The Centre for Internet and Society
http://editors.cis-india.org
These are the search results for the query, showing results 31 to 45.
Right to Food Campaign, Ranchi Convention, 2016
http://editors.cis-india.org/internet-governance/news/right-to-food-campaign-ranchi-convention-2016
<b>The Right to Food Campaign held its 2016 Convention in Ranchi during September 23-25, 2016. While three years have elapsed since the passage of the National Food Security Act, despite improvements in the Public Distribution System (PDS), large implementation gaps remain. This is what the Convention focused on, and gathered researchers and campaigners from across the country to share experiences and case studies on effectiveness and exclusions from the PDS. Sumandro Chattapadhyay took part in a session of the Convention to discuss how UID-linked welfare delivery is being rolled out across key programmes like provision of pension and rationed distribution of essential commodities, and their impact on people's right to welfare services.</b>
<p> </p>
<h4>Right to Food Campaign: <a href="http://www.righttofoodcampaign.in/">Website</a>.</h4>
<h4>Right to Food Campaign: <a href="https://docs.google.com/viewer?a=v&pid=sites&srcid=ZGVmYXVsdGRvbWFpbnxoYXFyb3ppcm90aXxneDo3MmQ3MTMyZjU2N2FjOGU">Cash Transfers and UID: Our Main Demands</a>.</h4>
<h4>Ranchi Convention, 2016: <a href="https://docs.google.com/document/d/110_asJ1t14IWALbhWN1RjDiOV8WE-fIK2xJC5Yltyc4/edit">Programme</a>.</h4>
<p> </p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/news/right-to-food-campaign-ranchi-convention-2016'>http://editors.cis-india.org/internet-governance/news/right-to-food-campaign-ranchi-convention-2016</a>
</p>
No publishersumandroBig DataData SystemsInternet GovernanceSurveillanceAadhaarWelfare GovernanceBiometricsBig Data for DevelopmentUID2019-03-16T04:40:52ZBlog EntryThe Future of Privacy in the Age of Big Data
http://editors.cis-india.org/internet-governance/news/study-tour-on-future-of-privacy-in-age-of-big-data
<b>A study tour on privacy and big data was organised by Friedrich Naumann Foundation for Freedom from September 3 to 10, 2016 in Berlin and Hamburg. Vanya Rakesh was one of the participants from South Asia who went for the tour.</b>
<h3>List of Participants</h3>
<ul>
<li>Shahid Ahmad, Deputy Director, Digital Empowerment Foundation</li>
<li>Shahzad Ahmad, Country Director, Bytes for All</li>
<li>Shivam Satnani, Senior Analyst, Data Security Council of India</li>
<li>Vanya Rakesh, Senior Policy Officer, Centre for Internet & Society</li>
<li>Anja Kovacs, Director, Internet Democracy Project</li>
<li>Tshering Cigay Dorji, CEO, Thimphu Tech Park</li>
<li>Vrinda Bhandari, Lawyer and Journalist, Chambers of Trideep Pais (Anwaltskanzlei)</li>
<li>Tahsin Ifnoor Sayeed, Head of Business Intelligence, DNet</li>
</ul>
<p><a class="external-link" href="http://cis-india.org/internet-governance/files/study-tour-big-data-privacy.pdf">Click to see the Agenda</a></p>
<ul>
</ul>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/news/study-tour-on-future-of-privacy-in-age-of-big-data'>http://editors.cis-india.org/internet-governance/news/study-tour-on-future-of-privacy-in-age-of-big-data</a>
</p>
No publisherpraskrishnaInternet GovernanceBig DataPrivacy2016-09-22T23:24:16ZNews ItemWorkshop on Big Data in India: Benefits, Harms, and Human Rights (Delhi, October 01)
http://editors.cis-india.org/internet-governance/events/big-data-in-india-benefits-harms-and-human-rights-oct-01-2016
<b>CIS welcomes you to participate in the workshop we are organising on Saturday, October 01 at India Habitat Centre, Delhi, to discuss benefits, harms, and human rights implications of big data technologies, and explore potential research questions. A quick RSVP will be much appreciated.</b>
<p> </p>
<h4>Workshop invitation: <a href="http://cis-india.org/internet-governance/files/big-data-in-india-invitatation-to-workshop/at_download/file">Download</a> (PDF)</h4>
<h4>Workshop agenda: <a href="http://cis-india.org/internet-governance/files/big-data-in-india-workshop-agenda/at_download/file">Download</a> (PDF)</h4>
<hr />
<p>In the last few years, there has been an emergence of the discourse of big data viewing it as an instrument not just for ensuring efficient, targeted and personalised services in the private sector, but also for development, social and policy research, and formalising and monetising various sections of the economy. This possibility is premised upon the idea that there is great knowledge that resides in both traditional and new forms of data made possible by our digital selves, and that we may now have the capability to tap into that knowledge for insights across diverse sectors like healthcare, finance, e-governance, education, law enforcement and disaster management, to name but a few. Alongside, various commentators have also pointed to the new problems and risks that big data could create for privacy of individuals through greater profiling, for free speech and economic choice by strengthening monopolistic tendencies, and for socio-economic inequalities by making existing disparities more acute and facilitating algorithmic bias and exclusion.</p>
<p>From a regulatory perspective, big data technologies pose fundamental challenges to the national data regulatory frameworks that have existed since many years. The nature of collection and utilisation of big data, which is often not driven by immediate purpose of the collected data, conflict with the principles of data minimisation and collection limitation that have been integral to data protection laws globally. This compels us to revisit existing theories of data governance. Additionally, use of big data in public decision-making highlights the question of how algorithmic control and governance must be regulated. This raises concerns around taking determining a balanced position that recognises the importance of big data, including for development actions, and ensures unhindered innovation with simultaneous focus on greater transparency and anonymisation to protect individual privacy, and various big data risks faced by population groups. In order to answer these questions, we need to begin with identifying the different harms and benefits of big data that could arise through its use across sectors and disciplines, especially in the context of human rights.</p>
<p>This workshop is designed around an extensive study of current and potential future uses of big data for governance in India that CIS has undertaken over the last year. The study focused on key central government projects and initiatives like the UID project, the Digital India programme, the Smart Cities Challenge, etc.</p>
<p>We will initiate the workshop with a detailed presentation of our findings and key concerns, which will then shape the discussion agenda of the workshop. We look forward to discuss aspects of big data technologies through the entry points of harms, opportunities, and human rights.</p>
<p>The final session of the workshop will focus on identifying key research questions on the topic, and exploring potential alliances of scholars and organisations that can drive such research activities.</p>
<p>We look forward to making this a forum for knowledge exchange for our friends and colleagues attending the discussion and discuss the opportunity to for potential collaboration.</p>
