You are here: Home
34 items matching your search terms.
Filter the results.
Item type


















New items since



Sort by relevance · date (newest first) · alphabetically
Blog Entry Aadhaar marks a fundamental shift in citizen-state relations: From ‘We the People’ to ‘We the Government’
by Pranesh Prakash published Apr 04, 2017 — filed under: , , ,
Your fingerprints, iris scans, details of where you shop. Compulsory Aadhaar means all this data is out there. And it’s still not clear who can view or use it.
Located in Internet Governance / Blog
Blog Entry It’s the technology, stupid
by Sunil Abraham published Mar 31, 2017 last modified Apr 07, 2017 12:53 PM — filed under: , , ,
Eleven reasons why the Aadhaar is not just non-smart but also insecure.
Located in Internet Governance / Blog
Blog Entry Press Release, March 11, 2016: The Law cannot Fix what Technology has Broken!
by Japreet Grewal and Sunil Abraham published Mar 16, 2016 last modified Mar 16, 2016 10:10 AM — filed under: , , , , , ,
We published and circulated the following press release on March 11, 2016, as the Lok Sabha passed the Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Bill, 2016. This Bill was proposed by finance minister, Mr. Arun Jaitley to give legislative backing to Aadhaar, being implemented by the Unique Identification Authority of India (UIDAI).
Located in Internet Governance / Blog
Blog Entry List of Recommendations on the Aadhaar Bill, 2016 - Letter Submitted to the Members of Parliament
by Amber Sinha, Sumandro Chattapadhyay, Sunil Abraham, and Vanya Rakesh published Mar 16, 2016 last modified Mar 21, 2016 08:50 AM — filed under: , , , , , , , ,
On Friday, March 11, the Lok Sabha passed the Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Bill, 2016. The Bill was introduced as a money bill and there was no public consultation to evaluate the provisions therein even though there are very serious ramifications for the Right to Privacy and the Right to Association and Assembly. Based on these concerns, and numerous others, we submitted an initial list of recommendations to the Members of Parliaments to highlight the aspects of the Bill that require immediate attention.
Located in Internet Governance / Blog
Blog Entry Vulnerabilities in the UIDAI Implementation Not Addressed by the Aadhaar Bill, 2016
by Pooja Saxena and Amber Sinha published Mar 21, 2016 last modified Mar 21, 2016 08:33 AM — filed under: , , , , , , ,
In this infographic, we document the various issues in the Aadhaar enrolment process implemented by the UIDAI, and highlight the vulnerabilities that the Aadhaar Bill, 2016 does not address. The infographic is based on Vidushi Marda’s article 'Data Flow in the Unique Identification Scheme of India,' and is designed by Pooja Saxena, with inputs from Amber Sinha.
Located in Internet Governance / Blog
Workshop on Big Data in India: Benefits, Harms, and Human Rights (Delhi, October 01)
by Vanya Rakesh published Sep 20, 2016 last modified Sep 28, 2016 05:53 AM — filed under: , , , , , , , , , ,
CIS welcomes you to participate in the workshop we are organising on Saturday, October 01 at India Habitat Centre, Delhi, to discuss benefits, harms, and human rights implications of big data technologies, and explore potential research questions. A quick RSVP will be much appreciated.
Located in Internet Governance / Events
India’s National ID Program May Be Turning The Country Into A Surveillance State
by Prasad Krishna published Apr 07, 2017 last modified Apr 07, 2017 12:49 PM — filed under: , , ,
For seven years, India’s government has been scanning the irises and fingerprints of its citizens into a massive database. The once voluntary program was intended to fix the country’s corrupt welfare schemes, but critics worry about its Orwellian overtones.
Located in Internet Governance / News & Media
Aadhaar: A widening net
by Prasad Krishna published Apr 22, 2017 — filed under: , , ,
As India makes Aadhaar compulsory for a range of services, concerns about potential data breaches remain more than six years after the govt started building the world’s largest biometric identification system.
Located in Internet Governance / News & Media
Is Your Aadhar Biometrics Safe? Firms Accused Of Storing Biometrics And Using Them Illegally
by Prasad Krishna published Feb 27, 2017 — filed under: , , ,
Fears of Aadhar biometric security have been compounded as the government is sprinting towards the next phase of ‘cashless India’ and digitization
Located in Internet Governance / News & Media
Blog Entry Analysis of Key Provisions of the Aadhaar Act Regulations
by Amber Sinha published Mar 31, 2017 last modified Apr 03, 2017 02:05 PM — filed under: , , , , ,
In exercise of their powers under of the powers conferred by Aadhaar (Targeted Delivery of Financial and other Subsidies, Benefits and Services) Act, 2016, (Aadhaar Act) the UIDAI has come out with a set of five regulations in late 2016 last year. In this policy brief, we look at the five regulations, their key provisions and highlight point out the unresolved, issues, unaddressed, and created issues as result of these regulations.
Located in Internet Governance / Blog