<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 71 to 85.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/business-standard-mayank-jain-march-27-2018-uidai-servers-or-third-parties-aadhaar-leaks-are-dangerous-experts"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/newslaundry-shruti-menon-may-2-2017-uidai-remains-silent-on-aadhaar-leaks-of-users-through-govt-portals"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/financial-express-may-19-2017-pti-uidai-puts-posers-to-cis-over-aadhaar-data-leak-claim"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/uid-practices-and-it-act-sec-43-a-and-subsequent-rules"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/economic-times-january-11-2018-uidai-introduces-new-two-layer-security-system-to-improve-aadhaar-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/medianama-nikhil-pahwa-may-19-2017-uidai-cis-india-aadhaar"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/livemint-komal-gupta-january-7-2018-uidai-denies-any-breach-of-aadhaar-database"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/biometric-update-july-4-2017-justin-lee-uidai-declining-multiple-requests-by-police-to-share-indian-citizens-biometrics"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/economic-times-may-18-2017-mahendra-singh-uidai-asks-centre-for-internet-and-society-to-provide-hacker-details"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/uidai-and-welfare-services-exclusion-and-countermeasures-aug-27"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/financial-express-november-20-2017-government-websites-made-aadhaar-details-public"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/UID_Questions_without_Answers"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy/uid-nothing-to-hide-fear"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/uid-a-data-subjects-registration-tale"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/uid-research"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/business-standard-mayank-jain-march-27-2018-uidai-servers-or-third-parties-aadhaar-leaks-are-dangerous-experts">
    <title>UIDAI servers or third parties, Aadhaar leaks are dangerous: Experts</title>
    <link>https://cis-india.org/internet-governance/news/business-standard-mayank-jain-march-27-2018-uidai-servers-or-third-parties-aadhaar-leaks-are-dangerous-experts</link>
    <description>
        &lt;b&gt;Even though the UIDAI has denied these reports, its arguments rest on shaky grounds, according to experts.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Mayank Jain was published in &lt;a class="external-link" href="http://www.business-standard.com/article/current-affairs/uidai-servers-or-third-parties-aadhaar-leaks-are-dangerous-experts-118032601008_1.html"&gt;Business Standard&lt;/a&gt; on March 27, 2018. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The government has told the Supreme Court that the Aadhaar data “remains safely behind 13-feet high walls” and it will take “the age of the universe” to break one key in the Unique Identification Authority of India’s (UIDAI’s) encryption.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even if this claim is taken at face value, experts suggest leaks from third-party databases seeded with Aadhaar numbers are equally dangerous and the UIDAI is responsible for the damage. &lt;span&gt;The most recent case came from a report published online and it said random numbers could provide access to the Aadhaar data, which also includes people’s financial information, from a state-owned company’s database. &lt;/span&gt;&lt;span&gt;Even though the UIDAI has denied these reports, its arguments rest on shaky grounds, according to experts.“There is no truth in this story as there has been absolutely no breach of the UIDAI’s Aadhaar database.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aadhaar remains safe and secure,” the UIDAI said on Twitter shortly after the story broke on ZDNet.The authority added even if the report was taken to be true, “it would raise security concerns on the database of that Utility Company and has nothing to do with the security of the UIDAI’s Aadhaar database”.This has been the authority’s defence in several such cases but those in the know of things say it doesn’t hold water simply because the Aadhaar data is not concentrated in the UIDAI’s complexes anymore and has spread across various databases.“Publishing this by the state entities is a violation under the Aadhaar Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even if you publish your Aadhaar number, it is a violation of the law,” said Pranesh Prakash, policy director at the Centre for Internet and Society.“Saying that the UIDAI has not been compromised is thoroughly insufficient because for customers, it doesn’t matter if the leak comes from servers operated by the UIDAI or from others holding copies of the UIDAI database.”Prakash said it should be the authority’s responsibility to help others comply with the law and prevent data leaks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He gave the example of biometric leaks from Gujarat government servers and how criminals used them to forge fingerprints.The possibility of data leaks was demonstrated when Robert Baptiste, purportedly a French app developer, announced on Twitter how he got access to thousands of scanned Aadhaar card copies through simple Google searches.In an interview to Business Standard, Baptiste said the major threat was data handling by third parties, which could lead to identity theft.Even the Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Act, 2016, has provisions that debar making public citizens’ Aadhaar-related information public unless required for certain purposes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Whoever intentionally discloses, transmits, copies or otherwise disseminates any identity information collected in the course of enrolment or authentication to any person not authorised under this Act” can be in jail for three years and pay a fine of ~10,000 under the Act.A lawyer appearing on the petitioners’ side in the ongoing Supreme Court case on the constitutional validity of Aadhaar said only the UIDAI had the powers to file cases against people who published Aadhaar information. Hence everyone else is helpless despite the leaks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UIDAI’s argument that Aadhaar information can’t be misused is duplicitous because the regulations under the Aadhaar Act assure individuals that if biometric authentication fails, they should have other means of identifying themselves, says Kiran Jonnalagadda, founder of HasGeek.“So the regulations guarantee that anyone in possession of stolen identity information will be able to misuse it without biometric authentication,” he said.Prakash agreed with this. He said demographic authentication, which is an acceptable authentication method under the Aadhaar Act, was prone to misuse as long as Aadhaar numbers remained public.“Aadhaar is used as just a piece of paper, unlike security features embedded in passports or even permanent account number cards. Thus, demographic authentication merely involves providing Aadhaar numbers and details like addresses, which can be used even for things like getting entry into an airport by just printing a ticket and having a fake Aadhaar,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;em&gt;Queries sent to the UIDAI were not answered till the time of going to press&lt;/em&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/business-standard-mayank-jain-march-27-2018-uidai-servers-or-third-parties-aadhaar-leaks-are-dangerous-experts'&gt;https://cis-india.org/internet-governance/news/business-standard-mayank-jain-march-27-2018-uidai-servers-or-third-parties-aadhaar-leaks-are-dangerous-experts&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-03-27T02:16:55Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/newslaundry-shruti-menon-may-2-2017-uidai-remains-silent-on-aadhaar-leaks-of-users-through-govt-portals">
    <title>UIDAI remains silent on #Aadhaarleaks of 13 crore users through government portals</title>
    <link>https://cis-india.org/internet-governance/news/newslaundry-shruti-menon-may-2-2017-uidai-remains-silent-on-aadhaar-leaks-of-users-through-govt-portals</link>
    <description>
        &lt;b&gt;As the arguments for making Aadhaar mandatory go on, is there any way to stem the leaks and identify who exactly has all this information.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post by Shruti Menon was &lt;a class="external-link" href="https://www.newslaundry.com/2017/05/02/uidai-remains-silent-on-aadhaarleaks-of-13-crore-users-through-government-portals"&gt;published by Newslaundry&lt;/a&gt; on May 2, 2017&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The verdict on linking Aadhaar with Permanent Account Number (PAN) and  making it mandatory for filing income tax returns (ITRs) will be out  soon. Attorney General Mukul Rohatgi had a tough challenge ahead of him  in the Supreme Court as the state presented its argument today. Rohatgi  defended the &lt;a href="http://www.livemint.com/Politics/3FcQ9lHm7TWX5B0Hn7ZXiO/Aadhaar-to-be-mandatory-for-income-tax-returns-getting-PAN.html" target="_blank"&gt;amendment in income tax law&lt;/a&gt; allowing this after senior lawyer Shyam Divan made a &lt;a href="http://www.livemint.com/Politics/sN0S5mYYx641tgrctGf03H/Shyam-Divan-concludes-arguments-in-Aadhaar-case-in-Supreme-C.html" target="_blank"&gt;strong case&lt;/a&gt; against  it on April 26 and 27. Divan became a hero to many overnight after he  presented compelling arguments against the amendment citing facets of  right to privacy - informational self-determination, personal autonomy,  and bodily integrity - as he did so. Though the court has &lt;a href="https://www.thequint.com/opinion/2017/05/01/aadhaar-case-privacy-and-bodily-integrity" target="_blank"&gt;refused to entertain&lt;/a&gt; arguments pertaining to privacy, he managed to argue these concerns without couching them under right to privacy laws.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Advocate Gautam Bhatia posted &lt;a href="https://barandbench.com/aadhar-hearing-number-tagging-nazi-concentration-camps/" target="_blank"&gt;minute-by-minute developments from the courtroom&lt;/a&gt;, and soon, #ThankYouMrDivan became one of the top trends on Twitter.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A day before the state presented its arguments, the Centre for Internet and Society (CIS) published a &lt;a href="http://cis-india.org/internet-governance/information-security-practices-of-aadhaar-or-lack-thereof-a-documentation-of-public-availability-of-aadhaar-numbers-with-sensitive-personal-financial-information-1" target="_blank"&gt;report &lt;/a&gt;titled  “Information, Security Practices of Aadhaar (or lack thereof): A  documentation of public availability of Aadhaar numbers with sensitive  personal financial information” late on Monday. Authored by Amber Sinha  and Srinivas Kodali, the report documents the leaks of over 13 crore  Aadhaar numbers and resulting information of beneficiaries through four  government portals-two at the centre and two at the state. “We are  primarily talking of lack of standards and data fact-checking, storage  and how all of this information- account numbers, phone numbers plus,  Aadhaar numbers- in public domain increases the nature of risk of the  backbone of digital payments,” Kodali told &lt;i&gt;Newslaundry. &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The four portals studied by the two are National Social Assistance  Programme (NSAP), National Rural Employment Guarantee Act (NREGA) and  two databases of Andhra Pradesh- NREGA and their scheme called Chandranna Bima.  The report claims that the aforementioned public portals compromised  personally identifiable information (PII) including “Aadhaar numbers and  financial details such as bank account numbers” of 13 crore people due  to a lack of security controls.