<p><strong>RSVP:</strong> Please send an email to Ajoy Kumar at <<a href="mailto:ajoy@cis-india.org">ajoy@cis-india.org</a>>.</p>
<p><strong>Organisers:</strong> Amber Sinha <<a href="mailto:amber@cis-india.org">amber@cis-india.org</a>> and Sumandro Chattapadhyay <<a href="mailto:sumandro@cis-india.org">sumandro@cis-india.org</a>>.</p>
<p> </p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/events/big-data-in-india-benefits-harms-and-human-rights-oct-01-2016'>http://editors.cis-india.org/internet-governance/events/big-data-in-india-benefits-harms-and-human-rights-oct-01-2016</a>
</p>
No publishervanyaDevelopmentBig DataInternet GovernanceDigital SecurityDigital IndiaDigitisationDigital subjectivitiesBiometricsBig Data for DevelopmentE-GovernanceDigital Rights2016-09-28T05:53:55ZEventReport on Understanding Aadhaar and its New Challenges
http://editors.cis-india.org/internet-governance/blog/report-on-understanding-aadhaar-and-its-new-challenges
<b>The Trans-disciplinary Research Cluster on Sustainability Studies at Jawaharlal Nehru University collaborated with the Centre for Internet and Society, and other individuals and organisations to organise a two day workshop on “Understanding Aadhaar and its New Challenges” at the Centre for Studies in Science Policy, JNU on May 26 and 27, 2016. The objective of the workshop was to bring together experts from various fields, who have been rigorously following the developments in the Unique Identification (UID) Project and align their perspectives and develop a shared understanding of the status of the UID Project and its impact. Through this exercise, it was also sought to develop a plan of action to address the welfare exclusion issues that have arisen due to implementation of the UID Project.</b>
<p> </p>
<h4>Report: <a href="http://editors.cis-india.org/internet-governance/files/report-on-understanding-aadhaar-and-its-new-challenges/at_download/file">Download</a> (PDF)</h4>
<hr />
<p style="text-align: justify;">This Report is a compilation of the observations made by participants at the workshop relating to myriad issues under the UID Project and various strategies that could be pursued to address these issues. In this Report we have classified the observations and discussions into following themes:</p>
<p><strong>1.</strong> <a href="#1">Brief Background of the UID Project</a></p>
<p><strong>2.</strong> <a href="#2">Legal Status of the UIDAI Project</a></p>
<ul>
<li><a href="#21">Procedural issues with passage of the Act</a></li>
<li><a href="#22">Status of related litigation</a></li></ul>
<p><strong>3.</strong> <a href="#3">National Identity Projects in Other Jurisdictions</a></p>
<ul>
<li><a href="#31">Pakistan</a></li>
<li><a href="#32">United Kingdom</a></li>
<li><a href="#33">Estonia</a></li>
<li><a href="#34">France</a></li>
<li><a href="#35">Argentina</a></li></ul>
<p><strong>4.</strong> <a href="#4">Technologies of Identification and Authentication</a></p>
<ul>
<li><a href="#41">Use of Biometric Information for Identification and Authentication</a></li>
<li><a href="#42">Architectures of Identification</a></li>
<li><a href="#43">Security Infrastructure of CIDR</a></li></ul>
<p><strong>5.</strong> <a href="#5">Aadhaar for Welfare?</a></p>
<ul>
<li><a href="#51">Social Welfare: Modes of Access and Exclusion</a></li>
<li><a href="#52">Financial Inclusion and Direct Benefits Transfer</a></li></ul>
<p><strong>6.</strong> <a href="#6">Surveillance and UIDAI</a></p>
<p><strong>7.</strong> <a href="#7">Strategies for Future Action</a></p>
<p><strong>Annexure A</strong> <a href="#AA">Workshop Agenda</a></p>
<p><strong>Annexure B</strong> <a href="#AB">Workshop Participants</a></p>
<hr />
<h3 id="1" style="text-align: justify;"><strong>1. Brief Background of the UID Project</strong></h3>
<p style="text-align: justify;">In the year 2009, the UIDAI was established and the UID project was conceived by the Planning Commission under the UPA government to provide unique identification for each resident in India and to be used for delivery of welfare government services in an efficient and transparent manner, along with using it as a tool to monitor government schemes. The objective of the scheme has been to issue a unique identification number by the Unique Identification Authority of India, which can be authenticated and verified online. It was conceptualized and implemented as a platform to facilitate identification and avoid fake identity issues and delivery of government benefits based on the demographic and biometric data available with the Authority.</p>
<p style="text-align: justify;">The Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Act, 2016 (the “<strong>Act</strong>”) was passed as a money bill on March 16, 2016 and was notified in the gazette March 25, 2016 upon receiving the assent of the President. However, the enforceability date has not been mentioned due to which the bill has not come into force.</p>
<p style="text-align: justify;">The Act provides that the Aadhaar number can be used to validate a person’s identity, but it cannot be used as a proof of citizenship. Also, the government can make it mandatory for a person to authenticate her/his identity using Aadhaar number before receiving any government subsidy, benefit, or service. At the time of enrolment, the enrolling agency is required to provide notice to the individual regarding how the information will be used, the type of entities the information will be shared with and their right to access their information. Consent of an individual would be obtained for using his/her identity information during enrolment as well as authentication, and would be informed of the nature of information that may be shared. The Act clearly lays that the identity information of a resident shall not be sued for any purpose other than specified at the time of authentication and disclosure of information can be made only pursuant to an order of a court not inferior to that of a District Judge and/or disclosure made in the interest of national security.</p>
<h3 id="2" style="text-align: justify;"><strong>2. Legal Status of the UIDAI Project</strong></h3>
<p style="text-align: justify;">In this section, we have summarised the discussions on the procedural issues with the passage of the Act. The participants had criticised the passage of the Act as a money bill in the Parliament. The participants also assessed the litigation pending in the Supreme Court of India that would be affected by this law. These discussions took place in the session titled, ‘Current Status of Aadhaar’ and have been summarised below.</p>
<h3 id="21" style="text-align: justify;">Procedural Issues with Passage of the Act</h3>
