a&gt; require body corporates to secure personal data, their enforcement is &lt;a href="https://www.indiacode.nic.in/show-data?actid=AC_CEN_45_76_00001_200021_1517807324077&amp;amp;orderno=49"&gt;limited&lt;/a&gt; to cases of negligence in abiding by these limited set of obligations pertaining to sensitive personal information only, and which have caused wrongful loss or gain – a high threshold to prove for aggrieved individuals. Otherwise, the &lt;a href="https://www.meity.gov.in/writereaddata/files/GSR314E_10511%281%29_0.pdf"&gt;Intermediary Guidelines&lt;/a&gt;, 2011 require all intermediaries to generally follow these Rules under Rule 3(8).&amp;nbsp; The enforcement of these obligations is &lt;a href="https://www.ikigailaw.com/dispute-resolution-framework-under-the-information-technology-act-2000/#acceptLicense"&gt;entrusted&lt;/a&gt; to adjudicating officers (AO) appointed by the central government, who are typically bureaucrats appointed as AOs in an ex-officio capacity.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;By 2017, the Aadhaar litigations had provided additional traction to the calls for a dedicated and enforceable data protection framework in India. In its judgement, the Supreme Court &lt;a href="https://main.sci.gov.in/supremecourt/2012/35071/35071_2012_Judgement_24-Aug-2017.pdf"&gt;recognised&lt;/a&gt; the right to privacy as a fundamental right in India and stressed the need for a dedicated data protection law. Around the same time, the Ministry of Electronics and Information Technology (MeitY) constituted a &lt;a href="https://pib.gov.in/newsite/PrintRelease.aspx?relid=169420"&gt;committee of experts&lt;/a&gt; under the chairmanship of Justice BN Srikrishna. The Srikrishna Committee undertook public consultations on a 2017 &lt;a href="https://www.meity.gov.in/writereaddata/files/white_paper_on_data_protection_in_india_171127_final_v2.pdf"&gt;white paper&lt;/a&gt;, which culminated in the nearly comprehensive &lt;a href="https://www.meity.gov.in/writereaddata/files/Personal_Data_Protection_Bill,2018.pdf"&gt;Personal Data Protection Bill, 2018&lt;/a&gt;, and an accompanying &lt;a href="https://www.meity.gov.in/writereaddata/files/Data_Protection_Committee_Report.pdf"&gt;report&lt;/a&gt;. This 2018 Bill outlined a regulatory framework of personal data processing for India and defined data processing entities as fiduciaries, which owe a duty of care to individuals to whom personal data relates. The Bill provided for the setting up of an independent regulator that would, among other things, specify further standards for data protection and administer and enforce the provisions of the Bill.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;MeitY invited public comments on this Bill and tabled a revised version, the Personal Data Protection &lt;a href="http://164.100.47.4/BillsTexts/LSBillTexts/Asintroduced/373_2019_LS_Eng.pdf"&gt;Bill&lt;/a&gt;, 2019 (PDP Bill), in the Lok Sabha in December 2019. Following public pressure calling for detailed discussions on the Bill before its passing, it was referred to a &lt;a href="http://loksabhaph.nic.in/Committee/CommitteeInformation.aspx?comm_code=73&amp;amp;tab=1"&gt;Joint Parliamentary Committee&lt;/a&gt; (JPC) constituted for this purpose. It currently remains under review; the JPC is &lt;a href="https://www.hindustantimes.com/india-news/need-state-level-data-protection-authorities-joint-parliamentary-committee-mp-amar-patnaik-101632679181340.html"&gt;reportedly&lt;/a&gt; expected to table its report in the 2021 Winter Session of Parliament. Though the Bill is likely to undergo another &lt;a href="https://www.hindustantimes.com/india-news/over-100-drafting-changes-proposed-to-jpc-on-data-protection-bill-101631730726756.html"&gt;round of revisions&lt;/a&gt; following the JPC’s review, this is the closest India has come to realising its aspirations of establishing a dedicated and enforceable data protection framework.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This Bill carries forward the choice of a distinct regulatory body, though &lt;a href="https://thewire.in/tech/india-data-protection-authority-needs-constitutional-entrenchment"&gt;questions remain&lt;/a&gt; on the degree of its independence, given the direct control granted to the central government in appointing its members and funding the DPA.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Conceptualising an Independent DPA&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The Srikrishna Committee’s 2017 white paper and its 2018 report on the PDP Bill discuss the need for a regulator in the context of &lt;em&gt;enforcement&lt;/em&gt; of its provisions. However, the DPA under the PDP Bill is tasked with extensive powers to frame detailed regulations and codes of conduct to inform the day-to-day obligations of data fiduciaries and processors. To be clear, the standard-setting function for a regulator &lt;a href="https://ssrn.com/abstract=1393647"&gt;entails&lt;/a&gt; laying down the standards based on which regulated entities (i.e. the data fiduciaries) will be held accountable, and the manner in which they may conduct themselves while undertaking the regulated activity (i.e. personal data processing). This is in addition to its administrative and enforcement, and quasi-judicial functions, as outlined below:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Functions of the DPA under the PDP Bill 2019&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;&lt;img src="https://cis-india.org/home-images/PDPBill.png/@@images/93bcf598-962a-48f1-b1b1-78933dac5d27.png" alt="null" class="image-inline" title="PDP" /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;At this stage, it is important to note that the choice of regulation via a regulator is distinct from the administration of the Bill by the central or state governments. Creating a distinct regulatory body allows government procedures to be replaced with expert-driven decision-making to ensure sound economic regulation of the sector. At the same time, the independence of the regulatory authority &lt;a href="https://www.oxfordhandbooks.com/view/10.1093/law/9780198704898.001.0001/oxfordhb-9780198704898"&gt;insulates it&lt;/a&gt; from political processes. The third advantage of independent regulatory authorities is the scope for ‘operational flexibility’, which is embodied in the relative autonomy of its employees and its decision-making from government scrutiny.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This is also the rationale provided by the Srikrishna Committee in stating their choice to entrust the administration of the data protection law to an independent DPA. The 2017 white paper that preceded the 2018 Srikrishna Committee Report proposed a distinct regulator to provide expert-driven enforcement of laws for the highly specialised data protection sphere. Secondly, the regulator would serve as a single point of contact for entities seeking guidance and will ensure consistency by issuing rules, standards, and guidelines. The Srikrishna Committee Report concretised this idea and proposed a sector-agnostic regulator that is expected to &lt;a href="https://www.meity.gov.in/writereaddata/files/Data_Protection_Committee_Report.pdf"&gt;undertake&lt;/a&gt; expertise-driven standard-setting, enforcement, and adjudication under the Bill.&lt;sup&gt; &lt;/sup&gt; The PDP Bill carries forward this conception of a DPA, which is distinct from the central government.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Conceptualised as such, the DPA has a completely new set of questions to contend with. Specifically, regulatory bodies require additional safeguards to overcome the legitimacy and accountability questions that &lt;a href="https://www.oxfordhandbooks.com/view/10.1093/law/9780198704898.001.0001/oxfordhb-9780198704898"&gt;arise&lt;/a&gt; when law-making is carried out not by elected members of the legislature, but via the unelected executive. The DPA would need to incorporate democratic decision-making processes to overcome the deficit of public participation in an expert-driven body. Thus, the meta-objective of ensuring autonomous, expertise-driven, and legitimate regulation of personal data processing necessitates that the regulator has sufficient independence from political interference, is populated with subject matter experts and competent decision-makers, and further has democratic decision-making procedures.&lt;/p&gt;
&lt;p&gt;Further, the standard-setting role of the regulator does not receive sufficient attention in terms of providing distinct procedural or substantive safeguards either in the legislation or public policy guidance.&lt;/p&gt;
&lt;h3&gt;Reconnaissance under the PDP Bill: How well does it guide the DPA?&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;At this time, the PDP Bill is the primary guidance document that defines the DPA and its overall structure. India also lacks an overarching statute or binding framework that lays down granular guidance on regulation-making by regulatory agencies.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The PDP Bill, in its current iteration, sets out skeletal provisions to guide the DPA in achieving its objectives. Specifically,&amp;nbsp; the Bill provides guidance limited to the following:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify;"&gt;&lt;em&gt;Parliamentary scrutiny of regulations:&lt;/em&gt; The DPA must table all its regulations before the Parliament. This is meant to accord &lt;a href="https://www.nipfp.org.in/media/medialibrary/2018/08/WP_237_2018_0ciIwuT.pdf"&gt;legislative scrutiny&lt;/a&gt; to binding legal standards promulgated by unelected officials.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;em&gt;Consistency with the Act:&lt;/em&gt; All regulations should be consistent with the Act and the rules framed under it. This integrates a standard of administrative law to a limited extent within the regulation-making process. &lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;However, India’s past track record &lt;a href="https://prsindia.org/theprsblog/how-well-does-parliament-examine-rules-framed-under-various-laws"&gt;indicates&lt;/a&gt; that regulations, once tabled before the Parliament, are rarely questioned or scrutinised. Judicial review is typically based on ‘thin’ procedural considerations such as whether the regulation is unconstitutional, arbitrary, &lt;em&gt;ultra vires&lt;/em&gt;, or goes beyond the statutory obligations or jurisdiction of the regulator. In any event, judicial review is possible only when an instrument is challenged by a litigant, and, therefore, it may not always be a robust &lt;em&gt;ex-ante&lt;/em&gt; check on the exercise of this power. A third challenge arises where instruments other than regulations are issued by the regulator. These could be circulars, directions, guidelines, and even FAQs, which are &lt;a href="https://www.nipfp.org.in/media/medialibrary/2018/08/WP_237_2018_0ciIwuT.pdf"&gt;rarely bound&lt;/a&gt; by even the minimal procedural mandate of being tabled before the Parliament. To be sure, older regulators including the Reserve Bank of India (RBI) and the Securities and Exchange Board of India (SEBI) also face similar issues, which they have attempted to address through various methods including voluntary public consultations, stakeholder meetings, and publication of minutes of meetings. These are useful tools for the DPA to consider as well.&lt;/p&gt;
&lt;p&gt;Apart from these, specific guidance is provided with respect to issuing and approving codes of practice and issuing directions as follows:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify;"&gt;Codes of practice: The DPA is required to (i) ensure transparency,&lt;a href="file:///C:/Users/Admin/AppData/Local/Temp/211105_Governance%20Choices%20for%20the%20DPA%20(1).docx#_ftn1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; (ii) consult with other sectoral regulators and stakeholders, and (iii) follow a procedure to be prescribed by the central government prior to the notification of codes of practice under the Bill.&lt;a href="file:///C:/Users/Admin/AppData/Local/Temp/211105_Governance%20Choices%20for%20the%20DPA%20(1).docx#_ftn2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Directions: The DPA may issue directions to individual, regulated entities or their classes from time to time, provided these entities have been given the opportunity to be heard by the DPA before such directions are issued.&lt;a href="file:///C:/Users/Admin/AppData/Local/Temp/211105_Governance%20Choices%20for%20the%20DPA%20(1).docx#_ftn3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;However, the meaning of transparency and the process for engaging with sectoral regulators remains unspecified under the Bill. Furthermore, the central government has been provided vast discretion to formulate these procedures, as the Bill does not specify the principles or outcomes sought to be achieved via these procedures. The Bill also does not specify instances where such directions may be issued and in which form.&lt;/p&gt;