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“While the details were masked for public view, someone with login  access could get the details,” the report read. “When one of the url  query parameters of the website showing the masked personal details was  modified from ‘nologin’ to ‘login’, that is, control access to login  based pages were allowed providing unmasked details without the need for  a password.” What this essentially means is that these portals allow  people to explore lists organised by states, districts, area,  sub-district, and municipalities which contain the personal information  of the people who are enrolled into the schemes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The report also  cites legal framework under the Aadhaar Act that allows the government  or private entities to store Aadhaar numbers on the grounds that they  won’t be used for purposes other than those listed in the act. CIS’s  study, however, reveals that information pertaining to religion, caste,  race, tribe or even income is sometimes collected and published on such  portals with little in the way of security checks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Speaking to &lt;i&gt;Newslaundry,&lt;/i&gt; Anupam Saraph, professor and former governance and IT advisor to Goa’s  Chief Minister, Manohar Parrikar, said that the data exposed could be  significantly more than what the report shows. “Many more Aadhaar  numbers have been exposed on websites relating to Pension Schemes, PDS,  Ministry of Water and Sanitation, Ministry of Human Resource  Development, Scholarships, Schools, Colleges, Universities, Kendriya  Sainik board, PM Avas Yojana to name a few,” he said. “Besides this  Registrars to the UIDAI (State Governments and various ministries of the  Central government, some Public Sector undertakings) were allowed to  retain the Aadhaar number, demographic and biometric data (associated  with the Aadhaar number). While this may not be exposed on websites, it  is unsecured and possibly accessible to data brokers within and outside  government,” said Saraph who has designed delivery channels and ID  schemes for better governance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What’s worth noting is that the  people whose data has been breached are unaware that their information  is available on public platforms and vulnerable to data theft. “It is  UIDAI’s [Unique Identification Authority of India] job to investigate  and inform them,” Kodali told &lt;i&gt;Newslaundry. “&lt;/i&gt;At some point of time, everybody is going to have everybody’s information,” he added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Currently, the government has an &lt;a href="https://data.gov.in/" target="_blank"&gt;open data portal&lt;/a&gt;. It  describes itself as a platform “intended to be used by Government  Ministries/Departments and their organisation to publish datasets,  documents, services, tools and applications collected by them for public  use”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So is it feasible to have open data portals for  transparency and accountability? “Having certain government data being  publicly accessible is certainly desirable.” Saraph continued that the  problem was, data on public expenditure should ideally be openly  accessible but it’s also where the most leakage occurs. “Making Aadhaar  mandatory is meaningless,” he said, as India does not have a policy on  open data portals yet, which can subject Aadhaar data to “misuse”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Given  that the UIDAI is responsible for investigating and making people aware  of any data breach or theft, they have remained silent for an oddly  long time. It is unclear whether the UIDAI is itself aware of who has  accessed the data that is insecurely published on these government  portals. “They’re letting everybody collect this information but they  were not aware themselves that who had access to this information,  that’s the main problem,” Kodali said. While the Aadhaar ecosystem was  to ensure social inclusion and transparency, in its current form, the  system looks so opaque that the people who are running it may not be  aware themselves of what is going on.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What does it mean to have access to someone else’s Aadhaar?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With  an increasing number of social welfare schemes being linked to Aadhaar,  it was touted as an attempt to remove the middlemen, frauds and  corruption with the government. According to the report, "A cumulative  amount of Rs 1,78,694.75 has been transferred using DBT for 138 schemes  under 27 ministries since 2013. Various financial frameworks like  Aadhaar Payments Bridge (APB) and Aadhaar Enabled Payment Systems (AePS)  have been built by National Payment Corporation of India to support DBT  and also to allow individuals use Aadhaar for payments."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Given  that such systems are in place to ensure easier and accessible banking,  research shows that the Aadhaar seeding process led to government  portals putting personal information of so many people under various  schemes in the "absence of information security practices to handle so  much PII", as per the research. This is not only a breach of privacy but  also makes a person vulnerable to financial fraud in cases where their  bank details are public. "One of the prime examples is individuals  receiving phone calls from someone claiming to be from the bank. Aadhaar  data makes this process much easier for fraud and increases the risk  around transactions," the report reads.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;UIDAI on silent mode&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unfortunately,  UIDAI has not addressed this concern, let alone acknowledge it. It has  been cracking down on people by filing first information reports (FIRs)  against those tracking and exposing the vulnerabilities of the Aadhaar  system. Recently, UIDAI’s Chief Executive Officer (CEO), ABP Pandey was  accused of blocking twitter handles of prominent security researchers  and analysts who have been extensively reporting about vulnerabilities  in the Aadhaar system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of the handles was blocked was Saraph’s. “I do not know why they  blocked me. I have been vocal about the problems associated with the UID  and its use,” he said&lt;i&gt;. &lt;/i&gt;He added that he served several &lt;a href="http://www.moneylife.in/article/resisting-violations-of-the-supreme-court-orders-on-aadhaar/49121.html," target="_blank"&gt;notices&lt;/a&gt; of  contempt of court to the CEO of UIDAI and has been questioning the  verification and audit of UID database. “Perhaps [he] was annoyed with  my efforts to make them accountable and responsible,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On  April 18, however, in a response to Right to Information (RTI) query  filed by Sushil Kambampati, UIDAI denied having blocked any twitter  handles. Almost immediately, it was called out on twitter for ‘lying’ in  the RTI response as many users claimed it had.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Saraph declared that such a move, the blocking of users asking  questions, was indicative of UIDAI’s cluelessness. Apar Gupta, a  Delhi-based lawyer working on cyber security, had told &lt;i&gt;Newslaundry &lt;/i&gt;that  it was unethical and unconstitutional of government bodies (such as the  UIDAI) to block people. He reiterated that in one of his tweets  recently.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Today, however, the Pandey’s individual twitter profile no longer  exists. It has now been changed to “ceo_office”. CIS’s report states  that the UIDAI has been pushing for more databases to get in sync with  Aadhaar, but with little or no accountability. “While the UIDAI has been  involved in proactively pushing for other databases to get seeded with  Aadhaar numbers, they take a little responsibility in ensuring the  security and privacy of such data,” the report reads. Kodali, however,  told &lt;i&gt;Newslaundry &lt;/i&gt;that the report was not aimed at questioning the  security of such seeding. “We’re not saying it is not really secure but  we’re just saying it increases the risk factors,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;UIDAI has also not responded to several queries filed by vulnerability testers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Newslaundry &lt;/i&gt;reached out to the UIDAI with the following questions:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;p&gt; &lt;/p&gt;
&lt;li&gt;&lt;i&gt; According to the report published, four government portals have  personally identifiable information of about 13 crore people including  their Aadhaar numbers and bank account details. What is being done about  this?&lt;/i&gt;&lt;/li&gt;
&lt;p&gt; &lt;/p&gt;
&lt;li&gt;&lt;i&gt; If a person's privacy has been breached, what are the steps UIDAI would take for redressal?&lt;/i&gt;&lt;/li&gt;
&lt;p&gt; &lt;/p&gt;
&lt;li&gt;&lt;i&gt; Is UIDAI investigating the 13 crore Aadhaar leaks?&lt;/i&gt;&lt;/li&gt;
&lt;p&gt; &lt;/p&gt;
&lt;li&gt;&lt;i&gt; The report states "When one of the url query parameters of website  showing the masked personal details was modified from “nologin” to  “login”, that is control access to login based pages were allowed  providing unmasked details without the need for a password." Is this  true, and if so, what is your statement?&lt;/i&gt;&lt;/li&gt;
&lt;p&gt; &lt;/p&gt;
&lt;li&gt;&lt;i&gt; How do you ensure data security on open data portals?&lt;/i&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;This piece will be updated if and when they respond.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While  UIDAI remains silent, A-G Rohatgi argued today that close to 10 lakh  PAN cards were found to be fake. "Are they propagating a general public  interest or propagating the fraud (fake PANs) which is going in," he  said at the court today while suggesting that Aadhaar was the only way  of preventing fake or duplicate cards.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Senior advocate Arvind  Datar, who is also appearing for one of the three petitioners in the  case said that the government could not take away his right to chose  whether or nor to have an Aadhaar. "The Supreme Court had directed them  that they cannot make it mandatory. The mandate of the Supreme Court can  not be undone. My right of not to have an Aadhaar can not be taken away  indirectly."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though there are problems with the Aadhaar system  and apparently very little redressal at the citizen’s end, Aadhaar is  here to stay. As Divan and Rohatgi argue the constitutionality of making  Aadhaar mandatory at the Supreme Court, the pertinent question that  only the UIDAI can answer is whether they are technologically capable of  keeping data secure given how aggressively Aadhaar linkage is being  promoted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, Rohatgi's argument in court today, according to  a Business Standard report was that the government cannot destroy the  Aadhaar cards of people even after their death. Instead of being  reassuring, this only seems to increase the possibilities for identity  theft, as if there is little in the way of redressal mechanisms in life,  what choices do the dead have?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The author can be contacted on Twitter &lt;a href="https://twitter.com/shrutimenon10" target="_blank"&gt;@shrutimenon10&lt;/a&gt;.&lt;/b&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/newslaundry-shruti-menon-may-2-2017-uidai-remains-silent-on-aadhaar-leaks-of-users-through-govt-portals'&gt;https://cis-india.org/internet-governance/news/newslaundry-shruti-menon-may-2-2017-uidai-remains-silent-on-aadhaar-leaks-of-users-through-govt-portals&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-05-20T11:06:16Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/financial-express-may-19-2017-pti-uidai-puts-posers-to-cis-over-aadhaar-data-leak-claim">
    <title>UIDAI puts posers to CIS over Aadhaar data leak claim</title>
    <link>https://cis-india.org/internet-governance/news/financial-express-may-19-2017-pti-uidai-puts-posers-to-cis-over-aadhaar-data-leak-claim</link>
    <description>
        &lt;b&gt;Aadhaar-issuing authority UIDAI has asked research firm Centre for Internet and Society (CIS) to explain its sensational claim that 13 crore Aadhaar numbers were "leaked" and provide details of servers where they are stored.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article originally published by PTI was also &lt;a class="external-link" href="http://www.financialexpress.com/economy/uidai-puts-posers-to-cis-over-aadhaar-data-leak-claim/675814/"&gt;published by the Financial Express&lt;/a&gt; on May 19, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Aadhaar-issuing authority UIDAI has asked research firm Centre for  Internet and Society (CIS) to explain its sensational claim that 13  crore Aadhaar numbers were “leaked” and provide details of servers where  they are stored. In a precursor to initiating a probe into the matter,  the Unique Identification Authority of India (UIDAI) also wants CIS to  clarify just how much of such “sensitive data” are still with it or  anyone else. The UIDAI — which has vehemently denied any breach of its  database — shot off a letter to CIS yesterday asking for the details,  including the servers where the downloaded “sensitive data” are residing  and information about usage or sharing of such data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Underscoring the importance of bringing to justice those involved in  “hacking such sensitive information”, the UIDAI sought CIS’ “assistance”  in this regard and has given it time till May 30 to revert on the  issue. “Your report mentions 13 crore people’s data have been leaked.  Please specify how much (of) this data have been downloaded by you or  are in your possession, or in the possession of any other persons that  you know,” the UIDAI said in its communication to CIS.