<p style="text-align: justify;">The participants contested the introduction of the Act in the form of a money bill. The rationale behind this was explained at the session and is briefly explained here. Article 110 (1) of the Constitution of India defines a money bill as one containing provisions only regarding the matters enumerated or any matters incidental to the following: a) imposition, regulation and abolition of any tax, b) borrowing or other financial obligations of the Government of India, c) custody, withdrawal from or payment into the Consolidated Fund of India (CFI) or Contingent Fund of India, d) appropriation of money out of CFI, e) expenditure charged on the CFI or f) receipt or custody or audit of money into CFI or public account of India. The Act makes references to benefits, subsidies and services which are funded by the Consolidated Fund of India (CFI), however the main objectives of the Act is to create a right to obtain a unique identification number and provide for a statutory mechanism to regulate this process. The Act only establishes an identification mechanism which facilitates distribution of benefits and subsidies funded by the CFI and this identification mechanism (Aadhaar number) does not give it the character of a money bill. Further, money bills can be introduced only in the Lok Sabha, and the Rajya Sabha cannot make amendments to such bills passed by the Lok Sabha. The Rajya Sabha can suggest amendments, but it is the Lok Sabha’s choice to accept or reject them. This leaves the Rajya Sabha with no effective role to play in the passage of the bill.</p>
<p style="text-align: justify;">The participants also briefly examined the writ petition that has been filed by former Union minister Jairam Ramesh challenging the constitutionality and legality of the treatment of this Act as a money bill which has raised the question of judiciary’s power to review the decisions of the speaker. Article 122 of the Constitution of India provides that this power of judicial review can be exercised to look into procedural irregularities. The question remains whether the Supreme Court will rule that it can determine the constitutionality of the decision made by the speaker relating to the manner in which the Act was introduced in the Lok Sabha. A few participants mentioned that similar circumstances had arisen in the case of Mohd. Saeed Siddiqui v. State of U.P. <a href="#ftn1">[1]</a>.</p>
<p style="text-align: justify;">where the Supreme Court refused to interfere with the decision of the Uttar Pradesh legislative assembly speaker certifying an amendment bill to increase the tenure of the Lokayukta as a money bill, despite the fact that the bill amended the Uttar Pradesh Lokayukta and Up-Lokayuktas Act, 1975, which was passed as an ordinary bill by both houses. The Court in this case held that the decision of the speaker was final and that the proceedings of the legislature being important legislative privilege could not be inquired into by courts. The Court added, “the question whether a bill is a money bill or not can be raised only in the state legislative assembly by a member thereof when the bill is pending in the state legislature and before it becomes an Act.”</p>
<p style="text-align: justify;">However, it is necessary to carve a distinction between Rajya Sabha and State Legislature. Unlike the State Legislature, constitution of Rajya Sabha is not optional therefore significance of the two bodies in the parliamentary process cannot be considered the same. Participants also made another significant observation about a similar bill on the UID project (National Identification Authority of India (NIDAI) Bill) that was introduced before by the UPA government in 2010 and was deemed unacceptable by the standing committee on finance, headed by Yashwant Sinha. This bill was subsequently withdrawn.</p>
<h3 id="22" style="text-align: justify;">Status of Related Litigation</h3>
<p style="text-align: justify;">A panellist in this session briefly summarised all the litigation that was related to or would be affected by the Act. The panellist also highlighted several Supreme Court orders in the case of <em>KS Puttuswamy v. Union of India</em> <a href="#ftn2">[2]</a> which limited the use of Aadhaar. We have reproduced the presentation below.</p>
<ul>
<li style="text-align: justify;"><em>KS Puttuswamy v. Union of India</em> - This petition was filed in 2012 with primary concern about providing Aadhaar numbers to illegal immigrants in India. It was contended that this could not be done without a law establishing the UIDAI and amendment to the Citizenship laws. The petitioner raised concerns about privacy and fallibility of biometrics.</li>
<li style="text-align: justify;"> Sudhir Vombatkere & Bezwada Wilson <a href="#ftn3">[3]</a> - This petition was filed in 2013 on grounds of infringement of right to privacy guaranteed under Article 21 of the Constitution of India and the security threat on account of data convergence.</li>
<li style="text-align: justify;">Aruna Roy & Nikhil Dey <a href="#ftn4">[4]</a> - This petition was filed in 2013 on the grounds of large scale exclusion of people from access to basic welfare services caused by UID. After their petition, no. of intervention applications were filed. These were the following:</li>
<li style="text-align: justify;">Col. Mathew Thomas <a href="#ftn5">[5]</a> - This petition was filed on the grounds of threat to national security posed by the UID project particularly in relation to arrangements for data sharing with foreign companies (with links to foreign intelligence agencies).</li>
<li style="text-align: justify;">Nagrik Chetna Manch <a href="#ftn6">[6]</a> - This petition was filed in 2013 and led by Dr. Anupam Saraph on the grounds that the UID project was detrimental to financial service regulation and financial <em>inclusion.</em></li>
<li style="text-align: justify;">S. Raju <a href="#ftn7">[7] </a> - This petition was filed on the grounds that the UID project had implications on the federal structure of the State and was detrimental to financial inclusion.</li>
<li style="text-align: justify;"><em>Beghar Foundation</em> - This petition was filed in 2013 in the Delhi High Court on the grounds invasion of privacy and exclusion specifically in relation to the homeless. It subsequently joined the petition filed by Aruna Roy and Nikhil Dey as an intervener.</li>
<li style="text-align: justify;">Vickram Crishna – This petition was originally filed in the Bombay High Court in 2013 on the grounds of surveillance and invasion of privacy. It was later transferred to the Supreme Court.</li>
<li style="text-align: justify;">Somasekhar – This petition was filed on the grounds of procedural unreasonableness of the UID project and also exclusion & privacy. The petitioner later intervened in the petition filed by Aruna Roy and Nikhil Dey in 2013.</li>
<li style="text-align: justify;">Rajeev Chandrashekhar– This petition was filed on the ground of lack of legal sanction for the UID project. He later intervened in the petition filed by Aruna Roy and Nikhil Dey in 2013. His position has changed now.</li>
<li style="text-align: justify;">Further, a petition was filed by Mr. Jairam Ramesh initially challenging the passage of the Act as a money bill but subsequently, it has been amended to include issues of violation of right to privacy and exclusion of the poor and has advocated for five amendments that were suggested to the Aadhaar Bill by the Rajya Sabha.</li></ul>
<h3 id="23" style="text-align: justify;">Relevant Orders of the Supreme Court</h3>
<p>There are six orders of the Supreme Court which are noteworthy.</p>
<ul>