&lt;p&gt;Thus, as per its last publicly available iteration, the Bill remains silent on the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The principles that may guide the DPA in its functioning.&lt;/li&gt;
&lt;li&gt;The procedure to be followed for issuing regulations and other subordinate legislation under the Bill.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;The relevant regulatory instruments, other than regulations and codes of practice – such as circulars, guidelines, FAQs, etc. – that may be issued by the DPA.&lt;/li&gt;
&lt;li&gt;The specifics regarding the members and employees within the DPA who are empowered to make these regulations.&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;It is unclear whether the JPC will revise the DPA’s structure or recommend statutory guidance for the DPA in executing any of its functions. This is unlikely, given that parent statutes for other regulators typically omit such guidance. As a result, the DPA may be required to make intentional and proactive choices on these matters, much like their regulatory counterparts in India. These are discussed in the section below.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Envisaging a Proactive Role for the DPA&lt;/h3&gt;
&lt;p&gt;As the primary regulatory body in charge of the enforcement of the forthcoming data protection framework, what should be the role of the DPA in setting standards for data protection?&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The complexity of the subject matter, and the DPA’s role as the frontline body to define day-to-day operational standards for data protection for the entire digital economy, necessitates that it develop transparent guiding principles and procedures. Furthermore, given that the DPA’s autonomy and capacity are currently unclear, the DPA will need to make deliberate choices regarding how it conducts itself. In this regard, the skeletal nature of the PDP Bill also allows the DPA to determine its own procedures to carry out its tasks effectively.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This is not uncommon in India: various regulators have devised frameworks to create benchmarks for themselves. The Airports Economic Regulatory Authority (AERA) is &lt;a href="http://aera.gov.in/aera/upload/uploadfiles/files/AERAACT.pdf"&gt;obligated&lt;/a&gt; to follow a dedicated consultation process as per an explicit transparency mandate under the parent statute. However, the Insolvency and Bankruptcy Board of India (IBBI) has, on its own initiative, &lt;a href="https://ibbi.gov.in/webadmin/pdf/legalframwork/2018/Oct/IBBI(Mechamism%20for%20Issuing%20Regulations)%20Regulations,%202018_2018-10-26%2011:59:43.pdf"&gt;formulated regulations&lt;/a&gt; to guide its regulation-making functions. In other cases, consultation processes have been integrated into the respective framework through judicial intervention: the Telecom Regulatory Authority of India (TRAI) has been mandated to undertake consultations through &lt;a href="https://clpr.org.in/wp-content/uploads/2018/10/Cellular-Operators-v.-TRAI.pdf"&gt;judicial interpretation&lt;/a&gt; of the requirement for transparency under the Telecom Regulatory Authority of India Act, 1997 (TRAI Act).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In this regard, we develop a list of considerations that the DPA should look to address while carrying out its standard-setting functions. We also draw on best practices by Indian regulators and abroad, which can help identify feasible solutions for an effective DPA for India.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The choice of regulatory instruments&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The DPA is empowered to issue regulations, codes of practice, and directions under the Bill. At the same time, regulators in India routinely issue other regulatory instruments to assign obligations and clarify them. Some commonly used regulatory instruments are outlined below. The terms used for instruments are not standard across regulators, and the list and description set out below outline the main concepts and not fixed labels for the instruments.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;Overview of regulatory instruments&lt;/em&gt;&lt;/strong&gt;&lt;em&gt; &lt;/em&gt;&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Circulars   and Master Circulars&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Guidelines&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;FAQs&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Directions&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Content&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Circulars are used to prescribe detailed obligations   and prohibitions for regulated entities and can mimic regulations. Master   circulars consolidate circulars on a particular topic periodically.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;These may be administrative or substantive,   depending on the practice of the regulator in question.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Issued in public interest by regulators to   clarify the regulatory framework administered by them. They cannot prescribe   new standards or create obligations.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Issued to provide focused instructions to   individual entities or class of entities in response to an adjudicatory   action or in lieu of a current challenge.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Binding   character&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;They are generally &lt;a href="https://indiankanoon.org/doc/1588871/"&gt;binding&lt;/a&gt; in the &lt;a href="https://indiankanoon.org/doc/1316639/"&gt;same manner&lt;/a&gt; as regulations and rules. However, if they go beyond   the parent Act or existing rules and regulations, they may be &lt;a href="https://indiankanoon.org/doc/15876695/"&gt;struck down&lt;/a&gt; following a judicial review.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;They may or may not be binding depending   upon the language employed or the regulator’s practice.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Unclear whether these are binding and to   what extent. However, crucial clarifications on important concepts sometimes   emerge from FAQs.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Binding in respect of the class of regulated   entities to whom this is issued.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Parliamentary   scrutiny&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="4"&gt;
&lt;p&gt;Unlike regulations, these do not have to be   laid before the Parliament.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;Thus, all these instruments, to varying degrees, have &lt;a href="https://www.ncaer.org/news_details.php?nID=1399"&gt;been used&lt;/a&gt; to create binding obligations for regulated entities. The &lt;a href="https://www.nipfp.org.in/media/medialibrary/2018/08/WP_237_2018_0ciIwuT.pdf"&gt;choice of regulatory instrument&lt;/a&gt; is not made systematically. Indeed, even a &lt;a href="https://www.bis.org/bcbs/publ/d321.pdf"&gt;hierarchy of instruments&lt;/a&gt; and their functions are not clearly set out by most regulators. The &lt;a href="https://www.nipfp.org.in/media/medialibrary/2018/08/WP_237_2018_0ciIwuT.pdf"&gt;rationale&lt;/a&gt; for deciding why a circular is issued as against a regulation is also unclear. A study on regulatory performance in India by Burman and Zaveri (2018) has &lt;a href="https://static1.squarespace.com/static/59c0077a9f745650903ac158/t/5cb62147104c7ba2eaf637e4/1555439944606/Burman+V2.pdf"&gt;highlighted&lt;/a&gt; an over-reliance on instruments such as circulars. As per their study, between 2014 and 2016, RBI and SEBI issued 1,016 and 122 circulars, as against 48 and 51 regulations, respectively. These circulars are not bound by the same pre-consultative mandate nor are they mandated to be laid before the Parliament. While circulars may have&amp;nbsp; been intended for routine to routinely used to lay down administrative or procedural requirements, the study narrows its frame of reference to circulars which lay down substantive regulatory requirements. In this instance, it is unclear why parliamentary scrutiny is mandated for regulations alone, and not for instruments like circulars and directions, even though they lay down similarly substantive requirements. Furthermore, there have also been&lt;a href="https://indiacorplaw.in/2014/11/are-sebis-faqs-binding-on-partiessebi.html"&gt; instances&lt;/a&gt; where certain instruments like FAQs have gone beyond their advisory scope to provide new directions or definitions that were not previously shared under binding instruments like regulations or circulars.&lt;/p&gt;
&lt;p&gt;The DPA has been provided specific powers to issue regulations, codes of practice, and directions. However, the rationale for issuing one instead of the other has been &lt;a href="https://www.medianama.com/2020/01/223-pdp-bill-2019-data-protection-authority/"&gt;absent&lt;/a&gt; from the PDP Bill so far. In such a scenario, it is important that the DPA transparently outlines the &lt;em&gt;types&lt;/em&gt; of instruments it wishes to use, whether they are binding or advisory, and the procedure to be followed for issuing each.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Pre-legislative consultative rule-making&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;&lt;/ol&gt;
&lt;p&gt;Participatory and consultative processes have emerged as core components of democratic rule-making by regulators. Transparent consultative mechanisms could also ameliorate capacity challenges in a new regulator (particularly for technical matters) and help enhance public confidence in the regulator.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In India, several regulators have adopted consultation mechanisms even when there is no specific statutory requirement. &lt;a href="https://www.sebi.gov.in/sebiweb/home/HomeAction.do?doListing=yes&amp;amp;sid=4&amp;amp;smid=35&amp;amp;ssid=38"&gt;SEBI&lt;/a&gt; and &lt;a href="https://ibbi.gov.in/public-comments/comments-on"&gt;IBBI&lt;/a&gt; routinely issue discussion papers and consultation papers. The RBI also issues draft instruments &lt;a href="https://www.rbi.org.in/Scripts/DraftNotificationsGuildelines.aspx"&gt;soliciting comments&lt;/a&gt;. As discussed previously, TRAI and AERA have distinct transparency mandates under which they carry out consultations before issuing regulations. However, these processes are not mandated all forms of subordinate legislation. Taking cognizance of this, the Financial Sector Legislative Reform Committee (FSLRC) has &lt;a href="https://dea.gov.in/sites/default/files/fslrc_report_vol1_1.pdf"&gt;recommended&lt;/a&gt; transparency in the regulation-making process. This was &lt;a href="https://dea.gov.in/sites/default/files/Handbook_GovEnhanc_fslrc_2.pdf"&gt;carried forward&lt;/a&gt; by the Financial Stability and Development Council (FSDC), which recommended that consultation processes should be a prerequisite for all subordinate legislations, including circulars, guidelines, etc. A &lt;a href="https://static1.squarespace.com/static/59c0077a9f745650903ac158/t/5cb62147104c7ba2eaf637e4/1555439944606/Burman+V2.pdf"&gt;study&lt;/a&gt; on regulators’ adherence to these mandates, spanning TRAI, AERA, SEBI, and RBI, demonstrated that this pre-consultation mandate is followed inconsistently, if at all. Predictable consultation practices are therefore critical.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Furthermore, the study stated that it &lt;a href="https://static1.squarespace.com/static/59c0077a9f745650903ac158/t/5cb62147104c7ba2eaf637e4/1555439944606/Burman+V2.pdf"&gt;could not determine&lt;/a&gt; whether the consultation processes yielded meaningful participation, given that regulators are not obligated to disclose how public feedback was integrated into the rule-making process. Subordinate legislations issued in the form of circulars and guidelines also do not typically undergo the same rigorous consultation processes. Thus, an ideal consultation framework would &lt;a href="https://ec.europa.eu/info/sites/default/files/better_regulation_joining_forces_to_make_better_laws_en_0.pdf"&gt;comprise&lt;/a&gt;:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;Publication of the draft subordinate legislation along with a detailed explanation of the policy objectives. Further, the regulator should publish the internal or external studies conducted to arrive at the proposed legislation to &lt;a href="https://legalinstruments.oecd.org/public/doc/669/51f6da97-c198-4c93-922f-1a5d80beae86.pdf"&gt;engender&lt;/a&gt; meaningful discussion.&lt;/li&gt;