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Interestingly, in what market watchers described as an apparent  flip-flop, CIS has now clarified that there was no leak’ or ‘breach’ of  Aadhaar numbers, but rather ‘public disclosure’. Meanwhile, the UIDAI  has quoted sections of the Information Technology Act, 2000, and the  Aadhaar Act to emphasise that violation of the clauses are punishable  with rigorous imprisonment of up to 10 years. “While your report  suggests that there is a need to strengthen IT security of the  government websites, it is also important that persons involved in  hacking such sensitive information are brought to justice for which your  assistance is required under the law,” it said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UIDAI has  also sought technical details on how access was gained for the National  Social Assistance Programme (NSAP) site — one of the four portals where  the alleged leak happened. When contacted, UIDAI CEO Ajay Bhushan Pandey  said, “We do not comment on individual matters.” The UIDAI has also  asked for details of systems that were involved in downloading and  storing of the sensitive data so that forensic examination of such  machines can be conducted to assess the quantum and extent of damage to  privacy of data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UIDAI letter comes after a CIS’ report early this month which  claimed that Aadhaar numbers and personal information of as many as 135  million Indians could have been leaked from four government portals due  to lack of IT security practices. “Based on the numbers available on the  websites looked at, estimated number of Aadhaar numbers leaked through  these four portals could be around 130-135 million,” the report had  said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, in a apparent course correction on May 16, a day before the  UIDAI’s letter went out — CIS updated its report and clarified that  although the term ‘leak’ was originally used 22 times in its report, it  is “best characterised as an illegal data disclosure or publication and  not a breach or a leak”. CIS has also claimed that some of its findings  were “misunderstood or misinterpreted” by the media, and that it never  suggested that the biometric database had been breached. “We completely  agree with both Dr Pandey (UIDAI CEO) and Sharma (Trai Chairman R S  Sharma) that CIDR (Aadhaar central repository) has not been breached,  nor is it suggested anywhere in the report,” CIS said in its latest  update.&lt;/p&gt;
&lt;div class="youmaylike" style="text-align: justify; "&gt;&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/financial-express-may-19-2017-pti-uidai-puts-posers-to-cis-over-aadhaar-data-leak-claim'&gt;https://cis-india.org/internet-governance/news/financial-express-may-19-2017-pti-uidai-puts-posers-to-cis-over-aadhaar-data-leak-claim&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UIDAI</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-05-19T09:28:33Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/uid-practices-and-it-act-sec-43-a-and-subsequent-rules">
    <title>UIDAI Practices and the Information Technology Act, Section 43A and Subsequent Rules</title>
    <link>https://cis-india.org/internet-governance/blog/uid-practices-and-it-act-sec-43-a-and-subsequent-rules</link>
    <description>
        &lt;b&gt;UIDAI practices and section 43A of the IT Act are analyzed in this post.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;In the 52&lt;sup&gt;nd&lt;/sup&gt; Report on Cyber Crime, Cyber Security, and the Right to Privacy – in evidence provided, the Department of Electronics and Information Technology stated &lt;i&gt;“...Section 43A and the rules published under that Section cover the entire privacy in case of digital data. These are being followed by UIDAI also and other organisations...”&lt;/i&gt; (pg.46) &lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This blog post explains the requirements found under Section 43A of the Information Technology Act 2000 and the subsequent Information Technology “ Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules 2011&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt; and analyses publicly available documents from the UIDAI website&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt; as well as the UIDAI enrolment form&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; to demonstrate the ways in which:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;UIDAI practices &lt;b&gt;are &lt;/b&gt;in line with section 43A and the Rules, &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;UIDAI practices &lt;b&gt;are not&lt;/b&gt; in line with section 43A and the Rules, &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;UIDAI practices &lt;b&gt;are partially&lt;/b&gt; in with section 43A and the Rules &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Where more information&lt;/b&gt; is needed to draw a conclusion. &lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Applicability and Scope&lt;/h3&gt;
&lt;p&gt;Section 43A of the Information Technology Act 2008 and subsequent Rules apply only to Body Corporate and to digital information.&lt;/p&gt;
&lt;p&gt;Body Corporate under the Information Technology Act 2008 is defined as:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; “Any company and includes a firm, sole proprietorship or other association of individuals engaged in commercial or professional activities” &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;UIDAI Practices - not in line&lt;/b&gt;: The UIDAI is not a body corporate. The UIDAI is an attached office under the aegis of the Planning Commission that was set up by an executive order.&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UIDAI collects, processes, stores, and shares both digital and non-digital information. As section 43A and subsequent Rules apply only to digital information, there is not sufficient protection provided over all the information collected, processed, stored, and used by the UIDAI.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Privacy Policy on Website&lt;/h3&gt;
&lt;p&gt;Rule 4 requires body corporate to provide a privacy policy on their website. The privacy policy must include:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Clear and easily accessible statements of its practices and policies&lt;/li&gt;
&lt;li&gt;Type of personal or sensitive personal data or information collected&lt;/li&gt;
&lt;li&gt;Purpose of collection and usage of such information &lt;/li&gt;
&lt;li&gt;Disclosure of information including sensitive personal information &lt;/li&gt;
&lt;li&gt;Reasonable security practices and procedures as provided under rule 8&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;UIDAI Practices - Partially in Line&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Though the UIDAI has placed a privacy policy&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt; on their website, the privacy policy only addresses the use of website and does not comprehensively provide clear and accessible statements about all of the UIDAI’s practices and policies.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The UIDAI privacy policy does not state the specific types of personal or sensitive data that could be collected, but instead states &lt;i&gt;“As a general rule, this website does not collect Personal Information about you when you visit the site. You can generally visit the site without revealing Personal Information, unless you choose to provide such information.”&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;Features on the UIDAI website that require individuals to provide personal information and sensitive personal information include: Booking an appointment, checking aadhaar status, enrolling for e-aadhaar, enrolling for aadhaar, updating aadhaar data. Types of information required for these services include: mobile number, name, address, gender, date of birth, and enrolment ID.&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;The privacy policy goes on to state: &lt;i&gt; “If you are asked for any other Personal Information you will be informed how it will be used if you choose to give it. If at any time you believe the principles referred to in this privacy statement have not been followed, or have any other comments on these principles, please notify the webmaster through the Contact Us page. Note: The use of the term "Personal Information" in this privacy statement refers to any information from which your identity is apparent or can be reasonably ascertained.”&lt;/i&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The UIDAI privacy policy does explain the purpose for collection of information on the website and the use of collected information.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The UIDAI privacy policy does not address the possibility of disclosure of information collected by the UIDAI from the use of its website, except in the case of when an individual provides his/her email at which point the privacy policy states&lt;i&gt; “Your e-mail address will not be used for any other purpose, and will not be disclosed without your consent.”&lt;/i&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The UIDAI privacy policy does not provide information about the security practices adopted by the UIDAI. &lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Consent&lt;i&gt; &lt;/i&gt;&lt;/h3&gt;
&lt;p&gt;Rule 5 requires that prior to the collection of sensitive personal data, the body corporate must obtain consent, either in writing or through fax regarding the purpose of usage before collection of such information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;UIDAI Practices - in Line&lt;/b&gt;&lt;br /&gt;The UIDAI collects written consent from individuals through the enrolment form  for the issuance of an Aadhaar number.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Collection Limitation&lt;/h3&gt;
&lt;p&gt;Rule 5 (2) requires that body corporate only collect sensitive personal data if it is connected to a lawful purpose and if it is considered necessary for that purpose.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;UIDAI Practices - in Line&lt;/b&gt;&lt;br /&gt;The Aadhaar enrolment form requires only the necessary sensitive personal data for the issuance of an Aadhaar number. Individuals are given the option to provide banking and financial information.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Notice During Direct Collection&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Rule 5(3) requires that while collecting information directly from an individual the body corporate must provide the following information:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The fact that the information is being collected&lt;/li&gt;
&lt;li&gt;The purpose for which the information is being collected&lt;/li&gt;
&lt;li&gt;The intended recipients of the information &lt;/li&gt;
&lt;li&gt;The name and address of the agency that is collecting the information&lt;/li&gt;
&lt;li&gt;The name and address of the agency that will retain the information&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;UIDAI Practices - Partially in Line&lt;br /&gt;&lt;/b&gt;The Aadhaar enrolment form does not provide the following information:&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The intended recipients of the information&lt;/li&gt;
&lt;li&gt;The name and address of the agency collecting the information &lt;/li&gt;
&lt;li&gt;The name and address of the agency that will retain the information &lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Retention Limitation&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Rule 5(4) requires that body corporate must retain sensitive personal data only for as long as it takes to fulfil the stated purpose or otherwise required under law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;UIDAI Practices - Unclear&lt;/b&gt;&lt;br /&gt;It is unclear from publicly available information what the UIDAI retention practices are.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Use Limitation&lt;/h3&gt;