<li style="text-align: justify;">Order of Sept. 23, 2013 - The Supreme court directed that: 1) no person shall suffer for not having an aadhaar number despite the fact that a circular by an authority makes it mandatory; 2) it should be checked if a person applying for aadhaar number voluntarily is entitled to it under the law; and 3) precaution should be taken that it is not be issued to illegal immigrants.</li>
<li style="text-align: justify;">Order of 26th November, 2013 – Applications were filed by UIDAI, Ministry of Petroleum & Natural Gas, Govt of India, Indian Oil Corporation, BPCL and HPCL for modifying the September 23rd order and sought permission from the Supreme Court to make aadhaar number mandatory. The Supreme Court held that the order of September 23rd would continue to be effective.</li>
<li style="text-align: justify;">Order of 24th March, 2014 – This order was passed by the Supreme Court in a special leave petition filed in the case of <em>UIDAI v CBI</em> <a href="#ftn8">[8] </a> wherein UIDAI was asked to UIDAI to share biometric information of all residents of a particular place in Goa to facilitate a criminal investigation involving charges of rape and sexual assault. The Supreme Court restrained UIDAI from transferring any biometric information of an individual without to any other agency without his consent in writing. The Supreme Court also directed all the authorities to modify their forms/circulars/likes so as to not make aadhaar number mandatory.</li>
<li style="text-align: justify;">Order of 16th March, 2015 - The SC took notice of widespread violations of the order passed on September 23rd, 2013 and directed the Centre and the states to adhere to these orders to not make aadhaar compulsory.</li>
<li style="text-align: justify;">Orders of August 11, 2015 – In the first order, the Central Government was directed to publicise the fact that aadhaar was voluntary. The Supreme Court further held that provision of benefits due to a citizen of India would not be made conditional upon obtaining an aadhaar number and restricted the use of aadhaar to the PDS Scheme and in particular for the purpose of distribution of foodgrains, etc. and cooking fuel, such as kerosene and the LPG Distribution Scheme. The Supreme Court also held that information of an individual that was collected in order to issue an aadhaar number would not be used for any purpose except when directed by the Court for criminal investigations. Separately, the status of fundamental right to privacy was contested and accordingly the Supreme Court directed that the issue be taken up before the Chief Justice of India.</li>
<li style="text-align: justify;">Orders of October 16, 2015 – The Union of India, the states of Gujarat, Maharashtra, Himachal Pradesh and Rajasthan, and authorities including SEBI, TRAI, CBDT, IRDA , RBI applied for a hearing before the Constitution Bench for modification of the order passed by the Supreme Court on August 11 and allow use of aadhaar number schemes like The Mahatma Gandhi National Rural Employment Guarantee Scheme MGNREGS), National Social Assistance Programme (Old Age Pensions, Widow Pensions, Disability Pensions) Prime Minister's Jan Dhan Yojana (PMJDY) and Employees' Providend Fund Organisation (EPFO). The Bench allowed the use of aadhaar number for these schemes but stressed upon the need to keep aadhaar scheme voluntary until the matter was finally decided.</li></ul>
<p style="text-align: justify;">Status of these orders<br />The participants discussed the possible impact of the law on the operation of these orders. A participant pointed out that matters in the Supreme Court had not become infructuous because fundamental issues that were being heard in the Supreme Court had not been resolved by the passage of the Act. Several participants believed that the aforementioned orders were effective because the law had not come into force. Therefore, aadhaar number could only be used for purposes specified by the Supreme Court and it could not be made mandatory. Participants also highlighted that when the Act was implemented, it would not nullify the orders of the Supreme Court unless Union of India asked the Supreme Court for it specifically and the Supreme Court sanctioned that.</p>
<h3 id="3" style="text-align: justify;"><strong>3. National Identity Projects in Other Jurisdictions</strong></h3>
<p style="text-align: justify;">A panellist had provided a brief overview of similar programs on identification that have been launched in other jurisdictions including Pakistan, United Kingdom, France, Estonia and Argentina in the recent past in the session titled ‘Aadhaar - International Dimensions’. This presentation mainly sought to assess the incentives that drove the governments in these jurisdictions to formulate these projects, mandatory nature of their adoption and their popularity. The Report has reproduced the presentation here.</p>
<h3 id="31" style="text-align: justify;">Pakistan</h3>
<p style="text-align: justify;">The Second Amendment to the Constitution of Pakistan in 2000 established the National Database and Regulation Authority in the country, which regulates government databases and statistically manages the sensitive registration database of the citizens of Pakistan. It is also responsible for issuing national identity cards to the citizens of Pakistan. Although the card is not legally compulsory for a Pakistani citizen, it is mandatory for:</p>
<ul>
<li>Voting</li>
<li>Obtaining a passport</li>
<li>Purchasing vehicles and land</li>
<li>Obtaining a driver licence</li>
<li>Purchasing a plane or train ticket</li>
<li>Obtaining a mobile phone SIM card</li>
<li>Obtaining electricity, gas, and water</li>
<li>Securing admission to college and other post-graduate institutes</li>
<li>Conducting major financial transactions</li></ul>
<p style="text-align: justify;">Therefore, it is pretty much necessary for basic civic life in the country. In 2012, NADRA introduced the Smart National Identity Card, an electronic identity card, which implements 36 security features. The following information can be found on the card and subsequently the central database: Legal Name, Gender (male, female, or transgender), Father's name (Husband's name for married females), Identification Mark, Date of Birth, National Identity Card Number, Family Tree ID Number, Current Address, Permanent Address, Date of Issue, Date of Expiry, Signature, Photo, and Fingerprint (Thumbprint). NADRA also records the applicant's religion, but this is not noted on the card itself. (This system has not been removed yet and is still operational in Pakistan.)</p>
<h3 id="32" style="text-align: justify;">United Kingdom</h3>
<p style="text-align: justify;">The Identity Cards Act was introduced in the wake of the terrorist attacks on 11th September, 2001, amidst rising concerns about identity theft and the misuse of public services. The card was to be used to obtain social security services, but the ability to properly identify a person to their true identity was central to the proposal, with wider implications for prevention of crime and terrorism. The cards were linked to a central database (the National Identity Register), which would store information about all of the holders of the cards. The concerns raised by human rights lawyers, activists, security professionals and IT experts, as well as politicians were not to do with the cards as much as with the NIR. The Act specified 50 categories of information that the NIR could hold, including up to 10 fingerprints, digitised facial scan and iris scan, current and past UK and overseas places of residence of all residents of the UK throughout their lives. The central database was purported to be a prime target for cyber attacks, and was also said to be a violation of the right to privacy of UK citizens. The Act was passed by the Labour Government in 2006, and repealed by the Conservative-Liberal Democrat Coalition Government as part of their measures to “reverse the substantial erosion of civil liberties under the Labour Government and roll back state intrusion.”</p>