&lt;li&gt;Permitting sufficient time for the public and interested stakeholders to respond to the draft.&lt;/li&gt;
&lt;li&gt;Publishing all feedback received for the public to assess, and allowing them to respond to the feedback.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;However, beyond specifying the manner of conducting consultations, it will be important for the DPA to determine where they are mandatory and binding, and for which type of subordinate legislations. These are discussed in the next section.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Choice of consultation mandates for distinct regulatory      instruments&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;While the Bill provides for consultation processes for issuing and approving codes of practice, no such mechanism has been set out for other instruments. Nevertheless, specifying consultation mandates for different regulatory instruments is important to ensure that decision-making is consistent and regulation-making remains bound by transparent and accountable processes. As discussed above, regulatory instruments such as circulars and FAQs are not necessarily bound by the same consultation mandates in India. This distinction has been clarified in more sophisticated administrative law frameworks abroad. For instance, under the Administrative Procedures Act in the United States (US), all substantive rules made by regulatory agencies are &lt;a href="https://www.reginfo.gov/public/reginfo/Regmap/regmap.pdf"&gt;bound&lt;/a&gt; by a consultation process, which requires notice of the proposed rule-making and public feedback. This does &lt;a href="https://www.federalregister.gov/uploads/2011/01/the_rulemaking_process.pdf"&gt;not preclude&lt;/a&gt; the regulatory agency from issuing clarifications, guidelines, and supplemental information on the rules issued. These documents do not require the consultation process otherwise required for formal rules. However, they cannot be used to expand the scope of the rules, set new legal standards, or have the effect of amending the rules. Nevertheless, agencies are not precluded from choosing to seek public feedback on such documents.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Similarly, the Information Commissioner’s Office in the United Kingdom (UK) takes into consideration &lt;a href="https://ico.org.uk/about-the-ico/ico-and-stakeholder-consultations/"&gt;public consultations&lt;/a&gt; and &lt;a href="https://ico.org.uk/about-the-ico/ico-and-stakeholder-consultations/ico-call-for-views-on-employment-practices/"&gt;surveys&lt;/a&gt; while issuing toolkits and guidance for regulated entities on how to comply with the data protection framework in the UK.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Here, the DPA may choose to subject strictly binding instruments like regulations and codes of practice to pre-legislative consultation mandates, while softer mechanisms like FAQs may be subject to the publication of a detailed outline of the policy objective or online surveys to invite non-binding, advisory feedback. For each of these, the DPA will nonetheless need to create specific criteria by which it classifies instruments as binding and advisory, and further outline specific pre-legislative mandates for each category.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Framework for issuing regulatory instruments and instructions&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;While the DPA is likely to issue several instruments, the system based on which these instruments will be issued is not yet clear. Without a clearly thought-out framework, different departments within the regulator &lt;a href="https://www.nipfp.org.in/media/medialibrary/2018/08/WP_237_2018_0ciIwuT.pdf"&gt;typically issue&lt;/a&gt; a series of directions, circulars, regulations, and other instruments. This raises questions regarding the consistency between instruments. This also requires stakeholders to go through multiple instruments to find the position of law on a given issue. Older Indian regulators are now facing challenges in adapting their ad hoc system into a framework. For example, the RBI currently issues a series of circulars and guidelines that are periodically consolidated on a subject-matter basis as Master Circulars and Master Directions. These are then updated and published on their website. IBBI also publishes &lt;a href="https://ibbi.gov.in/uploads/publication/e42fddce80e99d28b683a7e21c81110e.pdf"&gt;handbooks&lt;/a&gt; and &lt;a href="https://ibbi.gov.in/publication/information-brochures"&gt;information brochures&lt;/a&gt; that consolidate instruments in an accessible manner.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;While these are useful improvements, these practices cannot keep pace with rapid changes in regulatory instructions and are not complete or user-friendly (for example, the subject-matter based consolidation does not allow for filtering regulatory instructions by entity). Other jurisdictions have developed different techniques such as formal codification processes to consolidate regulations issued by government agencies under one &lt;a href="https://www.govinfo.gov/help/cfr"&gt;unified code&lt;/a&gt;, &lt;a href="https://www.oaic.gov.au/privacy/privacy-registers/privacy-codes-register/"&gt;register&lt;/a&gt;, or &lt;a href="https://www.handbook.fca.org.uk/handbook"&gt;handbook&lt;/a&gt;,&amp;nbsp; websites that allow for searches based on different parameters (subject-matter, type of instrument, chronology, entity-based), and &lt;a href="https://www.handbook.fca.org.uk/handbook-guides"&gt;guides&lt;/a&gt; tailored to different types of entities. The DPA, as a new regulator, can learn from this experience and adopt a consistent framework right from the beginning.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Further, an ethos of responsive regulation also requires the DPA to evaluate and revise directions and regulations periodically, in response to market and technology trends. A commitment to periodic evaluation of subordinate legislations entrenched in the rules is critical to reducing the dependence on officials and leadership, which may change. For instance, the &lt;a href="https://www.ibbi.gov.in/webadmin/pdf/whatsnew/2018/Oct/Mechanism%20for%20issuing%20regulations%20October%20after%20Board%20meeting%20final_2018-10-22%2020:42:06.pdf"&gt;IBBI&lt;/a&gt; has set out a mandatory review of regulations issued by it every three years.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Dedicating capacity for drafting subordinate legislations&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;The DPA has been granted the discretion to appoint experts and staff its offices with the personnel it needs. A &lt;a href="https://www2.deloitte.com/content/dam/Deloitte/nl/Documents/risk/deloitte-nl-risk-reports-resources.pdf"&gt;study&lt;/a&gt; of European data protection authorities shows that by the time the General Data Protection Regulation, 2016 became effective, most of the authorities increased the number of employees with some even reporting a 240% increase. The annual spending on the authorities also went up for most countries. While these authorities do not necessarily frame subordinate legislations, they nonetheless create guidance toolkits and codes of practice as part of their supervisory functions.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In this regard, the DPA will need to ensure it has dedicated capacity in-house to draft subordinate legislations. Since regulators are generally seen as enforcement authorities, there is inadequate investment in capacity-building for drafting legislations in India.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Moreover, considering the multiplicity of instruments and guidance documents the DPA is expected to issue, it may seek to create templates for these instruments, along with compulsory constituents of different types of instruments. For instance, the Office of the Australian Information Commissioner is required to include a &lt;a href="https://www.oaic.gov.au/privacy/guidance-and-advice/guidelines-for-developing-codes/"&gt;mandatory set of components&lt;/a&gt; while issuing or approving binding industry codes of practice.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Conclusion&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The Personal Data Protection Bill, 2019 (in the final form recommended by the JPC and accepted by the MeitY) will usher in a new chapter in India’s data protection timeline. While the Bill will finally effectuate a nearly comprehensive data protection framework for India, it will also establish a new regulatory framework that sets up a new regulator, the DPA, to oversee the new data protection law. This DPA will be empowered to regulate entities across sectors and is likely to determine the success of the data protection law in India.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Furthermore, the DPA must not only contend with the complexity of markets and the fast pace of technological change, but it must also address &lt;a href="https://blog.theleapjournal.org/2018/02/a-pragmatic-approach-to-data-protection.html"&gt;anticipated&lt;/a&gt; regulatory capacity deficits, low levels of user literacy, the number and diversity of enities within its regulatory ambit, and the need to secure individual privacy within and outside the digital realm.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Thus, looking ahead, we must account for the questions of governance that the forthcoming DPA is likely to face, as these will directly impact how entities and citizens engage with the DPA. In India, regulatory agencies adopt distinct choices to fulfil their functions. Regulators have also &lt;a href="https://static1.squarespace.com/static/59c0077a9f745650903ac158/t/5cb62147104c7ba2eaf637e4/1555439944606/Burman+V2.pdf"&gt;fared variably&lt;/a&gt; in ensuring transparent and accountable decision-making driven by demonstrable expertise. Even if the final form of the PDP Bill does not address these gaps, the DPA has the opportunity to integrate benchmarks and best practices as discussed above within its own governance framework from the get-go as it takes on its daunting responsibilities under the PDP Bill.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;(&lt;span id="docs-internal-guid-6bf51b9e-7fff-d2ac-d0fb-f42bcdd7f599"&gt;The authors are Research Fellow, Law, Technology and Society Initiative and Project Lead, Regulatory Governance Project respectively at the National Law School of India University, Bangalore. Views are personal.)&lt;/span&gt;&lt;/em&gt;&lt;/p&gt;
&lt;em&gt;
&lt;/em&gt;
&lt;p style="text-align: justify;"&gt;&lt;span id="docs-internal-guid-6bf51b9e-7fff-d2ac-d0fb-f42bcdd7f599"&gt;&lt;em&gt;This post was reviewed by Vipul Kharbanda and Shweta Mohandas&lt;/em&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;References&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;For a discussion on distinct regulatory choices, please see TV Somanathan, &lt;em&gt;The Administrative and Regulatory State&lt;/em&gt; in Sujit Choudhary, Madhav Khosla, et al. (eds), &lt;a href="https://www.oxfordhandbooks.com/view/10.1093/law/9780198704898.001.0001/oxfordhb-9780198704898"&gt;Oxford Handbook of the Indian Constitution&lt;/a&gt; (2016).&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;On best practices for consultative law-making, see generally &lt;em&gt;European Union Better Regulation &lt;/em&gt;&lt;a href="https://ec.europa.eu/info/sites/default/files/better_regulation_joining_forces_to_make_better_laws_en_0.pdf"&gt;&lt;em&gt;Communication&lt;/em&gt;&lt;/a&gt;, &lt;em&gt;Guidelines for Effective Regulatory Consultations &lt;/em&gt;(&lt;a href="https://www.tbs-sct.gc.ca/rtrap-parfa/erc-cer/erc-cer-eng.pdf"&gt;Canada&lt;/a&gt;),&amp;nbsp; and&lt;em&gt; &lt;/em&gt;&lt;a href="https://read.oecd-ilibrary.org/governance/the-governance-of-regulators_9789264209015-en#page81"&gt;&lt;em&gt;OECD&lt;/em&gt;&lt;/a&gt;&lt;em&gt; &lt;/em&gt;&lt;em&gt;Best Practice Principles for Regulatory Policy: The Governance of Regulators&lt;/em&gt;,&lt;em&gt; 2014.&lt;/em&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;hr align="left" size="1" width="33%" /&gt;