&lt;p&gt;Rule 5(5) requires that information must be used for the purpose that it was collected for.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;UIDAI Practices - Unclear&lt;br /&gt;&lt;/b&gt;It is unclear from publicly available information if the UIDAI is using collected information only for the purpose for which it was collected for. &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h3&gt;Right to Access and Correct&lt;b&gt; &lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;Rule 5(6) requires body corporate to provide individuals with the ability to review the information they have provided and access and correct  personal or sensitive personal information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;UIDAI Practices - Partially in Line&lt;br /&gt;&lt;/b&gt;Though the UIDAI provides individuals with the ability to access and correct personal information, as stated on the enrolment form, correction is free only if changed within 96 hours of enrolment. Additionally, as stated on the enrolment form, if an individual chooses to allow for the UIDAI to facilitate the opening of a bank account and link present bank accounts to the UID number, this information, after being provided, cannot be corrected. The UIDAI website has a portal for updating information, but only name, address, gender, data of birth, and mobile number can be updated through this method.&lt;b&gt; &lt;/b&gt;&lt;a href="#fn9" name="fr9"&gt;[9]&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Right to ‘Opt Out’ and Withdraw Consent&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Rule 5(7) requires that body corporate must provide individuals with the option of 'opting out' of providing data or information sought. Individuals also have the right to withdraw consent at any point of time.  Body corporate has the right to withdraw services if consent is withdrawn.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;UIDAI Practices - Partially in Line&lt;br /&gt;&lt;/b&gt;The UID enrolment form provides individuals with one ‘optional’ field  - the option of having the UIDAI open a bank account and link it to the individuals UID number or having the UIDAI link present bank accounts to individuals UID number. No other option to ‘opt out’ or withdraw consent is present on the enrolment form or the UIDAI privacy policy, terms of use, or website.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Security of Information&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Rule 8 requires that body corporate must secure information in accordance with the ISO  27001 standard. These practices must be audited on an annual basis or when the body corporate undertakes a significant up gradation of its process and computer resource.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;UIDAI Practices - Unclear&lt;br /&gt;&lt;/b&gt;The security practices adopted by the UIDAI are not mentioned in the website privacy policy, on the website, or on the enrolment form, thus it is unclear from publicly available information if the UID is compliant with ISO 27001 standards. Though the UIDAI has been functioning since 2010, and it is unclear from publicly available information if annual audits of the UIDAI security practices have been undertaken.&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Disclosure with Consent&lt;b&gt; &lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Rule 6 requires that body corporate must have consent before disclosing sensitive personal data to any third person or party, except in the case with Government agencies for the purpose of verification of identity, prevention, detection, investigation, including cyber incidents and prosecution and punishment of offenses, on receipt of a written request. &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;UIDAI Practices - Partially in Line&lt;/b&gt;&lt;br /&gt;In the enrolment form, consent for disclosure is stated as&lt;i&gt; ‘‘I have no objection to the UIDAI sharing information provided by me to the UIDAI with agencies engaged in delivery of welfare services.” &lt;/i&gt;This is a blanket statement and allows for all future possibilities of sharing and disclosure of information provided with any organization that the UIDAI deems as ‘engaged in the delivery of welfare services’.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UIDAI privacy policy only addresses the disclosure of an individual’s email address with consent. Though not directly addressing disclosure, the UIDAI privacy policy also states &lt;i&gt;“&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;We will not identify users or their browsing activities, except when a law enforcement agency may exercise a warrant to inspect the service provider's logs.”&lt;/i&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Prohibition on Publishing and Further Disclosure&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Rule 6(3) and 6(4) prohibit the body corporate from publishing sensitive personal  data or information. Similarly, organizations receiving sensitive personal data are not allowed to disclose it further.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;UIDAI Practices - in Line&lt;/b&gt;&lt;br /&gt;The UDAI does not publish sensitive personal data. It is unclear what practices and standards registrars and enrolment agencies are functioning under.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Requirements for Transfer of Sensitive Personal Data&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Rule 7 requires that body corporate may transfer sensitive personal data into another jurisdiction only if the country ensures the same level of protection.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;UIDAI Practices - Unclear&lt;br /&gt;&lt;/b&gt;It is unclear from publicly available information if information collected by the UIDAI is transferred outside of India. &lt;b&gt;&lt;/b&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Establishment of Grievance Officer&lt;b&gt;&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Rule 5(9) requires that body corporate must establish a grievance officer and the details must be posted on the body corporates website and grievances must be addressed within a month of receipt. &lt;b&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;UIDAI Practices - in Line&lt;br /&gt;&lt;/b&gt;The website of the UIDAI provides details of a grievance officer that individuals can contact.&lt;a href="#fn10" name="fr10"&gt;[10]&lt;/a&gt; It is unclear from publicly available information if grievances are addressed within a month.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. &lt;a class="external-link" href="http://164.100.47.134/lsscommittee/Information%20Technology/15_Information_Technology_52.pdf"&gt;http://164.100.47.134/lsscommittee/Information%20Technology/15_Information_Technology_52.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. &lt;a class="external-link" href="http://dispur.nic.in/itact/it-procedures-sensitive-personal-data-rules-2011.pdf"&gt;http://dispur.nic.in/itact/it-procedures-sensitive-personal-data-rules-2011.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. &lt;a class="external-link" href="http://uidai.gov.in/"&gt;http://uidai.gov.in/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. &lt;a class="external-link" href="http://www.jharkhand.gov.in/marpdf/Aadhar-enrolmentform.pdf"&gt;http://www.jharkhand.gov.in/marpdf/Aadhar-enrolmentform.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. &lt;a class="external-link" href="http://uidai.gov.in/organization-details.html"&gt;http://uidai.gov.in/organization-details.html&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. &lt;a class="external-link" href="http://uidai.gov.in/privacy-policy.html"&gt;http://uidai.gov.in/privacy-policy.html&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. &lt;a class="external-link" href="http://resident.uidai.net.in/home"&gt;http://resident.uidai.net.in/home&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. &lt;a class="external-link" href="http://www.jharkhand.gov.in/marpdf/Aadhar-enrolmentform.pdf"&gt;http://www.jharkhand.gov.in/marpdf/Aadhar-enrolmentform.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;]. &lt;a class="external-link" href="https://ssup.uidai.gov.in/web/guest/ssup-home"&gt;https://ssup.uidai.gov.in/web/guest/ssup-home&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr10" name="fn10"&gt;10&lt;/a&gt;]. &lt;a class="external-link" href="http://uidai.gov.in/contactus.html"&gt;http://uidai.gov.in/contactus.html&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/uid-practices-and-it-act-sec-43-a-and-subsequent-rules'&gt;https://cis-india.org/internet-governance/blog/uid-practices-and-it-act-sec-43-a-and-subsequent-rules&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-03-06T07:00:21Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/economic-times-january-11-2018-uidai-introduces-new-two-layer-security-system-to-improve-aadhaar-privacy">
    <title>UIDAI introduces new two-layer security system to improve Aadhaar privacy</title>
    <link>https://cis-india.org/internet-governance/news/economic-times-january-11-2018-uidai-introduces-new-two-layer-security-system-to-improve-aadhaar-privacy</link>
    <description>
        &lt;b&gt;The Unique Identification Authority of India (UIDAI) has introduced a system of virtual authentication for citizens enrolled on its database and limited the access available to service providers in a move aimed at allaying widespread concern over security breaches that have dogged the world's largest repository of citizen data. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in &lt;a class="external-link" href="https://economictimes.indiatimes.com/news/economy/policy/uidai-introduces-new-two-layer-security-system-to-improve-aadhaar-privacy/articleshow/62442873.cms"&gt;Economic Times&lt;/a&gt; on January 11, 2018.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;In one of the most significant security upgrades by the eightyear old agency, the UIDAI announced the creation of a "virtual ID" which can be used in lieu of the 12-digit Aadhaar number at the time of authentication for any service.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UIDAI has also limited access to stored personal information and mandated the use of unique tokens through which authenticating agencies can access required data. It claims that the measures will strengthen privacy and also prevent combining of databases linked to Aadhaar.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ET was the first to report about the UIDAI plan to introduce virtual numbers to address security concerns in its November 20 edition last year.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A top government official told ET that UIDAI has been working on this technology since July of 2016. "This is going to be one of the biggest innovations ever, people can change their virtual ID whenever they want or after every authentication or every 10 seconds." He added that this will silence most critics of Aadhaar.&lt;/p&gt;
&lt;div id="_mcePaste" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p id="_mcePaste" style="text-align: justify; "&gt;"The Aadhaar number being the permanent ID for life, there is need to provide a mechanism to ensure its continued use while optimally protecting the collection and storage in many databases," the UIDAI said in a notification on Wednesday while announcing the new measures.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;More Needed to be Done: Experts&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;"The collection and storage of Aadhaar number by various entities has heightened privacy concerns," it stated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under the new regime, for every Aadhaar number, the authority will issue a 16-digit virtual identity number which will be "temporary and revocable at any time."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This virtual ID can be generated only by the individual Aadhaar holder and can be replaced by a new one after a minimum validity period.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition, while some Authentication User Agencies (AUA) — categorised by the UIDAI as 'Global' — will have access to all the details or the e-KYC of a specific Aadhaar number, all other agencies will only have access to limited data through the virtual identity number.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"So this is a very very significant thing and I think this is a great step forward," said Nandan Nilekani, former chairman of UIDAI, in an interview to television channel ET Now on Wednesday.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nilekani, widely regarded as the architect of Aadhaar, said that through these new security measures the possibility of the Aadhaar number being stored in many databases also goes away.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It will make a huge difference in allaying the concerns and it really "eliminates all the arguments against Aadhaar," he told ET Now.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Last week, Chandigarh-based daily The Tribune reported that demographic data from the Aadhaar database could be accessed for as little as Rs 500. The expose led to the UIDAI barring over 5,000 officials from accessing its portal through login ids and passwords. It also introduced biometric authentication for future access, as reported by ET on Tuesday.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The widespread fear of misuse of demographic data is heightened by the fact that India still does not have a data protection legislation. The country's apex court is scheduled to resume its hearing on the validity of the Aadhaar scheme next week on January 17.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Kamlesh Bajaj, former CEO of the Data Security Council of India said by limiting access to only those agencies mandated by law, the UIDAI has ensured that "someone will not be able to combine database. It's a positive development in my view and technologically feasible," he said&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Expert Views&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Privacy experts and activists were of the view that more needs to be done to ensure foolproof security for critical personal information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Bengaluru-based research organisation Centre for Internet and Society has suggested that all the Aadhaar seeding with all the existing databases should be revoked. "Until then, it is one step ahead and but not enough," said Sunil Abraham, executive director of CIS.