<h3 id="33" style="text-align: justify;">Estonia</h3>
<p style="text-align: justify;">The Estonian i-card is a smart card issued to Estonian citizens by the Police and Border Guard Board. All Estonian citizens and permanent residents are legally obliged to possess this card from the age of 15. The card stores data such as the user's full name, gender, national identification number, and cryptographic keys and public key certificates. The cryptographic signature in the card is legally equivalent to a manual signature, since 15 December 2000. The following are a few examples of what the card is used for:</p>
<ul>
<li>As a national ID card for legal travel within the EU for Estonian citizens</li>
<li>As the national health insurance card</li>
<li>As proof of identification when logging into bank accounts from a home computer</li>
<li>For digital signatures</li>
<li>For i-voting</li>
<li>For accessing government databases to check one’s medical records, file taxes, etc.</li>
<li>For picking up e-Prescriptions</li>
<li>(This system is also operational in the country and has not been removed)</li></ul>
<h3 id="34" style="text-align: justify;">France</h3>
<p style="text-align: justify;">The biometric ID card was to include a compulsory chip containing personal information, such as fingerprints, a photograph, home address, height, and eye colour. A second, optional chip was to be implemented for online authentication and electronic signatures, to be used for e-government services and e-commerce. The law was passed with the purpose of combating “identity fraud”. It was referred to the Constitutional Council by more than 200 members of the French Parliament, who challenged the compatibility of the bill with the citizens’ fundamental rights, including the right to privacy and the presumption of innocence. The Council struck down the law, citing the issue of proportionality. “Regarding the nature of the recorded data, the range of the treatment, the technical characteristics and conditions of the consultation, the provisions of article 5 touch the right to privacy in a way that cannot be considered as proportional to the meant purpose”.</p>
<h3 id="35" style="text-align: justify;">Argentina</h3>
<p style="text-align: justify;">Documento Nacional de Identidad or DNI (which means National Identity Document) is the main identity document for Argentine citizens, as well as temporary or permanent resident aliens. It is issued at a person's birth, and updated at 8 and 14 years of age simultaneously in one format: a card (DNI tarjeta); it's valid if identification is required, and is required for voting. The front side of the card states the name, sex, nationality, specimen issue, date of birth, date of issue, date of expiry, and transaction number along with the DNI number and portrait and signature of the card's bearer. The back side of the card shows the address of the card's bearer along with their right thumb fingerprint. The front side of the DNI also shows a barcode while the back shows machine-readable information. The DNI is a valid travel document for entering Argentina, Bolivia, Brazil, Chile, Colombia, Ecuador, Paraguay, Peru, Uruguay, and Venezuela. (System still operational in the country)</p>
<h3 id="4" style="text-align: justify;"><strong>4. Technologies of Identification and Authentication</strong></h3>
<p style="text-align: justify;">The panel in the session titled ‘Aadhaar: Science, Technology, and Security’ explained the technical aspects of use of biometrics and privacy concerns, technology architecture for identification and inadequacy of infrastructure for information security. In this section, we have summarised the presentation and the ensuing discussions on these issues.</p>
<h3 id="41" style="text-align: justify;">Use of Biometric Information for Identification and Authentication</h3>
<p style="text-align: justify;">The panelists explained with examples that identification and authentication were different things. Identity provides an answer to the question “who are you?” while authentication is a challenge-response process that provides a proof of the claim of identity. Common examples of identity are User ID (Login ID), cryptographic public keys and ATM or Smart cards while common authenticators are passwords (including OTPs), PINs and cryptographic private keys. Identity is public information but an authenticator must be private and known only to the user. Authentication must necessarily be a conscious process and active participation by the user is a must. It should also always be possible to revoke an authenticator. After providing this understanding of the two processes the panellist then explained if biometric information could be used for identification or authentication under the UID Project. Biometric information is clearly public information and it is questionable if it can be revoked. Therefore it should never be used for authentication, but only for identity verification. There is a possibility of authentication by fingerprints under the UID Project, without conscious participation of the user. One could trace the fingerprints of an individual from any place the individual has been in contact with. Therefore, authentication must certainly be done by other means. The panellist pointed out that there were five kinds of authentication under the UID Project, out of which two-factor authentication and one time password were considered suitable but use of biometric information and demographic information was extremely threatening and must be withdrawn.</p>
<h3 id="42" style="text-align: justify;">Architectures of Identification</h3>
<p style="text-align: justify;">The panelists explained the architecture of the UID Project that has been designed for identification purposes, highlighted its limitations and suggested alternatives. His explanations are reproduced below.</p>
<p style="text-align: justify;">Under the UID Project, there is a centralised means of identification i.e. the aadhaar number and biometric information stored in one place, Central Identification Data Repository (CIDR). It is better to have multiple means of identification than one (as contemplated under the UID Project) for preservation of our civil liberties. The question is what the available alternatives are. Web of trust is a way for operationalizing distributed identification but the challenge is how one brings people from all social levels to participate in it. There is a need for registrars who will sign keys and public databases for this purpose.</p>