&lt;p&gt;&lt;a href="file:///C:/Users/Admin/AppData/Local/Temp/211105_Governance%20Choices%20for%20the%20DPA%20(1).docx#_ftnref1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Personal Data Protection Bill 2019, § 50(3).&lt;/p&gt;
&lt;p&gt;&lt;a href="file:///C:/Users/Admin/AppData/Local/Temp/211105_Governance%20Choices%20for%20the%20DPA%20(1).docx#_ftnref2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Personal Data Protection Bill 2019, § 50(4).&lt;/p&gt;
&lt;p&gt;&lt;a href="file:///C:/Users/Admin/AppData/Local/Temp/211105_Governance%20Choices%20for%20the%20DPA%20(1).docx#_ftnref3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Personal Data Protection Bill 2019, § 51.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/trishi-jindal-and-s-vivek-beyond-the-pdp-bill'&gt;https://cis-india.org/internet-governance/blog/trishi-jindal-and-s-vivek-beyond-the-pdp-bill&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Trishi Jindal and S.Vivek</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2021-11-10T07:32:33Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/economic-and-political-weekly-july-17-2021-amber-sinha-pallavi-bedi-aman-nair-techno-solutionist-responses-to-covid-19">
    <title>Techno-solutionist Responses to COVID-19</title>
    <link>https://cis-india.org/internet-governance/blog/economic-and-political-weekly-july-17-2021-amber-sinha-pallavi-bedi-aman-nair-techno-solutionist-responses-to-covid-19</link>
    <description>
        &lt;b&gt;The Indian state has increasingly adopted a digital approach to service delivery over the past decade, with vaccination being the latest area to be subsumed by this strategy. In the context of the need for universal vaccination, the limitations of the government’s vaccination platform Co-WIN need to be analysed.&lt;/b&gt;
        &lt;p&gt;&lt;span style="text-align: justify; "&gt;The article by Amber Sinha, Pallavi Bedi, and Aman Nair was published in the &lt;/span&gt;&lt;a class="external-link" href="https://www.epw.in/journal/2021/29/commentary/techno-solutionist-responses-covid-19.html" style="text-align: justify; "&gt;Economic &amp;amp; Political Weekly&lt;/a&gt;&lt;span style="text-align: justify; "&gt;, Vol. 56, Issue No. 29, 17 Jul, 2021.&lt;/span&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Over the last two decades, slowly but steadily, the governance agenda of the Indian state has moved to the digital realm. In 2006, the National e-Governance Plan (NeGP) was approved by the Indian state wherein a massive infrastructure was developed to reach the remotest corners and facilitate easy access of government services efficiently at affordable costs. The first set of NeGP projects focused on digitalising governance schemes that dealt with taxation, regulation of corporate entities, issuance of passports, and pensions. Over a period of time, they have come to include most interactions between the state and citizens from healthcare to education, transportation to employment, and policing to housing. Upon the launch of the Digital India Mission by the union government, the NeGP was subsumed under the e-Gov and e-Kranti components of the project. The original press release by the central government reporting the approval by the cabinet of ministers of the Digital India programme speaks of “cradle to grave” digital identity as one of its vision areas. This identity was always intended to be “unique, lifelong, online and authenticable.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since the inception of the Digital India campaign by the current government, there have been various concerns raised about the privacy issues posed by this project. The initiative includes over 50 “mission mode projects” in various stages of implementation. All of these projects entail collection of vast quantities of personally identifiable information of the citizens. However, most of these initiatives do not have clearly laid down privacy policies. There is also a lack of properly articulated access control mech­anism and doubts exist over important issues such as data ownership owing to most projects involving public–private partnership which involves a private org­anisation collecting, processing and retaining large amounts of data. Most importantly, they have continued to exist and prosper in a state of regulatory vacuum with no data protection legislation to govern them. Further, the state of digital divide and digital literacy in India should automatically underscore the need to not rely solely on digital solutions.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;span&gt;Click to &lt;/span&gt;&lt;a class="external-link" href="https://www.epw.in/journal/2021/29/commentary/techno-solutionist-responses-covid-19.html"&gt;read the full article here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/economic-and-political-weekly-july-17-2021-amber-sinha-pallavi-bedi-aman-nair-techno-solutionist-responses-to-covid-19'&gt;https://cis-india.org/internet-governance/blog/economic-and-political-weekly-july-17-2021-amber-sinha-pallavi-bedi-aman-nair-techno-solutionist-responses-to-covid-19&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Amber Sinha, Pallavi Bedi and Aman Nair</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Digitalisation</dc:subject>
    
    
        <dc:subject>Co-WIN</dc:subject>
    
    
        <dc:subject>Covid19</dc:subject>
    
    
        <dc:subject>Digital Technologies</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Technology</dc:subject>
    
    
        <dc:subject>E-Governance</dc:subject>
    

   <dc:date>2021-08-10T15:34:06Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/times-of-india-sandhya-soman-and-pratiksha-ramkumar-nov-7-2012-law-yet-to-catch-up-with-tech-enabled-peeping-toms">
    <title>Law yet to catch up with tech-enabled peeping toms</title>
    <link>https://cis-india.org/news/times-of-india-sandhya-soman-and-pratiksha-ramkumar-nov-7-2012-law-yet-to-catch-up-with-tech-enabled-peeping-toms</link>
    <description>
        &lt;b&gt;Devices that give sharp images are the order of the day. But this clarity is lacking when it comes to regulating use of cameras and camera phones in public places, say policy makers.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;The article by Sandhya Soman &amp;amp; Pratiksha Ramkumar was &lt;a class="external-link" href="http://articles.timesofindia.indiatimes.com/2012-11-07/chennai/34972633_1_privacy-law-phones-in-public-places-camera-phones"&gt;published&lt;/a&gt; in the Times of India on November 7, 2012.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;If there is one thing that sends more clients harried by blackmailers to detectives like A M Malathy of Malathy Detective Agency, it is the pervasive presence of the camera, most often inside modest cell phones. "One girl had to leave a town as her ex-boyfriend uploaded her photo on the internet and referred to her as a call girl. We got the web page removed," says Malathy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But tracing culprits is difficult if they are strangers on the road. Absence of a privacy law makes it difficult for police to book culprits. "If someone photographs a woman on a bus, we can ask the person to delete it. But we can't book the person s there is no law," says Jegabar Sali, assistant commissioner, cyber crime cell.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Information Technology (IT) Act, 2000 talks of punishment only in cases where a person's private areas have been photographed. However, things are looking up with the government trying to draw up the Right to Privacy Bill.&lt;br /&gt;&lt;br /&gt;"The problems posed by digital technology are complex and we need to define what these new crimes are," says Rajeev Chandrasekhar, independent Member of Parliament, who introduced the Right to Privacy Bill,2010 in Parliament. "I did it because I got representations from parents and women about how MMS clips were being used to blackmail them," says Chandrasekhar.&lt;br /&gt;&lt;br /&gt;There have been attempts at legislation earlier. The Mobile Camera Phone Users (Code of Conduct) Bill, 2006 attempted to regulate the use of camera phones in public places. It proposed that manufactures build camera phones that flash a light or emit a 'click' sound, and that users should get consent of the person being photographed.&lt;br /&gt;&lt;br /&gt;"The sound and light are for informing people that they are being filmed," says Sunil Abraham, executive director, Centre for Internet and Society, a Bangalore-based organisation that was part of the committee. These provisions are part of South Korea's privacy law, which sought to bring down cases of technology-enabled 'upskirt' photography, where photos of women were taken without their permission, he says.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/times-of-india-sandhya-soman-and-pratiksha-ramkumar-nov-7-2012-law-yet-to-catch-up-with-tech-enabled-peeping-toms'&gt;https://cis-india.org/news/times-of-india-sandhya-soman-and-pratiksha-ramkumar-nov-7-2012-law-yet-to-catch-up-with-tech-enabled-peeping-toms&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-11-08T08:06:07Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/thinkdigit-internet-kul-bhushan-nov-15-2012-india-ranks-second-globally-in-accessing-private-details-of-users">
    <title>India ranks second globally in accessing private details of users</title>
    <link>https://cis-india.org/news/thinkdigit-internet-kul-bhushan-nov-15-2012-india-ranks-second-globally-in-accessing-private-details-of-users</link>
    <description>
        &lt;b&gt;According to the latest transparency report released by Google, India ranks second in the world for accessing private details of its citizens, only after the U.S. The Google report lists out requests it received from governments across the world to access details of users of its various services.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Kul Bhushan's blog post was &lt;a class="external-link" href="http://www.thinkdigit.com/Internet/India-ranks-second-globally-in-accessing-private_11364.html"&gt;published in thinkdigit&lt;/a&gt; on November 15, 2012. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://www.thinkdigit.com/latest/google.html" target="_blank"&gt;Google's&lt;/a&gt; data reveals India had made 2,319 requests involving 3,467 users in the first six months. The U.S. made 7,969 requests, while Brazil, which ranks third, made 1,566 requests during the same period. Worldwide 20,938 requests were made during the January-June period. The report says the information shared included complete Gmail account, chat logs, Orkut profile and search terms among others.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The requests for accessing user data from India had grown two-fold from 1,061 in July-December 2009 to 2,207 in July-December 2011, the report points out.&lt;br /&gt;&lt;br /&gt;According to the report, India has been consistently sending requests to remove content which it brands as defamatory and against national security. The court orders, however, to take down content has remained almost stagnant over the years; though requests from the executive and police have grown.&lt;br /&gt;&lt;br /&gt;In the first six months this year, there were 20 court orders and 64 requests from executive/police that resulted in 596 items being taken down from the web. During the January-June 2010 period, there were only eight court orders and 22 executive/police requests, resulting in 125 items being taken down. Read about Google's previous transparency report here.&lt;br /&gt;&lt;br /&gt;"Though India is a large country with a significant number of internet users, this data is nonetheless an indicator of growing surveillance," Times of India quotes Pranesh Prakash, policy director at Centre for Internet and Society ( CIS), a Bangalore-based organization looking at issues of public accountability, internet freedom and openness, as saying.&lt;br /&gt;&lt;br /&gt;"India lacks a general privacy law that helps set guidelines for such user requests, despite privacy being a constitutional right as part of the right to life," added Prakash.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/thinkdigit-internet-kul-bhushan-nov-15-2012-india-ranks-second-globally-in-accessing-private-details-of-users'&gt;https://cis-india.org/news/thinkdigit-internet-kul-bhushan-nov-15-2012-india-ranks-second-globally-in-accessing-private-details-of-users&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-11-19T04:49:23Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/livemint-october-18-2012-surabhi-agarwal-courts-approval-needed-to-tap-phones">