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To enable a speedy rollout of the new safety standards, the UIDAI plans to release the required technical updates by March 1, 2018 and all the Authentication agencies using the Aadhaar database will need to upgrade their systems latest by June 1, 2018.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In its circular, UIDAI has also said that agencies not allowed to use or store the Aadhaar number should make changes inside their systems to replace Aadhaar number within their databases with UID Token.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Unless there is complete revocation, some database with Aadhaar numbers will still float around and secondly there is no reason why some data controllers should be trusted, the tokenisation should be implemented for everyone," said CIS's Abraham.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The circular said that authentication using virtual ID will be performed in the same manner as the Aadhaar number and people can generate or retrieve their virtual numbers (in case they forget) at the UIDAI's resident portal, Aadhaar Enrolment Centers, or through the Aadhaar mobile application.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition to the virtual numbers, UIDAI will also provide "unique tokens" to each agency against an Aadhaar number to ensure that they are to establish the uniqueness of beneficiaries in their database such as for distributing government subsidies under cooking gas or scholarships.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Activists argue that most service providers — even digital ones — work with a paper ID card system. "They don't cross-check it with the UIDAI database. UIDAI is not issuing virtual ids for paper cards, and a new category of so called Global AUAs are exempted from using the virtual ids, so citizens are not protected almost anywhere that they need to use Aadhaar," said Kiran Jonnalagadda, co-founder of the Internet Freedom Foundation, who said the change doesn't help enough to secure the ecosystem.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/economic-times-january-11-2018-uidai-introduces-new-two-layer-security-system-to-improve-aadhaar-privacy'&gt;https://cis-india.org/internet-governance/news/economic-times-january-11-2018-uidai-introduces-new-two-layer-security-system-to-improve-aadhaar-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-01-16T23:08:34Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/medianama-nikhil-pahwa-may-19-2017-uidai-cis-india-aadhaar">
    <title>UIDAI goes after org that disclosed government departments were releasing Aadhaar data</title>
    <link>https://cis-india.org/internet-governance/news/medianama-nikhil-pahwa-may-19-2017-uidai-cis-india-aadhaar</link>
    <description>
        &lt;b&gt;If there was ever a case of shoot the messenger, it is this. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post by Nikhil Pahwa was published by &lt;a class="external-link" href="http://www.medianama.com/2017/05/223-uidai-cis-india-aadhaar/"&gt;Medianama&lt;/a&gt; on May 19, 2017. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The UIDAI, the body which runs the Aadhaar project in India, has written to the Centre for Internet &amp;amp; Society suggesting that &lt;a href="http://www.medianama.com/2017/05/223-aadhaar-numbers-data-leak/"&gt;their disclosure of the fact that the data of 130 million Aadhaar users is being publicly disclosed on the Internet&lt;/a&gt; is owed to a hack-attack, &lt;a href="http://timesofindia.indiatimes.com/india/provide-hacker-details-outfit-that-claimed-data-leak-told/articleshow/58725132.cms?from=mdr" rel="noopener noreferrer"&gt;reports the Times of India&lt;/a&gt;.  On being contacted by MediaNama, Pranesh Prakash, Policy Director at  CIS told MediaNama that “We are waiting for an official copy of the  letter, and once we receive it we will decide on our future course of  action.” The UIDAI told MediaNama that they’ll get back to us, and  declined to share a copy of the letter with MediaNama.&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.medianama.com/2017/05/223-uidai-cis-india-aadhaar/"&gt;Read the full story on Medianama&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/medianama-nikhil-pahwa-may-19-2017-uidai-cis-india-aadhaar'&gt;https://cis-india.org/internet-governance/news/medianama-nikhil-pahwa-may-19-2017-uidai-cis-india-aadhaar&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Nikhil Pahwa</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UIDAI</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-05-20T10:46:36Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/livemint-komal-gupta-january-7-2018-uidai-denies-any-breach-of-aadhaar-database">
    <title>UIDAI denies any breach of Aadhaar database</title>
    <link>https://cis-india.org/internet-governance/news/livemint-komal-gupta-january-7-2018-uidai-denies-any-breach-of-aadhaar-database</link>
    <description>
        &lt;b&gt;Personal data, including biometric information, of citizens safe and secure, says UIDAI on Aadhaar data breach.
&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Komal Gupta was published by &lt;a class="external-link" href="http://www.livemint.com/Politics/bw5gRWcZoFYOjixGVVSqiP/UIDAI-says-Aadhaar-misuse-traceable-system-secure.html"&gt;Livemint&lt;/a&gt; on January 7, 2018&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The Unique Identification Authority of India (UIDAI) on Thursday clarified that there has not been any breach in the Aadhaar database and the personal data of citizens, including biometric information, is safe and secure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The clarification comes in response to a news report titled ‘Rs 500, 10 minutes, and you have access to a billion Aadhaar details’ published in The Tribune on Thursday. The report claims that a WhatsApp group sold all Aadhaar data available with UIDAI for a sum of Rs. 500.&lt;/p&gt;
&lt;p id="_mcePaste" style="text-align: justify; "&gt;UIDAI maintained that the reported case appeared to be an instance of misuse of the grievance redressal search facility. As UIDAI maintains complete logs and traceability of the facility, legal action including lodging of FIR against the persons involved in the case is being undertaken.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;div id="_mcePaste" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;UIDAI maintained that the reported case appeared to be an instance of misuse of the grievance redressal search facility. As UIDAI maintains complete logs and traceability of the facility, legal action including lodging of FIR against the persons involved in the case is being undertaken. UIDAI maintained that the reported case appeared to be an instance of misuse of the grievance redressal search facility. As UIDAI maintains complete logs and traceability of the facility, legal action including lodging of FIR against the persons involved in the case is being undertaken. UIDAI clarified in a press statement that displayed demographic information cannot be misused; it would need to be paired with an individual’s biometrics.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are more than 1.19 billion Aadhaar card holders in the country.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;“If it is not a data breach, then this means that some people who have legitimate access to the data are selling it illegitimately. This poses a greater problem,” said Pranesh Prakash, policy director at the Centre for Internet and Society, a Bengaluru-based think tank.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/livemint-komal-gupta-january-7-2018-uidai-denies-any-breach-of-aadhaar-database'&gt;https://cis-india.org/internet-governance/news/livemint-komal-gupta-january-7-2018-uidai-denies-any-breach-of-aadhaar-database&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-01-07T12:03:13Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/biometric-update-july-4-2017-justin-lee-uidai-declining-multiple-requests-by-police-to-share-indian-citizens-biometrics">
    <title>UIDAI declining multiple requests by police to share Indian citizens’ biometrics</title>
    <link>https://cis-india.org/internet-governance/news/biometric-update-july-4-2017-justin-lee-uidai-declining-multiple-requests-by-police-to-share-indian-citizens-biometrics</link>
    <description>
        &lt;b&gt;The Unique Identification Authority of India (UIDAI), the governing agency in charge of Aadhaar, has declined multiple requests from all law enforcement agencies, including the Delhi Police, for biometrics of citizens for criminal investigations, according to a report by The Indian Express.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post by Justin Lee was &lt;a class="external-link" href="http://www.biometricupdate.com/201707/uidai-declining-multiple-requests-by-police-to-share-indian-citizens-biometrics"&gt;published by Biometric Update&lt;/a&gt; on July 4, 2017.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Investigating agencies such as CBI and NIA have been repeatedly  requesting the details of Aadhaar cardholders including their  biometrics, UIDAI said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;UIDAI Deputy Director General Rajesh Kumar Singh has written to the  heads of each agency, ordering them to stop asking for such details.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“This is regarding requests frequently received by the UIDAI from  police and other law enforcement agencies, seeking demographic and  biometric information of residents for facilitating identification of  individuals in different cases,” Singh said in his letter. “In this  regard, I would like to draw your kind attention to provisions under  Sections 28 and 29 of the Aadhaar (Targeted delivery of financial and  other subsidies, benefits and services) Act, 2016, which prohibits  sharing of core biometric and identity related information with other  authorities.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rather than asking forensic labs to match fingerprints, state police  and investigating agencies are requesting biometrics data from UIDAI.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Identity information cannot be shared by UIDAI,” Singh said. “The  requests received from law enforcement agencies lead to avoidable delays  in investigation by the police authorities and unnecessary increase in  the workload of subordinate authorities.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;UIDAI is also concerned about data potentially leaking as the central  government has confirmed that identities of individuals, including  Aadhaar numbers and other private information, has been leaked to the  public.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://www.biometricupdate.com/201705/report-claims-millions-of-aadhaar-registration-and-bank-numbers-compromised"&gt;In May&lt;/a&gt;,  the Centre for Internet and Society published a report that claimed  between 130 to 135 million numbers in India’s Aadhaar biometric registry  system, and around 100 million bank numbers of pensioners and rural  jobs-for-work beneficiaries, have been leaked online by four key  government programs.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/biometric-update-july-4-2017-justin-lee-uidai-declining-multiple-requests-by-police-to-share-indian-citizens-biometrics'&gt;https://cis-india.org/internet-governance/news/biometric-update-july-4-2017-justin-lee-uidai-declining-multiple-requests-by-police-to-share-indian-citizens-biometrics&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-07-06T15:25:32Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/economic-times-may-18-2017-mahendra-singh-uidai-asks-centre-for-internet-and-society-to-provide-hacker-details">
    <title>UIDAI asks Centre for Internet &amp; Society to provide hacker details</title>
    <link>https://cis-india.org/internet-governance/news/economic-times-may-18-2017-mahendra-singh-uidai-asks-centre-for-internet-and-society-to-provide-hacker-details</link>
    <description>