<p style="text-align: justify;">The aadhaar number functions as a common index and facilitates correlation of data across Government databases. While this is tremendously attractive it raises several privacy concerns as more and more information relating to an individual is available to others and is likely to be abused.</p>
<p style="text-align: justify;">The aadhaar number is available in human readable form. This raises the risk of identification without consent and unauthorised profiling. It cannot be revoked. Potential for damage in case of identity theft increases manifold.</p>
<p style="text-align: justify;">Under the UID Project, for the purpose of information security, Authentication User Agencies (“<strong>AUA</strong>”) are required to use local identifiers instead of aadhaar numbers but they are also required to map these local identifiers to the aadhaar numbers. Aadhaar numbers are not cryptographically secured; in fact they are publicly available. Hence this exercise for securing information is useless. An alternative would be to issue different identifiers for different domains and cryptographically embed a “master identifier” (in this case, equivalent of aadhaar number) into each local identifier.</p>
<p style="text-align: justify;">All field devices (for example POS machines) should be registered and must communicate directly with UIDAI. In fact, UIDAI must verify the authenticity (tamper proof) of the field device during run time and a UIDAI approved authenticity certificate must be issued for field devices. This certificate must be made available to users on demand. Further, the security and privacy frameworks within which AUAs work must be appropriately defined by legal and technical means.</p>
<h3 id="43" style="text-align: justify;">Security Infrastructure of CIDR</h3>
<p style="text-align: justify;">The panelists also enumerated the security features of the UID Project and highlighted the flaws in these features. These have been summarised below.</p>
<p>The security and privacy infrastructure of UIDAI has the following main features:</p>
<ul>
<li>2048 bit PKI encryption of biometric data in transit</li>
<li>End-to-end encryption from enrolment/POS to CIDR</li>
<li>HMAC based tamper detection of PID blocks</li>
<li>Registration and authentication of AUAs</li>
<li>Within CIDR only a SHA 1 Hash of Aadhaar number is stored</li>
<li>Audit trails are stored SHA 1 encrypted. Tamper detection?</li>
<li>Only hashes of passwords and PINs are stored. (biometric data stored in original form though!)</li>
<li>Authentication requests have unique session keys and HMAC</li>
<li>Resident data stored using 100 way sharding (vertical partitioning). First two digits of Aadhaar number as shard keys</li>
<li>All enrolment and update requests link to partitioned databases using Ref IDs (coded indices)</li>
<li>All accesses through a hardware security module</li>
<li>All analytics carried out on anonymised data</li></ul>
<p style="text-align: justify;">The panellists pointed out the concerns about information security on account of design flaws, lack of procedural safeguards, openness of the system and too much trust imposed on multiple players. All symmetric and private keys and hashes are stored somewhere within UIDAI. This indicates that trust is implicitly assumed which is a glaring design flaw. There is no well-defined approval procedure for data inspection, whether it is for the purpose of investigation or for data analytics. There is a likelihood of system hacks, insider leaks, and tampering of authentication records and audit trails. The ensuing discussions highlighted that the UIDAI had admitted to these security risks. The enrolment agencies and the enrolment devices cannot be trusted. AUAs cannot be trusted with biometric and demographic data; neither can they be trusted with sensitive user data of private nature. There is a need for an independent third party auditor for distributed key management, auditing and approving UIDAI programs, including those for data inspection and analytics, whitebox cryptographic compilation of critical parts of the UIDAI programs, issue of cryptographic keys to UIDAI programs for functional encryption, challenge-response for run-time authentication and certification of UIDAI programs. The panellist recommended that there was a need to to put a suitable legal framework to execute this.</p>
<p style="text-align: justify;">The participants also discussed that information infrastructure must not be made of proprietary software (possibility for backdoors for US) and there must be a third party audit with a non-negotiable clause for public audit.</p>
<h3 id="5" style="text-align: justify;"><strong>5. Aadhaar for Welfare?</strong></h3>
<p style="text-align: justify;">The Report has summarised the discussions that took place in the sessions on ‘Direct Benefits Transfers’ and ‘Aadhaar: Broad Issues - II’ where the panellists critically analysed the claims of benefits and inclusion of Aadhaar made by the government in light of the ground realities in states where Aadhaar has been adopted for social welfare schemes.</p>
<h3 id="51" style="text-align: justify;">Social Welfare: Modes of Access and Exclusion</h3>
<p style="text-align: justify;">Under the Act, a person may be required to authenticate or give proof of the aadhaar number in order to receive subsidy from the government (Section 7). A person is required to punch their fingerprints on POS machines in order to receive their entitlement under the social welfare schemes such as LPG and PDS. It was pointed out in the discussions that various states including Rajasthan and Delhi had witnessed fingerprint errors while doling out benefits at ration shops under the PDS scheme. People have failed to receive their entitled benefits because of these fingerprint errors thus resulting in exclusion of beneficiaries <a href="#ftn9">[9]</a>. A panellist pointed out that in Rajasthan, dysfunctional biometrics had led to further corruption in ration shops. Ration shop owners often lied to the beneficiaries about functioning of the biometric machines (POS Machines) and kept the ration for sale in the market therefore making a lot of money at the expense of uninformed beneficiaries and depriving them of their entitlements.</p>
<p style="text-align: justify;">Another participant organisation also pointed out similar circumstances in the ration shops in Patparganj and New Delhi constituencies. Here, the dealers had maintained the records of beneficiaries who had been categorized as follows: beneficiaries whose biometrics did not match, beneficiaries whose biometrics matched and entitlements were provided, beneficiaries who never visited the ration shop. It had been observed that there were no entries in the category of beneficiaries whose biometrics did not match however, the beneficiaries had a different story to tell. They complained that their biometrics did not match despite trying several times and there was no mechanism for a manual override. Consequently, they had not been able to receive any entitlements for months. The discussions also pointed out that the food authorities had placed complete reliance on authenticity of the POS machines and claim that this system would weed out families who were not entitled to the benefits. The MIS was also running technical glitches as a result there was a problem with registering information about these transactions hence, no records had been created with the State authority about these problems. A participant also discussed the plight of 30,000 widows in Delhi, who were entitled to pension and used to collect their entitlement from post offices, faced exclusion due to transition problems under the Jan Dhan Yojana (after the Jandhan was launched the money was transferred to their bank accounts in order to resolve the problem of misappropriation of money at the hands of post office officials). These widows were asked to open bank accounts to receive their entitlements and those who did not open these accounts and did not inform the post office were considered bogus.</p>