    <title>Court’s approval needed to tap phones: Panel</title>
    <link>https://cis-india.org/news/livemint-october-18-2012-surabhi-agarwal-courts-approval-needed-to-tap-phones</link>
    <description>
        &lt;b&gt;Investigators can monitor a person for 15-20 days on executive orders in case of emergencies, suggests panel.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Surabhi Agarwal's article was published in &lt;a class="external-link" href="http://www.livemint.com/Politics/TKvdGjj2mMcp2FNgwIVLeP/Courts-approval-needed-to-tap-phones.html"&gt;LiveMint&lt;/a&gt; on October 18, 2012. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Government agencies need judicial permission before intercepting any communication or starting surveillance of any individual, a panel on the proposed privacy law suggested on Thursday.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If there is any urgency, investigators can tap phones or monitor a person’s movements for 15-20 days on executive orders but will then have to approach the courts to continue, the committee led by retired Delhi high court judge &lt;a href="http://www.livemint.com/Search/Link/Keyword/Ajit%20P.%20Shah"&gt;Ajit P. Shah&lt;/a&gt; recommended.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Phone tapping under the present regime is done under executive permission whereas in other countries it is done only with the permission of the courts,” Shah said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Security agencies currently require permission from home secretaries, either at the Centre or the states, to set up wiretaps or monitor emails. An oversight group of the cabinet, law and telecom secretaries at the Centre reviews all such authorizations.&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt; &lt;iframe frameborder="0" height="250" src="http://www.youtube.com/embed/LntqxttkTuE" width="300"&gt;&lt;/iframe&gt; &lt;/th&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;The government established the Shah committee in Feburary under the Planning Commission to study international best practices on privacy and surveillance after concerns arose on misuse of information collected by official agencies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Shah said on Thursday that the committee was “not interested” in preparing a privacy law but has only laid down the principles.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The department of personnel and training will deliberate on the panel’s recommendations and then draft a legislation, said &lt;a href="http://www.livemint.com/Search/Link/Keyword/Ashwani%20Kumar"&gt;Ashwani Kumar&lt;/a&gt;, junior minister in the Planning Commission.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;The Shah panel has recommended appointing privacy commissioners and a system under which organizations will have to develop privacy standards that will be approved by a commissioner as a means of self-regulation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sectoral industry associations would form a code of conduct for companies that will comply with law as they will be approved by the privacy commissioner, according to &lt;a href="http://www.livemint.com/Search/Link/Keyword/Kamlesh%20Bajaj"&gt;Kamlesh Bajaj&lt;/a&gt;, chief executive officer of Data Security Council of India, one of the members of the committee. “These associations could also act as alternative dispute-resolution mechanisms,” Bajaj said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The committee’s other recommendations include giving individuals a choice to provide personal information, collection of only critical personal information, use of data only for the purpose for which it has been collected, and a penalty for violations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Without a comprehensive horizontal regulatory framework and the office of the regulator both private and public entities in India have been trampling on the rights of citizens without complying to any of the international best practices when it comes to protecting the right to privacy,” said &lt;a href="http://www.livemint.com/Search/Link/Keyword/Sunil%20Abraham"&gt;Sunil Abraham&lt;/a&gt;, executive director of Centre for Internet and Society, a Bangalore-based advocacy group. After the privacy law is enacted and the office of a privacy commissioner is created, people will be able to seek redressal against these erring pubic and private entities if their rights are violated, he added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government has been looking to enact a privacy law to ensure data collected by various programmes such as the National Population Register, Unique Identification Authority of India and National Intelligence Grid was not misused. It was expected to scotch criticism of these programmes by privacy and Internet activists. It later expanded the scope of the proposed legislation after catching flak for a leak of tapped conversations between corporate lobbyist &lt;a href="http://www.livemint.com/Search/Link/Keyword/Niira%20Radia"&gt;Niira Radia&lt;/a&gt;, industrialists and journalists.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government now aims to uphold the right of all Indians against any misuse of personal information, interception of personal communication, unlawful surveillance and unwanted commercial communication. That means it effectively covers everything from the misuse of data collected by the government to spam.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, there could be opposition from law enforcement agencies if the privacy law mandates that prior permission of the courts will be required before intercepting communication.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If judges begin taking a call on interception requests, there could be chances of leakage, “since there are so many judges at so many levels”, said &lt;a href="http://www.livemint.com/Search/Link/Keyword/Rumel%20Dahiya"&gt;Rumel Dahiya&lt;/a&gt;, deputy director general at Institute of Defence Studies and Analyses, a New delhi-based think tank. “The government carries out surveillance to gain fool-proof intelligence. That purpose will be defeated.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Last week, Prime Minister &lt;a href="http://www.livemint.com/Search/Link/Keyword/Manmohan%20Singh"&gt;Manmohan Singh&lt;/a&gt; said a fine balance needs to be maintained between the right to information and the right to privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Shah committee included representatives from the private sector, the department of information technology, ministry of home affairs, department of telecommunication, the law ministry and the department of personnel and training.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Kirthi V. Rao contributed to this story.&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/livemint-october-18-2012-surabhi-agarwal-courts-approval-needed-to-tap-phones'&gt;https://cis-india.org/news/livemint-october-18-2012-surabhi-agarwal-courts-approval-needed-to-tap-phones&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-10-22T07:02:34Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy-perspectives-on-the-2012-2013-goa-beach-shack-policy">
    <title>Privacy Perspectives on the 2012 -2013 Goa Beach Shack Policy </title>
    <link>https://cis-india.org/internet-governance/blog/privacy-perspectives-on-the-2012-2013-goa-beach-shack-policy</link>
    <description>
        &lt;b&gt;CCTVs in India are increasingly being employed by private organizations and the government in India as a way to increase security and prevent/ deter crime from taking place. When the government mandates the use of CCTV’s for this purpose, it often does so by means of a blunt policy mandate, requiring the installation of CCTV systems, but without any further clarification as to who should oversee the use of the cameras, what bodies should have access to the records, how access should be granted or obtained, and how long the recordings should be retained. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The lack of clarity and specificity in these requirements, the fact that these technologies are used in public spaces to collect undefined categories and amounts of information, and the fact that the technology can cut through space – and does not distinguish between private and public and primarily captures information where it is directed to, give rise to privacy concerns and raises fundamental questions about the ways in which technologies can be used to effectively increase security while still protecting the rights of individuals and the promotion of business.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An example of a blanket CCTV installation requirement from the government is seen in the 2012-2013 Goa Beach Shack Policy.&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt; This blog will examine the shack policy from a privacy perspective, and how identification requirements are evolving. The blog will explore different principles by which surveillance technologies like CCTVs can be employed in order to promote effectiveness and protect the rights of individuals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To help understand the current status of the Shack Policy and the extent of CCTV use in Goa, I spoke with a number of shack owners, cyber café owners, the Ministry of Tourism, and the Police of Goa. In this blog I do not use any direct quotes and write only from the perspective of my personal observations.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Current Status of the Shack Policy&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;This year, for the 2012-2013 tourist season, the Department of Tourism of Goa is implementing the Beach Shack Policy for regulating the establishment and running of temporary shacks at beaches in Goa. The policy applies only to the licensing, construction, maintenance, and demolition of temporary shacks on beaches owned by the government. The policy lays out requirements that must be submitted by applicants for obtaining a license and requirements relating to the operation of the shacks including size, security, health and safety, and noise control. Shacks, huts, hotels, etc. built on private land do not come under the scope of the policy. The shacks can only be bars and restaurants that can run from November 1&lt;sup&gt;st&lt;/sup&gt; through May 31&lt;sup&gt;st&lt;/sup&gt;, after which they must be taken down until the next season. The licensing of these shacks is to enable local employment opportunities in Goa. This can be seen by the requirement in the policy that Shacks are to be granted to only one member of the family who is unemployed.&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt; Currently, the Ministry of Tourism has almost completed the allotment of shack spaces on all beaches in Goa. The police will assist in the enforcement of the policy, but their exact role is in the process of being clarified. Before the 2012-2013 policy, shacks were regulated by annual beach shack policies, which are not available online, but can be accessed through an RTI request to the Department of Tourism. Resistance to the policy has been seen by some because of concerns that the shacks will take away business from local private owners, will block fishing boats, will cause trash and sewage problems, and create issues for free movement of people on the beach.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Inside the policy:&lt;/h2&gt;