        &lt;b&gt;The Unique Identification Authority of India (UIDAI), the regulatory authority for Aadhaar, has written to a Bengaluru-based research organisation, Centre for Internet &amp; Society (CIS), seeking details about a suspected hack attack on government websites that led to the leak of information about 13 crore users.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Mahendra Singh was published in the &lt;a class="external-link" href="http://tech.economictimes.indiatimes.com/news/technology/uidai-asks-centre-for-internet-society-to-provide-hacker-details/58731336"&gt;Times of India&lt;/a&gt; on May 18, 2017.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The Unique Identification Authority of India (UIDAI), the regulatory authority for Aadhaar, has written to a Bengaluru-based research organisation, Centre for Internet &amp;amp; Society (CIS), seeking details about a suspected hack attack on government websites that led to the leak of information about 13 crore users.&lt;br /&gt;&lt;br /&gt;In a recent report, CIS had highlighted that websites run by various government departments, owing to a poor security framework, had publicly displayed sensitive personal financial information and Aadhaar numbers of beneficiaries of certainprojects.&lt;br /&gt;&lt;br /&gt;In its letter, UIDAI argued that the data downloaded from one of the websites could not have been accessed unless the website was hacked. As hacking is a grave offence under the law, the UIDAI has asked CIS to provide details of the persons involved in the data theft.&lt;br /&gt;&lt;br /&gt;According to a source, the UIDAI said that access to data on the website for the 'National Social Assistance Program' was only possible for someone in possession of authorised login details, or if the site (http://nsap.nic.in) was hacked or breached. The UIDAI said in its letter that such illegal access was against the provisions of the Aadhaar Act, 2016, and the IT Act, 2000, and that the persons involved had committed a grave offence.&lt;br /&gt;&lt;br /&gt;Asking the CIS to reply before May 30, the UIDAI also said, "Aadhaar system is a protected system under Section 70 of the IT Act, 2000, the violation of which is punishable with rigorous imprisonment for a period up to 10 years." It added that the penalty clauses for violations are also provided in Section 36, Section 38 and Section 39 of the Aadhaar Act.&lt;br /&gt;The UIDAI, however, maintained that even if the Aadhaar details were known to someone it did not pose a real threat to the people whose information was publicly available because the Aadhaar number could not be misused without biometrics.&lt;br /&gt;&lt;br /&gt;The UIDAI letter said, "While, as your report suggests, there is a need to strengthen IT security of government websites, it is also important that the persons involved in hacking such sensitive information are brought to justice for which your assistance is required under the law."&lt;br /&gt;&lt;br /&gt;"Your report mentions 13 crore people's data has been 'leaked'. Please specify how much of this data had been downloaded by you or are in your possession or in the possession of any other persons that you know. Please provide the details," the UIDAI added in its letter. The UIDAI also urged CIS to provide the details of the persons/organisations with whom it shared the data, if it did.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/economic-times-may-18-2017-mahendra-singh-uidai-asks-centre-for-internet-and-society-to-provide-hacker-details'&gt;https://cis-india.org/internet-governance/news/economic-times-may-18-2017-mahendra-singh-uidai-asks-centre-for-internet-and-society-to-provide-hacker-details&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-06-07T12:21:47Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/uidai-and-welfare-services-exclusion-and-countermeasures-aug-27">
    <title>UIDAI and Welfare Services: Exclusion and Countermeasures (Bangalore, August 27)</title>
    <link>https://cis-india.org/internet-governance/events/uidai-and-welfare-services-exclusion-and-countermeasures-aug-27</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society (CIS) invites you to a one day workshop, on Saturday, August 27, 2016, to discuss, raise awareness of, and devise countermeasures to exclusion due to implementation of  UID-based verification for and distribution of welfare services. We look forward to making this a forum for knowledge exchange and a learning opportunity for our friends and colleagues.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Invitation&lt;/h3&gt;
&lt;p&gt;&lt;a href="http://cis-india.org/internet-governance/files/uidai-and-welfare-services-exclusion-and-countermeasures/at_download/file"&gt;Download&lt;/a&gt; (PDF)&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Venue&lt;/h3&gt;
&lt;p&gt;Institution of Agricultural Technologists, No. 15, Queen’s Road, Bangalore, 560 052.&lt;/p&gt;
&lt;p&gt;Location on Google Map: &lt;a href="https://www.google.com/maps/place/Institution+of+Agricultural+Technologists/" target="_blank"&gt;https://www.google.com/maps/place/Institution+of+Agricultural+Technologists/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Agenda&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;10:00-10:30&lt;/strong&gt; Tea and Coffee&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;10:30-11:00&lt;/strong&gt; Introductions and Updates from Delhi Workshop&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;11:00-12:45&lt;/strong&gt; Reconfiguration of Welfare Governance by UIDAI&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;12:45-14:00&lt;/strong&gt; Lunch&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;14:00-15:00&lt;/strong&gt; Updates on Ongoing Cases against UIDAI&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;15:00-15:15&lt;/strong&gt; Tea and Coffee&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;15:15-16:45&lt;/strong&gt; Open Discussion on Countering Welfare Exclusion&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;16:45-17:00&lt;/strong&gt; Tea and Coffee&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/uidai-and-welfare-services-exclusion-and-countermeasures-aug-27'&gt;https://cis-india.org/internet-governance/events/uidai-and-welfare-services-exclusion-and-countermeasures-aug-27&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Exclusion</dc:subject>
    
    
        <dc:subject>Digital Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital India</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Welfare Governance</dc:subject>
    
    
        <dc:subject>UID</dc:subject>
    

   <dc:date>2016-08-22T13:25:03Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/financial-express-november-20-2017-government-websites-made-aadhaar-details-public">
    <title>UIDAI admits 210 government websites made Aadhaar details public</title>
    <link>https://cis-india.org/internet-governance/news/financial-express-november-20-2017-government-websites-made-aadhaar-details-public</link>
    <description>
        &lt;b&gt;The Unique Identification Authority of India (UIDAI) has admitted that Aadhaar details were leaked on over 200 central and state government websites.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://www.financialexpress.com/economy/uidai-admits-210-government-websites-made-aadhaar-details-public/940545/"&gt;published in the Financial Express&lt;/a&gt; on November 20, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The Unique Identification Authority of India (UIDAI) has admitted  that Aadhaar details were made public on over 200 central and state  government websites. According to an RTI reply, these websites publicly  displayed name, address and other details of Aadhaar beneficiaries,  which was removed when the breach was identified.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, UIDAI does not have information about the time of the  breach. It also said that Aadhaar details have never been made public by  UIDAI. “However, it was found that approximately 210 websites of the  central government, state government departments including educational  institutes were displaying the list of beneficiaries along with their  name, address, other details and Aadhaar numbers for information of the  general public,” it said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;UIDAI issues Aadhaar — a 12-digit unique identification number —  which acts as a proof of identity and addresses anywhere in the country.  Lately, Aadhaar has been creating furore for security and privacy  reasons, especially after the &lt;a href="http://www.financialexpress.com/tag/narendra-modi/" target="_blank"&gt;Narendra Modi&lt;/a&gt; government began aggressively pushing the identification number to be  linked with social benefits, banks, PAN, mobile number et al. In a  landmark judgement this August, the Supreme Court ruled that privacy was  a fundamental right of citizens, weakening the case for pushing Aadhar.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Currently, cases are being heard in the apex court on linking Aadhaar  to banks and mobile numbers. In May, the Centre for Internet and  Society had claimed that Aadhaar numbers of as many as 135  millions could have been leaked. “Based on the numbers available on the  websites looked at, the estimated number of Aadhaar numbers leaked  through these four portals could be around 130-135 million,” the report  by CIS had said. Further, as many as 100 million bank account numbers  could have been “leaked” from the four portals, it had added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;UIDAI and the government had been vehemently denying that Aadhaar  details can be leaked despite apprehension from different sections of  society. Soon after the RTI reply appeared in media, UIDAI refuted the  news of leaks, calling it a “skewed presentation of facts. “Such report  is a skewed presentation of the facts and poses as if the Aadhaar data  is breached or leaked which is not the true presentation. Aadhaar data  is fully safe and secure and there has been no data leak or breach at  UIDAI,”  press release by PIB said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It said that the data on these websites was placed in public domain as a measure of proactive disclosure under the RTI Act.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/financial-express-november-20-2017-government-websites-made-aadhaar-details-public'&gt;https://cis-india.org/internet-governance/news/financial-express-november-20-2017-government-websites-made-aadhaar-details-public&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-11-21T16:03:29Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/UID_Questions_without_Answers">
    <title>UID: Questions without Answers – A Talk by Usha Ramanathan </title>
    <link>https://cis-india.org/internet-governance/blog/UID_Questions_without_Answers</link>
    <description>
        &lt;b&gt;UID enrolment is in full swing, providing an official identification to millions of Indians, yet there are numerous unanswered questions. A public talk on UID was held at the Institute of Science, Bangalore on September 6, 2011. Usha Ramanathan, an independent law researcher on jurisprudence, poverty and rights, discussed the questions that plague the UID project and the veil of silence enveloping the answers.&lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;Ms. Ramanathan
began her presentation by describing the progress and evolution of the UID
project. She stated three adjectives that reflect the target goal of the Unique
Identification Authority of India (UIDAI): unique, ubiquitous and universal.
She demonstrated how their initial objectives and claims have been drastically
altered in three major ways.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;First and
foremost, the UIDAI claimed that enrolment is voluntary, not mandatory, and
hence, inclusive. Yet, Nandan Nilekani has
consistently maintained that other agencies may make it compulsory.
UID is becoming ubiquitous and is a prerequisite for access to a wide variety
of welfare schemes and services such as PDS, MGNREGS, banks, public health,
etc. It is thus clear that this could
actually exclude those who do not have a number or whose biometrics&amp;nbsp;doesn't&amp;nbsp;work. Therefore, this undermines the inclusive nature of the project.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Second, the
UIDAI claimed that the UID would enable inclusive growth. Ms. Ramanathan expressed a
serious concern surrounding the risk of exclusion. Instead of facilitating
inclusion, around two to five per cent of the Indian population would be
excluded from the current process of authentication and potentially from having
a UID number, as they do not have viable biometric data.&lt;a name="_ftnref" href="#_ftn1"&gt;&lt;span class="MsoFootnoteReference"&gt;[1]&lt;/span&gt;&lt;/a&gt;&amp;nbsp; Physical or visual impairments such as corneal blindness, corneal scars, and
malnourishment induced cataracts or ‘low-quality’ fingerprints from a lifetime
of hard labour inhibit those from providing valid fingerprints or iris scans.&lt;a name="_ftnref" href="#_ftn2"&gt;&lt;span class="MsoFootnoteReference"&gt;[2]&lt;/span&gt;&lt;/a&gt;
&lt;u&gt;&lt;/u&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Third, Ms. Ramanathan reiterated that
the &lt;a class="external-link" href="http://www.prsindia.org/uploads/media/NIA%20Draft%20Bill.pdf"&gt;National Identification Authority India Bill &lt;/a&gt;prohibited sharing data, except by the consent of the resident, by
a court order or for national security. However, UID information is being directly fed into the National Intelligence Grid
(NATGRID) who will then provide information about people that is in 21
databases, to eleven security agencies, including the RAW and IB over which
there is no superintendence or oversight.&lt;a name="_ftnref" href="#_ftn3"&gt;&lt;span class="MsoFootnoteReference"&gt;[3]&lt;/span&gt;&lt;/a&gt; She
discussed the high likelihood of a breach of privacy as there are insufficient
standards protecting an individual from unlawful invasion. Additionally, the
UIDAI does not have mechanisms in place for an individual to be notified if there
is a data breach.&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;&lt;u&gt;Who owns this project?&lt;/u&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;A very important question asked is, “Who owns this project?” Ms.