<p style="text-align: justify;">In the discussions, the participants also noted that this unreliability of fingerprints as a means of authentication of an individual’s identity was highlighted at the meeting of Empowered Group of Ministers in 2011 by J Dsouza, a biometrics scientist. He used his wife’s fingerprints to demonstrate that fingerprints may change overtime and in such an event, one would not be able to use the POS machine anymore as the machine would continue to identify the impressions collected initially.</p>
<p style="text-align: justify;">The participants who had been working in the field had contributed to the discussions by busting the myth that the UID Project helped to identify who was poor and resolve the problem of exclusion due to leakages in the social welfare programs. These discussions have been summarised below.</p>
<ul>
<li style="text-align: justify;">It is important to understand that the UID Project is merely an identification and authentication system. It only helps in verifying if an individual is entitled to benefits under a social security scheme. It does not ensure plugging of leakages and reducing corruption in social security schemes as has been claimed by the Government. The reduction in leakage of PDS, for instance, should be attributed to digitization and not UID. The Government claims, that it has saved INR 15000 crore in provision of LPG on identification of 3.34 crore inactive accounts on account of the UID Project. This is untrue because the accounts were weeded by using mechanisms completely unrelated to the UID Project. Consequently, the savings on account of UID are only of INR 120 crore and not 15000 crore.</li>
<li style="text-align: justify;">The UID Project has resulted in exclusion of people either because they do not have an aadhaar number, or they have a wrong identification, or there are errors of classification or wilful misclassification. About 99.7% people who were given aadhaar numbers already had an identification document. In fact, during enrolment a person is required to produce one of 14 identification documents listed under the law in order to get an aadhaar number which makes it very difficult for a person with no identity to become entitled to a social welfare scheme.</li></ul>
<p style="text-align: justify;">A participant condemned the Government’s claim that the UID Project had helped in removing fake, bogus and duplicate cards and said that these terms could not be used synonymously and the authorities had no clarity about the difference between the meanings of these terms. The UID Project had only helped in removal of duplicate cards but had not helped in combating the use of fake and bogus cards.</p>
<h3 id="52" style="text-align: justify;">Financial Inclusion and Direct Benefits Transfer</h3>
<p style="text-align: justify;">The participants also engaged in the discussions about the impact of the UID project on financial inclusion in India in the sessions titled ‘Aadhaar: Broad Issues - I & II’. We have summarised these discussions below.</p>
<p style="text-align: justify;">The UID Project seeks to directly transfer money to a bank account in order to combat corruption. The discussions highlighted that this was nothing but introducing a neo liberal thrust in social policy and that it was not feasible for various reasons. First, 95% of rural India did not have functioning banks and banks are quite far away. Second, in order to combat this dearth of banks the idea of business correspondents, who handled banking transactions and helped in opening of bank accounts, had been introduced which had created various problems. The Reserve Bank of India reported that there was dearth of business correspondents as there was very little incentive to become one; their salary is merely INR 4000. Third, there were concerns about how an aadhaar number was considered a valid document for Know Your Customer (KYC) checks. There was a requirement for scrutiny and auditing of documents submitted during the time of enrolment which, in the present scheme of things, could not be verified. Fourth, there were no restrictions on number of bank accounts that could be opened with a single aadhaar number which gave rise to a possibility of opening multiple and shell accounts on a single aadhaar number. Therefore, records only showed transactions when money was transferred from an aadhaar number to another aadhaar number as opposed to an account-to-account transfer. The discussion relied on NPCI data which shows which bank an aadhaar number is associated with but does not show if a transaction by an aadhaar number is overwritten by another bank account belonging to the same aadhaar number.</p>
<h3 id="6" style="text-align: justify;"><strong>6. Surveillance and UIDAI</strong></h3>
<p style="text-align: justify;">The participants had discussed the possibility of an alternative purpose for enrolling Aadhaar in the session titled ‘Privacy, Surveillance, and Ethical Dimensions of Aadhaar’. The discussion traced the history of this project to gain insight on this issue. We have summarised below the key take aways from this discussion.</p>
<p style="text-align: justify;">There are claims that the main objective of launching the UID Project is not to facilitate implementation of social security schemes but to collect personal (financial and non-financial) information of the citizens and residents of the country to build a data monopoly. For this purpose, PDS was chosen as a suitable social security scheme as it has the largest coverage. Several participants suggested that numerous reports authored by FICCI, KPMG and ASSOCHAM contained proposals for establishing a national identity authority which threw some light on the commercial intentions behind information collection under the UID Project.</p>
<p style="text-align: justify;">It was also pointed out that there was documented proof that information collected under the UID Project might have been shared with foreign companies. There are suggestions about links established between proponents of the UID Project and companies backed by CIA or the French Government which run security projects and deal in data sharing in several jurisdictions.</p>
<h3 id="7" style="text-align: justify;"><strong>7. Strategies for Future Action</strong></h3>
<p>The participants laid down a list of measures that must be taken to take the discussions forward. We have enumerated these recommendations below.</p>
<ul>
<li>Prepare and compile an anthology of articles as an output of this workshop. </li>
<li>Prepare position papers on specific issues related to the UID Project </li>