&lt;h3&gt;Application Requirements&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;To apply for a license for a temporary shack, every application must be turned in by hand and must be accompanied by a residence certificate in original issued by Village Panchayat Municipality, attested copy of ration card, four copies of a recent colored passport photos with name written on the back, attested copy of birth certificate/passport copy/Pan Card and any other information that the applicant desires to furnish, and affidavit. In addition individuals must provide their name, address, telephone number, name of the shack, name of the beach stretch, nationality, experience, and any other information they wishes to provide.&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt; These requirements are not excessive and have been kept to what seems minimally necessary for providing a license, though the option for individuals to provide any additional information they wish – could be used to convey meaningful information or extraneous information to the government.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Operational Requirements&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The policy has a number of operational requirements for shack owners as well. For example owners must clearly display a self identifying photograph on the shack&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; and they must agree to assist the Tourism Department and Police department in stopping any crime and violation of any law along the Beach.&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The policy also requires that any person handling food must take a course conducted by IHMCT, GTDC, or Porvorim,&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt; shacks must also be made out of eco friendly material as much as possible and the use of cement is banned,&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt; and the proper disposal of trash and waste water will be the responsibility of the shack owner.&lt;a href="#fn8" name="fr8"&gt;[8]&lt;/a&gt; Furthermore, foreigners working in the shacks must have a work visa,&lt;a href="#fn9" name="fr9"&gt;[9]&lt;/a&gt; and loud music is not allowed to be played after 10:30 p.m.&lt;a href="#fn10" name="fr10"&gt;[10]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As noted in the introduction, each shack must install a CCTV surveillance system that provides real-time footage with an internal looping system in a non-invasive form. &lt;a href="#fn11" name="fr11"&gt;[11]&lt;/a&gt; But I got to understand that the CCTV requirement will be slowly introduced and will not be implemented this year due to resistance from shack owners. When the requirement is implemented, hopefully different aspects around the use of CCTVs will be clarified including: the retention period for the recordings, access control to the recordings, the responsibilities of the shack owner, where the camera will be set up and where it needs to be directed to, etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Currently in Goa there are official requirements for CCTVs to be installed in Cyber Cafes under section 144 of the CrPc. This requirement only came into effect on October 1st 2012.&lt;a href="#fn12" name="fr12"&gt;[12]&lt;/a&gt;Some private hotels, huts, and restaurants run CCTV cameras for their own security purposes. When asked if CCTVs will also become mandatory for private areas, some said this will happen, while others said it would be difficult to implement.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Enforcement&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The policy uses a number of measures to ensure enforcement. For examples, successful applicants must place a security deposit of 10,000 with Director of Tourism. If any term of the policy is violated, the deposited amount will be given to the Government Treasury and the individual is required to  pay another Rs. 10,000 to continue operating.&lt;a href="#fn13" name="fr13"&gt;[13]&lt;/a&gt;The placement of deck beds on the beach without authorization will also be treated as an offense under the Goa Tourist Places (protection and maintenance) Act 2001 and will be punished with a term of imprisonment minimum three months, which may extend to 3 years, and a fine which may extend to Rs. 5,000 or both. All offenses under the Act are cognizable and non-refundable. &lt;a href="#fn14" name="fr14"&gt;[14]&lt;/a&gt; If the shack is not dismantled at the end of the season, the individual will have their application rejected for the next three years.&lt;a href="#fn15" name="fr15"&gt;[15]&lt;/a&gt; Shack owners will also be penalized of they are caught discriminating against who can and cannot enter into the shack.&lt;a href="#fn16" name="fr16"&gt;[16]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Interestingly, though CCTV cameras can be used to ‘catch’ a number of offenses, the offenses that are penalized under the Act do not seem to require the presence of a CCTV camera. Additionally, the policy is missing penalties for the tampering and misuse of these cameras and unauthorized access to recordings.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Other practices around security and identification in Goa&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;In 2011 Goa also issued a new ‘C’ form that must be filled out by foreigners entering hotels.&lt;a href="#fn17" name="fr17"&gt;[17]&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;The form requires twenty six categories of information to be filled out including: permanent address, next destination to be proceeded to, contact number in hotel, purpose of visit, whether employed in India, and where the foreigner arrived from. According to hotel owners, three copies of these records are made. Two are submitted to the police and one is kept with the hotel. The records kept with the hotel are often kept for an undefined time period.  In 2011 the police also enforced a new practice where every shack, hut, hotel etc. must have an all night security guard to ensure security on the beach. It was noted that registration of migrant workers is now mandatory, and that non-registered or undocumented vendors are removed from working on the beaches.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Will the 2012 – 2013 Beach Shack Policy have new implications?&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;In its current form, especially taking into consideration that the CCTV requirement will not be implemented immediately, the 2012 – 2013 shack policy does not seem alarming from a privacy perspective. On the general policy, though the penalties, such as the possibility of three months in prison for having too many beach chairs, seems to be  over-reaching, there are a number of  positive requirements in the policy such as the use of eco-friendly material, noise control,  and strict procedures for disposing of trash and sewage.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The privacy perspective could change when CCTVs are implemented. The amount of data that would be generated and the ambiguity around the employment of the cameras could raise a number of privacy concerns. Yet the fact that this part of the policy will only be implemented later down the road seems indicative of both the shack owners discomfort in using the technology, and perhaps the government’s recognition that a certain level of  ground work needs to be done before CCTVs are made mandatory for every shack in the state.  Hopefully before the requirement is implemented, the ground work will be set up either at a national level – in the form of a national privacy legislation, or at the state level – in the form of appropriate safeguards and procedures built into the policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the macro level, and when examined in the context of  the growing use of CCTVs by private owners, the implementation of the UID and NPR requirements in Goa, and the introduction of the new ‘C’ form for foreigners, the CCTV requirement found in the Shack Policy seems to  part of a growing trend across the country where the government seems to seek to identify all individuals and their movements/actions for unclear and undefined purposes, and looks towards identification through the collection of personal information and use of technology as a means to solve security issues.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For example, Goa is not the only city to consider mandatory installation of CCTV’s.  In Delhi, the Department of Tourism issued a similar requirement in a 2012 amendment to the “existing Guidelines for Classification/Reclassification of Hotels”. According to the amendment hotels applying for approval are required to provide documentation that security features including CCTV systems are in place.&lt;a href="#fn18" name="fr18"&gt;[18]&lt;/a&gt; Similarly, in 2011 the Delhi State Industrial and Infrastructure Development Corporation began implementing a plan to install CCTVs outside of government and private liquor shops, amounting to 550 shops in total. The goal was to use the CCTV cameras to catch individuals breaking the Excise Act on camera and use the recordings during trials. According to news coverage, the cameras are required to be capable of recording images 50 meters away and all data must be stored for a period of 30 days.&lt;a href="#fn19" name="fr19"&gt;[19]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ambiguity that exists around the legal use of many of these security systems and technologies, including CCTV’s was recently highlighted in Report of the Group of Experts on Privacy headed by Justice A.P Shah.&lt;a href="#fn20" name="fr20"&gt;[20]&lt;/a&gt; The report noted that the use of CCTV cameras and more broadly the use of electronic recording devices in India is an area that needs regulation and privacy safeguards. The report describes how the nine proposed national privacy principles of notice, choice and consent, collection limitation, purpose limitation, access and correction, disclosure of information, security, and openness, could be applied and will be affected by the use of these technologies.&lt;a href="#fn21" name="fr21"&gt;[21]&lt;/a&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Conclusion&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;In India and elsewhere, the police are faced on a daily basis with the challenge of preventing and responding to all types of crime, and from this perspective – any information, clue, or lead is helpful and necessary, and the potential usefulness of CCTVs in identifying criminals and to some extent deterring  crime is clear. On the other hand when CCTVs are employed without safeguards and regulations it could result in infractions of privacy and rights or could simply move the crime away from the surveilled area to an unsurveilled area.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Finding a way to ensure that police have access to the information that they need and that crime is prevented, while at the same time ensuring that the rights of individuals are not compromised, and the private sectors ability to easily do business is not limited by unrealistic security requirements, is an important discussion that governments, policy makers, and the public should be having. The answer hopefully is not found in a binary game of all or nothing, surveillance or no surveillance – but instead is found through mechanisms and principles that apply to both security and privacy such as transparency, oversight, proportionality, and necessity. For example, practices around what access the police legally have via surveillance systems, retention practices, cost of implementing surveillance, and amount of surveillance undertaken each year could be made transparent to the public to ensure that the public is informed and aware of the basic information around these systems. Furthermore, clear oversight over surveillance systems including distinction between the responsibilities and liabilities can ensure that unreasonable requirements are not placed. Lastly any surveillance that is undertaken should be necessary and proportional to the crime or threat that it is being used to prevent or detect. These principles along with the defined National Privacy Principles could help measure what amount and what type of surveillance could be the most effective, and ensure that when surveillance is employed it is done in a way that also protects the rights of individuals and the private sector.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Notes&lt;/b&gt;&lt;br /&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;].Ministry of Tourism. Goa Government. 2012-2013 Beach Shack Policy. Available at: &lt;a class="external-link" href="http://bit.ly/Xk18NH"&gt;http://bit.ly/Xk18NH&lt;/a&gt;. Last accessed: October 24th 2012.