Ramanathan stated that the convergence of information especially during the
‘de-duplication process clearly reflects the corporatization of the project.
She also questioned the background of some of the technological companies
involved. For instance, L-1 Identity
Solutions is well known for its links with the CIA. Additionally, Accenture is
on a Smart Borders project with US Homeland Security. She explained that ownership also plays into the
feasibility and financial cost of the project. Furthermore, the UIDAI has not
conducted a
feasibility study on the technology or the financial cost of the project.&lt;/p&gt;
&lt;h3&gt;&lt;u&gt;International Experience&lt;/u&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Lastly, Ms. Ramanathan discussed the international experience of a
universal identity system. In the United Kingdom, their universal system of
identification was labelled as ‘intrusive bullying’ as well as ‘an assault on personal
liberties’.&amp;nbsp; The United States and the United Kingdom both abandoned a
universal identity system, as it was impractical, unjustified and dangerous.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Ms. Ramanathan raised many questions that evoked thought and discussion from the
audience. She provided numerous examples of ambiguity, misconceptions and confusion
surrounding the UID project.&amp;nbsp; She urged the audience to exercise their civil
liberties or risk losing them. Lastly, she believed that an informed debate
involving the UIDAI and the public is long overdue.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;“The UIDAI must clarify misconception and provide detailed answers to
crucial questions, as there is a lack of understanding within the general
population about the UID. Therefore, the UIDAI and the Government of India must
increase and ensure transparency of the UID project”, she added.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Ms. Usha Ramanathan was speaking at an event&amp;nbsp;organised by Concern, an IISc Student group. She was speaking in her personal capacity and the opinions reflected above are necessarily not those of CIS.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&amp;nbsp;&lt;/p&gt;
&lt;div&gt;&lt;br clear="all" /&gt;
&lt;hr align="left" size="1" width="33%" /&gt;
&lt;div id="ftn"&gt;
&lt;p&gt;&lt;a name="_ftn1" href="#_ftnref"&gt;&lt;span class="MsoFootnoteReference"&gt;[1]&lt;/span&gt;&lt;/a&gt; Biometrics Design Standards for UID
Applications (December 2009).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn"&gt;
&lt;p&gt;&lt;a name="_ftn2" href="#_ftnref"&gt;&lt;span class="MsoFootnoteReference"&gt;[2]&lt;/span&gt;&lt;/a&gt; Biometrics Design Standards
for UID Applications (December 2009).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn"&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn3" href="#_ftnref"&gt;&lt;span class="MsoFootnoteReference"&gt;[3]&lt;/span&gt;&lt;/a&gt;Usha Ramanathan, The Myth of the Technology Fix, http://www.india-seminar.com/2011/617/617_usha_ramanathan.htm.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;iframe src="http://blip.tv/play/AYLRySYA.html" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;&lt;embed style="display:none" src="http://a.blip.tv/api.swf#AYLRySYA" type="application/x-shockwave-flash"&gt;&lt;/embed&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/UID_Questions_without_Answers'&gt;https://cis-india.org/internet-governance/blog/UID_Questions_without_Answers&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Natasha Vaz</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2011-11-24T04:41:41Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy/uid-nothing-to-hide-fear">
    <title>UID: Nothing to Hide, Nothing to Fear?</title>
    <link>https://cis-india.org/internet-governance/blog/privacy/uid-nothing-to-hide-fear</link>
    <description>
        &lt;b&gt;Isn’t it interesting that authorities ask you about your identity and you end up showing your proof of existence! Isn’t this breaching into one’s personal life? Why so much transparency only from the public side? Why can’t the government be equally transparent to the public?, asks Shilpa Narani.&lt;/b&gt;
        
&lt;p&gt;Before I get into an argument, I would like to share with you that my research is based on a comparative study of articles published on UID in leading newspapers like the Times of India, the Indian Express, the Hindustan Times, and its supplement LiveMint, Business Standard, Asian Age, DNA India, Bangalore Mirror, Deccan Chronicle and Deccan Herald. My research shows that the government officials and the individuals working for the UIDAI, who are involved in proposing identity system, are in fact hide their own identity from the public.&lt;/p&gt;
&lt;h3&gt;Background&lt;/h3&gt;
&lt;p&gt;A pan-India project to “identify” each resident was formally inaugurated in 2009, with the establishment of the Unique Identification Authority of India (UIDAI) as an office attached to the Planning Commission.[&lt;a href="#1"&gt;1&lt;/a&gt;]&amp;nbsp;The goal of the Unique ID project is to issue a unique identity number to every resident in the country. The Unique Identification number (UID) will be linked to every resident’s basic demographic and biometric details, and stored in the UIDAI central database.[&lt;a href="#2"&gt;2&lt;/a&gt;]&amp;nbsp;Now a 12 digit number will henceforth decide whether you exist or not? It will decide whether you remain a known or an unknown person? With this blog I would like to highlight the irony in the UIDAI's attempt to establish if a person is known or is unknown with a 12 digit number.&lt;/p&gt;
&lt;p&gt;An identity card virus seems to be spreading across India. Everyone is praising the UID and the social, economic, and political improvements it will bring. “The aim of the UID scheme is to bring transparency in the system,'' says Sonia Gandhi.[&lt;a href="#3"&gt;3&lt;/a&gt;]&amp;nbsp;One has to wonder though — if the aim of the UID is to bring transparency, why it is that government and UIDAI officials are not transparent themselves?&lt;/p&gt;
&lt;h3&gt;Findings&lt;/h3&gt;
&lt;p&gt;According to my research, in 55 news articles taken from different newspapers mentioned above, there are 66 persons who shared their views on UID only on the condition of anonymity. Most of these individuals were public servants who themselves did not wish to be identified. For instance, one individual was from the department of information technology, who is working on the UID project and with the UIDAI itself.&lt;/p&gt;
&lt;p&gt;Total Anonymous&lt;/p&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/uidgrid.jpg/image_preview" alt="UID - Grid Summary" class="image-inline image-inline" title="UID - Grid Summary" /&gt;&lt;/p&gt;
&lt;p&gt;As one can see from the graph above, the total number of anonymous people sharing their perspectives on the UID are more than the total number of identified people sharing their perspective on the UID. Below is a detailed review of UID articles from each newspaper:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Times of India&lt;/strong&gt;: Out of 13 articles, Times of India quoted nine anonymous sources in which there were HRD officials, civic sources, sources from census operation department, collectorate sources, senior postal officials, UIDAI officials, and unclassified individuals. Times of India only quoted four identified sources.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Indian Express&lt;/strong&gt;: Out of 10 articles, the Indian Express quoted twelve anonymous sources including sources from senior officials of the AADHAR office, senior Delhi government officials and some unclassified sources. Again only four identified sources were quoted.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;LiveMint&lt;/strong&gt;: Out of 7 articles, the Live Mint quoted 15 anonymous sources including sources from the Information Regulatory and Development Authority (IRDA), UIDAI, Bank of India, a senior SEBI official, sources from ministry, etc. Only 11 sources revealed their identity.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Hindustan Times&lt;/strong&gt;: Out of 3 articles, there were 6 anonymous sources, and 5 sources that were identified. Anonymous sources were from UIDAI, finance ministry, and other government officials.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Deccan Herald&lt;/strong&gt;: Out of 11 articles, there were 14 anonymous sources and only 6 were identified. Anonymous sources included UIDAI officials, banks, senior officials from government, and unclassified sources as well.&lt;/p&gt;
&lt;p&gt;Asian Age: Out of 4 articles, there were 5 anonymous sources. Anonymous sources included government officials and some unclassified officials.&lt;/p&gt;
&lt;h3&gt;Power of Identity: Why is anonymity important?&lt;/h3&gt;
&lt;p&gt;UID has the potential to threaten an individual’s ability to be anonymous in society. &amp;nbsp;Anonymity results when the personal identity or personally identifiable information of a person is not known. As demonstrated above, a certain amount of anonymity already exists in India today, but with the coming of the UID there is the potential that this will be changed.&lt;/p&gt;
&lt;h3&gt;Conclusion&lt;/h3&gt;
&lt;p&gt;As Sonia Gandhi herself said, the UID's aim is to bring transparency in the system. Though the government is eager to make the Indian public transparent in their everyday lives, clearly from the analysis above, individuals working for the government and UIDAI are not comfortable being transparent to the public. &amp;nbsp;It is ironic that the individuals developing and working for this scheme are not willing to voice their opinion and be identified, but private individuals are. Though the UID scheme is being promoted as a way to make the people accountable and visible in the eyes of the government, from the very start of the project the UIDAI and government have kept themselves under a cloud of secrecy. The government’s non-transparent attitude towards this project and the unawareness of its use on the people makes the whole scheme shady and unnecessary.&lt;/p&gt;
&lt;pre&gt;Notes&lt;/pre&gt;
&lt;p class="discreet"&gt;&lt;a class="external-link" name="1" href="http://uidai.gov.in/UID_PDF/Front_Page_Articles/Documents/Strategy_Overveiw-001.pdf"&gt;[1]http://uidai.gov.in/UID_PDF/Front_Page_Articles/Documents/Strategy_Overveiw-001.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a class="external-link" name="2" href="http://uidai.gov.in/UID_PDF/Working_Papers/UID_and_iris_paper_final.pdf"&gt;[2]http://uidai.gov.in/UID_PDF/Working_Papers/UID_and_iris_paper_final.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a class="external-link" name="3" href="http://articles.timesofindia.indiatimes.com/2010-09-30/india/28243557_1_uid-number-unique-id-numbers-tembhli"&gt;[3]http://articles.timesofindia.indiatimes.com/2010-09-30/india/28243557_1_uid-number-unique-id-numbers-tembhli&lt;/a&gt;&lt;/p&gt;
&lt;strong&gt;Download the &lt;a href="https://cis-india.org/internet-governance/publications/uid-grid.xlsx/at_download/file" class="internal-link" title="UID Grid"&gt;UID Summary Grid here&lt;/a&gt;&lt;/strong&gt;&lt;strong&gt;&amp;nbsp;[Excel, 19kb]&lt;/strong&gt;
&lt;div&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;
&lt;div class="pullquote"&gt;For the summary of articles in newspapers, &lt;a href="https://cis-india.org/internet-governance/publications/uid-new-grid" class="external-link"&gt;click here&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy/uid-nothing-to-hide-fear'&gt;https://cis-india.org/internet-governance/blog/privacy/uid-nothing-to-hide-fear&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>shilpa</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2011-09-28T11:44:21Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/uid-a-data-subjects-registration-tale">
    <title>UID: A Data Subject's Registration Tale</title>
    <link>https://cis-india.org/internet-governance/blog/uid-a-data-subjects-registration-tale</link>
    <description>