&lt;br /&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. Id. Section 2.&lt;br /&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. Id. Application Requirements 1-8. Pg 1&amp;amp;2.&lt;br /&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. Section 33.&lt;br /&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;].A part of the affidavit&lt;br /&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;].Id. Section 4.&lt;br /&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. Id. Section 17.&lt;br /&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;].Id. Section 28.&lt;br /&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;]. Id. Section 35.&lt;br /&gt;[&lt;a href="#fr10" name="fn10"&gt;10&lt;/a&gt;].Id. Section 37.&lt;br /&gt;[&lt;a href="#fr11" name="fn11"&gt;11&lt;/a&gt;]. Id. Section 38.&lt;br /&gt;[&lt;a href="#fr12" name="fn12"&gt;12&lt;/a&gt;]. Order No. 38/10/2006. Under Section 144 of the Code of Criminal Procedure, 1973. Available at: &lt;a class="external-link" href="http:// www.goaprintingpress.gov.in/downloads/1213/1213-28-SIII-OG.pdf"&gt;http:// www.goaprintingpress.gov.in/downloads/1213/1213-28-SIII-OG.pdf&lt;/a&gt;&lt;br /&gt;[&lt;a href="#fr13" name="fn13"&gt;13&lt;/a&gt;]. Beach Shack Policy 2012 - 2013, Section 16.&lt;br /&gt;[&lt;a href="#fr14" name="fn14"&gt;14&lt;/a&gt;]. Id. Section 18.&lt;br /&gt;[&lt;a href="#fr15" name="fn15"&gt;15&lt;/a&gt;]. Id. Section 22.&lt;br /&gt;[&lt;a href="#fr16" name="fn16"&gt;16&lt;/a&gt;]. Id. Section 32.&lt;br /&gt;[&lt;a href="#fr17" name="fn17"&gt;17&lt;/a&gt;]. Arrival Report of Foreigner in Hotel.”Form C” . Available at: &lt;a class="external-link" href="http://bit.ly/TbUO4S"&gt;http://bit.ly/TbUO4S&lt;/a&gt;&lt;br /&gt;[&lt;a href="#fr19" name="fn18"&gt;18&lt;/a&gt;]. Government of India. Ministry of Tourism. Amendment in the existing Guidelines for Classification / Reclassification of Hotels. June 28&lt;sup&gt;th&lt;/sup&gt; 2012. Available at: &lt;a class="external-link" href="http://bit.ly/RXtgBg"&gt;http://bit.ly/RXtgBg&lt;/a&gt;. Last Accessed: October 24th 2012.&lt;br /&gt;[&lt;a href="#fr19" name="fn19"&gt;19&lt;/a&gt;]. Bajpaj, Ravi. CCTV shots to check drinking outside city liquor vends. The Indian Express reproduced on the website of dsidc. December 20&lt;sup&gt;th&lt;/sup&gt; 2011. Available at: &lt;a class="external-link" href="http://bit.ly/VHwCz"&gt;http://bit.ly/VHwCz&lt;/a&gt;d. Last accessed: October 24th 2012.&lt;br /&gt;[&lt;a href="#fr20" name="fn20"&gt;20&lt;/a&gt;]. GOI. Report of the Group of Experts on Privacy. October 2012. Available at: &lt;a class="external-link" href="http://bit.ly/VqzKtr"&gt;http://bit.ly/VqzKtr&lt;/a&gt;. &lt;span&gt; &lt;/span&gt;Last accessed: October 24th 2012.&lt;span&gt; &lt;/span&gt;&lt;br /&gt;[&lt;a href="#fr21" name="fn21"&gt;21&lt;/a&gt;]. Id. pg. 61-62.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy-perspectives-on-the-2012-2013-goa-beach-shack-policy'&gt;https://cis-india.org/internet-governance/blog/privacy-perspectives-on-the-2012-2013-goa-beach-shack-policy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-10-25T10:23:50Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/daily-pioneer-columnists-oct-29-2012-apar-gupta-bolstering-right-to-remain-private">
    <title>Bolstering right to remain private </title>
    <link>https://cis-india.org/news/daily-pioneer-columnists-oct-29-2012-apar-gupta-bolstering-right-to-remain-private</link>
    <description>
        &lt;b&gt;The Justice AP Shah panel has done to well to lay down an enforceable roadmap that can strengthen  privacy laws in the country. It’s now for the legislature to take the issue to a logical conclusion.&lt;/b&gt;
        &lt;div class="itemFullText" style="text-align: justify; "&gt;
&lt;hr /&gt;
&lt;p&gt;Apar Gupta's column was &lt;a class="external-link" href="http://www.dailypioneer.com/columnists/item/52726-bolstering-right-to-remain-private.html"&gt;published&lt;/a&gt; in the Pioneer on October 29, 2012.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;span&gt;A  haveli courtyard is an apt metaphor for the complexity which is  involved in drafting a law on privacy. Though the courtyard gives an  appearance of openness, it is limited by the walls, doors and windows  which surround it. The architecture represents a mediated understanding  of the options which are available to the resident in sharing and  limiting information to family and strangers. A somewhat similar project  is in the works with the Union Government taking steps towards the  enactment of a privacy law.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Privacy  law as it is understood at present is usually limited to the odd writ  petition filed against the Government by a private individual seeking  enforcement of a fundamental right to privacy. Recently, such  adjudication has been limited to high-profile individuals, and where  there is wide voyeuristic interest. For instance, two recent petitioners  include industrialist Ratan Tata and former Samajwadi Party leader Amar  Singh. Here, it is important to stress that with the state gathering  more and more data about individuals through the Unique Identification  Authority of India scheme, there is a need to democratise the right by  making legal provisions for its enforcement. In making such provisions a  balance has to be maintained, where information which serves public  interest or gathered through informed consent is not encumbered in the  name of protecting individual privacy.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;To  find this balance, the Government late last year tasked a Committee of  Experts chaired by Justice AP Shah to prepare a report on the Privacy  Bill. Readers would recall that Justice Shah had authored a judgement  which read down Section 377 of the Indian Penal Code, decriminalising  homosexual activity. A closer reading of the judgement shows the  reliance placed by the court on the privacy right and to reach its  determination. With such credentials, the Justice Shah Committee has  exceeded the high expectations placed on it, presenting a fair and  balanced approach towards a privacy law in India.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;At  the very outset the report clearly marks its objectives, from which it  then commences to study judicial precedent on privacy as well as the  experience of foreign jurisdictions. On the basis of this study, it has  evolved nine privacy principles which encompass within it distinct  aspects of individual privacy. Such a nuanced approach to privacy is  certainly welcome given that privacy as a right is often subjective,  varying drastically in its appreciation as per civil society, private  industry and even Government itself.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Beyond  the specific aspects of the privacy right, the report extends the right  both to Government as well as private industry. This is a sign of the  times, best put by Pranesh Prakash, policy director, Centre for Internet  and Society, when he says that citizens reveal more data about  themselves to social networking websites than they would to the  Government under torture!&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Another  significant aspect is the proposed co-regulatory regime which the  report suggests. And, experience has taught us that a right without an  effective remedy to enforce it counts for a little more than a black  letter on paper. In this respect, the report proposes a sectoral  regulator which has supervision over State level privacy commissioners.  In addition to this, the report also proposes a system of  self-regulation where industry-specific standards may be proposed and  then sanctioned by the privacy commissioners. However, contrary to the  present approach of tribunalisation, the report suggests that recourse  to civil courts for aggrieved persons should always be kept open.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Though  the origins of the privacy rights may be antiquated, widespread  consensus suggests that the modern practice and substance of privacy law  owes its beginning to an article published in the fourth volume of the  Harvard Law Review. The article, authored by Louis Brandeis and Samuel  Warren drawing a physical justification for what seemed like a novelty  back then, stated that the law regarded a man’s house as his castle.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Sadly,  the right has not seen a proper development in India, mainly due to the  absence of an overarching legislation as well as a lack of  understanding of its proper contours. At least in this respect, the  report marks a significant development in the drafting of a  comprehensive privacy legislation in India. A haveli, a house or a  castle — the Justice Shah panel has provided a useful blueprint to the  legislature to build an effective and balanced statute to safeguard  individual privacy.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;i&gt;(The writer is a partner in a Delhi-based law firm and visiting faculty at the National Law University, Delhi)&lt;/i&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/daily-pioneer-columnists-oct-29-2012-apar-gupta-bolstering-right-to-remain-private'&gt;https://cis-india.org/news/daily-pioneer-columnists-oct-29-2012-apar-gupta-bolstering-right-to-remain-private&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-10-29T09:00:13Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/manorama-may-2-2017-jikku-varghese-jacob-biggest-blast-on-aadhaar-leak-so-far-govt-sites-leaked-data-of-13-crore-people">
    <title>Biggest blast on Aadhaar leak so far: govt sites leaked data of 13 crore people</title>
    <link>https://cis-india.org/internet-governance/news/manorama-may-2-2017-jikku-varghese-jacob-biggest-blast-on-aadhaar-leak-so-far-govt-sites-leaked-data-of-13-crore-people</link>
    <description>
        &lt;b&gt;In yet another shocking report of personal data breach in India, it has emerged that Aadhaar data of 13 crore people was put out on websites of four major government projects in the country. The leaked data include bank account details of over one crore people linked to Aadhar numbers under the direct benefit scheme. Over eight crore people lost their private data on the national job guarantee scheme website alone.&lt;/b&gt;
        &lt;p&gt;The article by Jikku Varghese Jacob was &lt;a href="http://english.manoramaonline.com/news/nation/2017/05/01/government-sites-leaked-aadhaar-data-of-13-crore-cis-report.html"&gt;published by Manorama&lt;/a&gt; on May 2, 2017.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The shocking details have surfaced in a report released by the       Center for Internet Society (CIS) which deals with the publication       of Aadhaar data and their security. It appears to be the biggest       blast on Aadhaar data leak yet. The report says these pieces of       information were available on Internet since last November. Once       detected, the CIS officials had initiated steps to remove them.&lt;/p&gt;
&lt;p&gt;The CIS report cites two central government portals and websites       from Andhra Pradesh as violators. Following are the websites that       published the data:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;National Social Assistance Programme (under the Ministry of       Rural Development).&lt;/li&gt;
&lt;li&gt;The national portal of the job guarantee scheme.&lt;/li&gt;
&lt;li&gt;Daily online payment reports (Government of Andhra Pradesh)&lt;/li&gt;