        &lt;b&gt;A person who registered for UIDAI shares their experience of registering for the UID Number, on the condition of anonymity.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The registration process begins with filling a form, which has a verification clause at the end. This is a statement that the data, including biometric     data, is correct and is that of the registrant. The presence of the word ‘biometric’ in relation to the verification creates tacit consent in the     collection of biometric data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The data subject registered for the UID number as several utilities were being linked to the UID number at that time.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The data subject pointed out three areas for concern: (i) optional data was being collected under protest; (ii) the subjects documents were being taken out     of their sight for scanning; (iii) the ownership of data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While registering for the UID number, data subjects have a choice not to link their bank numbers to bank accounts and to utilities such as gas connections.     This data subject noticed that the data operator linked these by default and the data subject had to specifically request the de-linking. The data operator     did not inform the data subject of the choice not to link the UID with these services. If this is the state of affairs for the conscious registrant, it is     unlikely that those who cannot read will be informed of their right to choice. Their information will then be inadvertently linked and they will be denied     the right to opt out of the linkage.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This data subject additionally noted that their right to refuse to provide optional data on the registration form was blatantly disregarded by the     enrolling agency. Despite protests against providing this information, the enroller forcibly entered information such as ‘ward number’, which was optional.     The enroller justified these actions - stating: the company will cut our salary. Unfortunately, registrants do not know who the data collection company is.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Where the data subjects do not know who collects their data and where it is going, there can be no accountability.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This incident seems to show that the rules on personal information are being violated. The right to know: the identity and address of the entity collecting     the data,&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt; the purpose of data collection,&lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt; the restrictions on data use&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt; and the right not to disclose sensitive personal data    &lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt; are all granted by the Information Technology Rules. Data subjects also have the right to be informed about the intended recipients&lt;a href="#_ftn5" name="_ftnref5"&gt;[5]&lt;/a&gt; and the entities that will retain the data.    &lt;a href="#_ftn6" name="_ftnref6"&gt;[6]&lt;/a&gt; The data collector has failed to perform its corresponding duty to make such disclosures and has arguably     limited the control of data subjects over their privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If this is what other UID registrations are like, then perhaps it is time to modify the process of data handling and processing. The law should be     implemented better and amended to enable better implementation either through greater state intervention or severe liability when personal information is     improperly handled.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;hr align="left" size="1" width="100%" /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; R.4(3)(d) of the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; R. 4(3)(b) Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; R. 4(7) Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; R. 4 (7) Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; R. 4 (3) (c) Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;[6]&lt;/a&gt; R.4(3)(d) Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/uid-a-data-subjects-registration-tale'&gt;https://cis-india.org/internet-governance/blog/uid-a-data-subjects-registration-tale&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Mukta Batra</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-09-11T09:05:07Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/uid-research">
    <title>UID Research</title>
    <link>https://cis-india.org/internet-governance/blog/uid-research</link>
    <description>
        &lt;b&gt;The Centre Internet and Society, India has been researching privacy policy in India since the year 2010 with the following objectives. &lt;/b&gt;
        &lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Researching the vision and implementation of the UID Scheme - both from a technical and regulatory perspective.&lt;/li&gt;
&lt;li&gt;Understanding the validity and legality of collection, usage and storage of Biometric information for this scheme.&lt;/li&gt;
&lt;li&gt;Raising public awareness around issues concerning privacy, data security and the objectives of the UID Scheme.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The UID scheme seeks to provide all residents of India an identity number based on their biometrics that can be used to authenticate individuals for the purpose of Government benefits and services. A 2015 Supreme Court ruling has clarified that the UID can only be used in the PDS and LPG Schemes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Concerns with the scheme include the broad consent taken at the time of enrolment, the lack of clarity as to what happens with transactional metadata, the centralized storage of the biometric information in the CIDR, the seeding of the aadhaar number into service providers’ databases, and the possibility of function creep. Also, there are concerns due to absence of a legislation to look into the privacy and security concerns.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;UID Research -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. Ramifications of Aadhar and UID schemes -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UID and Aadhar systems have been bombarded with criticisms and plagued with issues ranging from privacy concerns to security risks. The following 	articles deal with the many problems and drawbacks of these systems.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ UID and NPR: Towards Common Ground 	&lt;a href="http://cis-india.org/internet-governance/blog/uid-npr-towards-common-ground"&gt; http://cis-india.org/internet-governance/blog/uid-npr-towards-common-ground &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Public Statement to Final Draft of UID Bill &lt;a href="http://bit.ly/1aGf1NN"&gt;http://bit.ly/1aGf1NN&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ UID Project in India - Some Possible Ramifications	&lt;a href="http://cis-india.org/internet-governance/blog/uid-in-india"&gt;http://cis-india.org/internet-governance/blog/uid-in-india&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Aadhaar Number vs the Social Security Number 	&lt;a href="http://cis-india.org/internet-governance/blog/aadhaar-vs-social-security-number"&gt; http://cis-india.org/internet-governance/blog/aadhaar-vs-social-security-number &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Feedback to the NIA Bill	&lt;a href="http://cis-india.org/internet-governance/blog/cis-feedback-to-nia-bill"&gt;http://cis-india.org/internet-governance/blog/cis-feedback-to-nia-bill&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Unique ID System: Pros and Cons &lt;a href="http://bit.ly/1jmxbZS"&gt;http://bit.ly/1jmxbZS&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Submitted seven open letters to the Parliamentary Finance Committee on the UID covering the following aspects: SCOSTA Standards 	(http://bit.ly/1hq5Rqd), Centralized Database (http://bit.ly/1hsHJDg), Biometrics (http://bit.ly/196drke), UID Budget (http://bit.ly/1e4c2Op), Operational 	Design (http://bit.ly/JXR61S), UID and Transactions (http://bit.ly/1gY6B8r), and Deduplication (http://bit.ly/1c9TkSg)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Comments on Finance Committee Statements to Open Letters on Unique Identity: The Parliamentary Finance Committee responded to the open letters sent by CIS through an email on 12 October 2011. CIS has commented on the points raised by the Committee:	&lt;a href="http://bit.ly/1kz4H0F"&gt;http://bit.ly/1kz4H0F&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Unique Identification Scheme (UID) &amp;amp; National Population Register (NPR), and Governance 	&lt;a href="http://cis-india.org/internet-governance/blog/uid-and-npr-a-background-note"&gt; http://cis-india.org/internet-governance/blog/uid-and-npr-a-background-note &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Financial Inclusion and the UID	&lt;a href="http://cis-india.org/internet-governance/privacy_uidfinancialinclusion"&gt;http://cis-india.org/internet-governance/privacy_uidfinancialinclusion&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ The Aadhaar Case	&lt;a href="http://cis-india.org/internet-governance/blog/the-aadhaar-case"&gt;http://cis-india.org/internet-governance/blog/the-aadhaar-case&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Do we need the Aadhaar scheme &lt;a href="http://bit.ly/1850wAz"&gt;http://bit.ly/1850wAz&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ 4 Popular Myths about UID &lt;a href="http://bit.ly/1bWFoQg"&gt;http://bit.ly/1bWFoQg&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Does the UID Reflect India? 	&lt;a href="http://cis-india.org/internet-governance/blog/privacy/uid-reflects-india"&gt; http://cis-india.org/internet-governance/blog/privacy/uid-reflects-india &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Would it be a unique identity crisis?	&lt;a href="http://cis-india.org/news/unique-identity-crisis"&gt;http://cis-india.org/news/unique-identity-crisis&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ UID: Nothing to Hide, Nothing to Fear? 	&lt;a href="http://cis-india.org/internet-governance/blog/privacy/uid-nothing-to-hide-fear"&gt; http://cis-india.org/internet-governance/blog/privacy/uid-nothing-to-hide-fear &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. Right to Privacy and UID -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UID system has been hit by many privacy concerns from NGOs, private individuals and others. The sharing of one's information, especially fingerprints 	and retinal scans to a system that is controlled by the government and is not vetted as having good security irks most people. These issues are dealt with 	the in the following articles.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ India Fears of Privacy Loss Pursue Ambitious ID Project	&lt;a href="http://cis-india.org/news/india-fears-of-privacy-loss"&gt;http://cis-india.org/news/india-fears-of-privacy-loss&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Analysing the Right to Privacy and Dignity with Respect to the UID &lt;a href="http://bit.ly/1bWFoQg"&gt;http://bit.ly/1bWFoQg&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Analysing the Right to Privacy and Dignity with Respect to the UID 	&lt;a href="http://cis-india.org/internet-governance/blog/privacy/privacy-uiddevaprasad"&gt; http://cis-india.org/internet-governance/blog/privacy/privacy-uiddevaprasad &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Supreme Court order is a good start, but is seeding necessary? 	&lt;a href="http://cis-india.org/internet-governance/blog/supreme-court-order-is-a-good-start-but-is-seeding-necessary"&gt; http://cis-india.org/internet-governance/blog/supreme-court-order-is-a-good-start-but-is-seeding-necessary &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Right to Privacy in Peril 	&lt;a href="http://cis-india.org/internet-governance/blog/right-to-privacy-in-peril"&gt; http://cis-india.org/internet-governance/blog/right-to-privacy-in-peril &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. Data Flow in the UID -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The articles below deal with the manner in which data is moved around and handled in the UID system in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ UIDAI Practices and the Information Technology Act, Section 43A and Subsequent Rules 	&lt;a href="http://cis-india.org/internet-governance/blog/uid-practices-and-it-act-sec-43-a-and-subsequent-rules"&gt; http://cis-india.org/internet-governance/blog/uid-practices-and-it-act-sec-43-a-and-subsequent-rules &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Data flow in the Unique Identification Scheme of India 	&lt;a href="http://cis-india.org/internet-governance/blog/data-flow-in-unique-identification-scheme-of-india"&gt; http://cis-india.org/internet-governance/blog/data-flow-in-unique-identification-scheme-of-india &lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/uid-research'&gt;https://cis-india.org/internet-governance/blog/uid-research&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vanya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-01-03T09:59:27Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