&lt;li&gt;Chandranna Bheema project (Government of Andhra Pradesh)&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Private data of 1,59,42,083 people were leaked on the social       assistance scheme site. The two Andhra Pradesh sites breached the       privacy of three crore people.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Information leaked on most of the sites could be downloaded as       Excel sheet. It is estimated that data on 23 crore people is       linked to Aadhaar under the direct benefit scheme.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The CIS fears that if other government sites have also handled       such data without care there could have occurred a massive data       base breach. The CIS put in months of effort before finalizing       this report.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was recently found that Aadhaar data on 35 lakh people in       Kerala was found disclosed on the state's Sevana Pension website.       In Jharkhand, 14 lakh people had their privacy violated when their       Aadhaar information was put out on a government website.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Such leaks of Aadhaar data is a crime that can fetch up to three       years of imprisonment. Complaints have arisen that government       departments did not bother to comply with an IT ministry directive       last month to remove the Aadhaar data from websites.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Experts point out that criminals can misuse personal data on       Aadhaar and bank account. The data could be used to obtain SIM       cards and carry out transactions online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aadhaar, the world's largest bio-metric enrolment in India, will       enrol 1.2 billion people in a 12-digit unique number for each       person to be issued to each resident in the country. The number       with its biometric information – photograph, fingerprints and iris       scan – of each individual is easily verifiable in an online.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/manorama-may-2-2017-jikku-varghese-jacob-biggest-blast-on-aadhaar-leak-so-far-govt-sites-leaked-data-of-13-crore-people'&gt;https://cis-india.org/internet-governance/news/manorama-may-2-2017-jikku-varghese-jacob-biggest-blast-on-aadhaar-leak-so-far-govt-sites-leaked-data-of-13-crore-people&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-05-03T14:35:23Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-wire-may-1-2015-130-million-aadhaar-numbers-were-made-public-says-new-report">
    <title>130 Million Aadhaar Numbers Were Made Public, Says New Report</title>
    <link>https://cis-india.org/internet-governance/news/the-wire-may-1-2015-130-million-aadhaar-numbers-were-made-public-says-new-report</link>
    <description>
        &lt;b&gt;The research report looks at four major government portals whose poor information security practices have exposed personal data including bank account details.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a href="https://thewire.in/130948/aadhaar-card-details-leaked/"&gt;published in the Wire&lt;/a&gt; on May 1, 2017. This was also mirrored on &lt;a class="external-link" href="http://www.mensxp.com/technology/latest/36661-over-130-million-aadhaar-numbers-bank-details-were-leaked-way-are-not-surprised.html"&gt;MensXP.com&lt;/a&gt; on May 5, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Irresponsible         information security practices by a major central government         ministry and a state government may have exposed up to 135         million Aadhaar numbers, according to a new research report         released on Monday.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The&lt;a href="https://thewire.in/118250/government-expose-personal-data-thousands-indians/" rel="noopener           noreferrer" target="_blank" title=" last two months "&gt; last two months &lt;/a&gt;have seen a wave of data         leaks, mostly due improper information security practices, from         various central government and state government departments.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This &lt;a rel="noopener noreferrer" target="_blank" title="new report"&gt;new report&lt;/a&gt;, released by the Centre       for Internet and Society, studied four government databases. The       first two belong to the rural development ministry: the National       Social Assistance Programme (NSAP)’s dashboard and the National       Rural Employment Guarantee Act (NREGA)’s portal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The second two databases deal with the state of       Andhra Pradesh: namely, the state government’s own NREGA portal       and the online dashboard of a state government scheme called       “Chandranna Bima”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Based on the numbers available on the websites       looked at, estimated number of Aadhaar numbers leaked through       these 4 portals could be around 130-135 million and the number of       bank accounts numbers leaked at around 100 million from the       specific portals we looked at,” the report’s authors, Amber Sinha       and Srinivas Kodali, state.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The data leaks come, in part, from the       government’s decision to provide online dashboards that were       likely meant for general transparency and easy administration.       However, as the report notes, while open data portals are a       laudable goal, if there aren’t any proper safeguards, the results       can be downright disastrous.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“While availability of aggregate information on       the dashboard may play a role in making government functioning       more transparent, the fact that granular details about individuals       including sensitive PII such as Aadhaar number, caste, religion,       address, photographs and financial information are only a few       clicks away suggest how poorly conceived these initiatives are,”       the report says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Consider the NSAP portal for instance. The       dashboard allows users to explore a list of pensioners, whose       personally identifiable information include bank account number,       name and Aadhaar number. While these details are “masked for       public view”, the CIS report points out that if “one of the URL       query parameters of the website… was modified from ‘nologin’ to       ‘login'”, it became easy to gain access to the unmasked details       without a password.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It is entirely unclear to us what the the       purpose behind making available a data download pption on the NSAP       website is. This feature allows download of beneficiary details       mentioned above such as Beneficiary No., Name, Father’s/Husband’s       Name, Age, Gender, Bank or Post Office Account No. for       beneficiaries receiving disbursement via bank transfer and Aadhaar       Numbers for each area, district and state,” the report states.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;UIDAI role?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Kodali and Sinha also prominently finger the role       of the Unique Identification Authority of India (UIDAI), the       government agency that manages the Aadhaar initiative, in the data       leaks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“While the UIDAI has been involved in proactively       pushing for other databases to get seeded with Aadhaar numbers,       they take little responsibility in ensuring the security and       privacy of such data.With countless databases seeded with Aadhaar       numbers, we would argue that it is extremely irresponsible on the       part of the UIDAI, the sole governing body for this massive       project, to turn a blind eye to the lack of standards prescribed       for how other bodies shall deal with such data, such cases of       massive public disclosures of this data, and the myriad ways in       which it may used for mischief,” the report states.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Still public?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A crucial question that arises is whether these       government databases are still leaking data. Over the last two       months, some of information has been masked.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It must be stated that since we began reviewing       and documenting these portals, we have noticed that some of the       pages with sensitive PII (personally identifiable information)       have now been masked, presumably in response to growing reports       about Aadhaar leaks,” the report notes.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-wire-may-1-2015-130-million-aadhaar-numbers-were-made-public-says-new-report'&gt;https://cis-india.org/internet-governance/news/the-wire-may-1-2015-130-million-aadhaar-numbers-were-made-public-says-new-report&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-05-20T06:32:32Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/livemint-may-2-2017-komal-gupta-govt-may-have-made-135-million-aadhaar-numbers-public-cis-report">
    <title>Govt may have made 135 million Aadhaar numbers public: CIS report</title>
    <link>https://cis-india.org/internet-governance/news/livemint-may-2-2017-komal-gupta-govt-may-have-made-135-million-aadhaar-numbers-public-cis-report</link>
    <description>
        &lt;b&gt;CIS report says Aadhaar numbers leaked through government databases could be 100-135 million and bank accounts numbers leaked about 100 million.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Komal Gupta was &lt;a href="http://www.livemint.com/Politics/oj7ky556p6vdljXpRw8gPP/135-million-Aadhaar-numbers-made-public-by-government-author.html"&gt;published in Livemint&lt;/a&gt; on May 2, 2017.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;A central government ministry and a state government may have       made public up to 135 million Aadhaar numbers, according to a       research report issued by Bengaluru-based think tank Centre for       Internet and Society (CIS) late on Monday.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The &lt;a href="http://cis-india.org/internet-governance/information-security-practices-of-aadhaar-or-lack-thereof-a-documentation-of-public-availability-of-aadhaar-numbers-with-sensitive-personal-financial-information-1" target="_blank"&gt;report&lt;/a&gt; titled &lt;i&gt;Information Security         Practices of Aadhaar (or lack thereof): A documentation of         public availability of Aadhaar numbers with sensitive personal         financial information&lt;/i&gt; studied four government databases.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first two belong to the rural development ministry—the       National Social Assistance Programme (NSAP)’s dashboard and the       National Rural Employment Guarantee Act’s (NREGA) portal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The other two databases deal with Andhra Pradesh—the state’s own       NREGA portal and the online dashboard of a government scheme       called “Chandranna Bima”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Based on the numbers available on the websites looked at, the       estimated number of Aadhaar numbers leaked through these four       portals could be around 130-135 million and the number of bank       account numbers leaked at around 100 million from the specific       portals we looked at,” said Amber Sinha and Srinivas Kodali, the       authors of the research report.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The report claims these government dashboards and databases       revealed personally identifiable information (PII) due to a lack       of proper controls exercised by the departments.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“While the availability of aggregate information on the Dashboard       may play a role in making government functioning more transparent,       the fact that granular details about individuals including       sensitive PII such as Aadhaar number, caste, religion, address,       photographs and financial information are only a few clicks away       suggest how poorly conceived these initiatives are,” said the       report.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The report said the NSAP portal lists 94,32,605 bank accounts and       14,98,919 post office accounts linked with Aadhaar.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“While the UIDAI (Unique Identification Authority of India) has       been involved in proactively pushing for other databases to get       seeded with Aadhaar numbers, they take little responsibility in       ensuring the security and privacy of such data,” said the report.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;UIDAI did not respond to an email from &lt;i&gt;Mint&lt;/i&gt; seeking       comments.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/livemint-may-2-2017-komal-gupta-govt-may-have-made-135-million-aadhaar-numbers-public-cis-report'&gt;https://cis-india.org/internet-governance/news/livemint-may-2-2017-komal-gupta-govt-may-have-made-135-million-aadhaar-numbers-public-cis-report&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-05-03T15:43:37Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