<li>Prepare pamphlets/brochures on issues with the UID Project for public consumption </li>
<li>Prepare counter-advertisements for Aadhaar</li>
<li>Publish existing empirical evidence on the flaws in Aadhaar.</li>
<li>Set up an online portal dedicated to providing updates on the UID Project and allows discussions on specific issues related to Aadhaar.</li>
<li>Use Social Media to reach out to the public. Regularly track and comment on social media pages of relevant departments of the government.</li>
<li>Create groups dedicated to research and advocacy of specific aspects of the UID Project. </li>
<li>Create a Coordination Committee preferably based in Delhi which would be responsible for regularly holding meetings and for preparing a coordinated plan of action. Employ permanent to staff to run the Committee.</li>
<li>Organise an advocacy campaign against use of Aadhaar in collaboration with other organisations and build public domain acceptance. </li>
<li>The campaign must specifically focus on the unfettered scope of UID and expanse, misrepresentation of the success of Aadhaar by highlighting real savings, technological flaws, status of pilot programs and increasing corruption on account of the UID Project</li>
<li>Prepare a statement of public concern regarding the UID Project and collect signatures from eminent persons including academics, technical experts, civil society groups and members of parliament.</li>
<li>Organise events and discussions on issues relating to Aadhaar and invite members og government departments to speak and discuss the issues. </li>
<li style="text-align: justify;">Write to Members of Parliament and Members of Legislative Assemblies raising questions on their or their parties’ support for Aadhaar and silence on the problems created by the UID Project. </li>
<li style="text-align: justify;">Organise public hearings in states like Rajasthan to observe and document ground realities of the UID Project and share these outcomes with the state government and media. </li>
<li>Plan a national social audit and public hearing on the working of UID Project in the country. </li>
<li style="text-align: justify;">File Contempt Petitions in the Supreme Court and High Courts against mandatory use of Aadhaar number for services not allowed by the Supreme Court. </li>
<li style="text-align: justify;">Reach out to and engage with various foreign citizens and organisations that have been fighting on similar issues. The organisations and individuals who could be approached would include EPIC, Electronic Frontier foundation, David Moss, UK, Roger Clarke, Australia, Prof. Ian Angel, Snowden, Assange and Chomsky.</li>
<li style="text-align: justify;">Work towards increasing awareness about the UID Project and gaining support from the student and research community, student organisations, trade unions, and other associations and networks in the unorganised sector.</li></ul>
<h3 id="AA" style="text-align: justify;"><strong>Annexure A – Workshop Agenda</strong></h3>
<h4>May 26, 2016</h4>
<table>
<tbody>
<tr>
<td>
<p>9:00-9:30</p>
</td>
<td>
<p><strong>Registration</strong></p>
</td>
</tr>
<tr>
<td>
<p>9:30-10:00</p>
</td>
<td>
<p>Prof. Dinesh Abrol - <em>Welcome</em><br />
<em>Self-introduction and expectations of participants</em><br />
Dr. Usha Ramanathan - <em>Overview of the Workshop</em></p>
</td>
</tr>
<tr>
<td>
<p>10:00-11:00</p>
</td>
<td>
<p><strong>Session 1: Current Status of Aadhaar</strong><br />
Dr. Usha Ramanathan, Legal Researcher, New Delhi - <em>What the 2016 Law Says, and How it Came into Being</em><br />
S. Prasanna, Advocate, New Delhi - <em>Status and Force of Supreme Court Orders on Aadhaar</em><br /> <em>Discussion</em></p>
</td>
</tr>
<tr>
<td>
<p>11:00-11:30</p>
</td>
<td>
<p><strong>Tea Break</strong></p>
</td>
</tr>
<tr>
<td>
<p>11:30-13:30</p>
</td>
<td>
<p><strong>Session 2: Direct Benefits Transfers</strong><br />
Prof. Reetika Khera, Indian Institute of Technology, Delhi - <em>Welfare Needs Aadhaar like a Fish Needs a Bicycle</em><br />
Prof. R. Ramakumar, Tata Institute of Social Sciences, Mumbai - <em>Aadhaar and the Social Sector: A critical analysis of the claims of benefits and inclusion</em><br />
Ashok Rao, Delhi Science Forum - <em>Cash Transfers Study</em><br />
<em>Discussion</em></p>
</td>
</tr>
<tr>
<td>
<p>13:30-14:30</p>
</td>
<td>
<p><strong>Lunch</strong></p>
</td>
</tr>
<tr>
<td>
<p>14:30-16:00</p>
</td>
<td>
<p><strong>Session 3: Aadhaar: Science, Technology, and Security</strong><br />
Prof. Subashis Banerjee, Dept of Computer Science & Engineering, IIT, Delhi - <em>Privacy and Security Issues Related to the Aadhaar Act</em><br />
Pukhraj Singh, Former National Cyber Security Manager, Aadhaar, New Delhi - <em>Aadhaar: Security and Surveillance Dimensions</em><br />
<em>Discussion</em></p>
</td>
</tr>
<tr>
<td>
<p>16:00-16:30</p>
</td>
<td>
<p><strong>Tea Break</strong></p>
</td>
</tr>
<tr>
<td>
<p>16:30-17:30</p>
</td>
<td>
<p><strong>Session 4: Aadhaar - International Dimensions</strong><br />
Joshita Pai, Center for Communication Governance, National Law University, Delhi - <em>Biometrics and Mandatory IDs in Other Parts of the World</em><br />
Dr. Gopal Krishna, Citizens Forum for Civil Liberties - <em>International Dimensions of Aadhaar</em><br />
<em>Discussion</em></p>
</td>
</tr>
<tr>
<td>
<p>17:30-18:00</p>
</td>
<td>
<p><strong>High Tea</strong></p>
</td>
</tr>
</tbody>
</table>
<h4>May 27, 2016</h4>
<table>
<tbody>
<tr>
<td>
<p>9:30-11:00</p>
</td>
<td>
<p><strong>Session 5: Privacy, Surveillance and Ethical Dimensions of Aadhaar</strong><br />
Prabir Purkayastha, Free Software Movement of India, New Delhi - <em>Surveillance Capitalism and the Commodification of Personal Data</em><br />
Arjun Jayakumar, SFLC - <em>Surveillance Projects Amalgamated</em><br />
Col Mathew Thomas, Bengaluru - <em>The Deceit of Aadhaar<em></em><br />
<em>Discussion</em></em></p>
<em>
</em></td>
</tr>
<tr>
<td>
<p>11:00-11:30</p>
</td>
<td>
<p><strong>Tea Break</strong></p>
</td>
</tr>
<tr>
<td>
<p><em>11:30-13:00</em></p>
</td>
<td>
<p><strong>Session 6: Aadhaar - Broad Issues I</strong><br />
Prof. G Nagarjuna, Homi Bhabha Center for Science Education, Tata Institute of Fundamental Research, Mumbai - <em>How to prevent linked data in the context of Aadhaar</em><br />
Dr. Anupam Saraph, Pune - <em>Aadhaar and Moneylaundering</em><br />
<em>Discussion</em></p>
</td>
</tr>
<tr>
<td>
<p>13:00-14:00</p>
</td>
<td>
<p><strong>Lunch</strong></p>
</td>
</tr>
<tr>
<td>
<p>14:00-15:30</p>
</td>
<td>
<p><strong>Session 7: Aadhaar - Broad Issues II</strong><br />
Prof. MS Sriram, Visiting Faculty, Indian Institute of Management, Bangalore - <em>Financial lnclusion</em><br />
Nikhil Dey, MKSS, Rajasthan - <em>Field witness: Technology on the Ground</em><br />
Prof. Himanshu, Centre for Economic Studies & Planning, JNU - <em>UID Process and Financial Inclusion</em><br />
<em>Discussion</em></p>
</td>
</tr>
<tr>
<td>
<p>15:30-16:00</p>
</td>
<td>
<p><strong>Session 8: Conclusion</strong></p>
</td>
</tr>
<tr>
<td>
<p>16:00-18:00</p>
</td>
<td>
<p><strong>Informal Meetings</strong></p>
</td>
</tr>
</tbody>
</table>
<h3 id="AB" style="text-align: justify;"><strong>Annexure B – Workshop Participants</strong></h3>
<p>Anjali Bhardwaj, Satark Nagrik Sangathan</p>
<p>Dr. Anupam Saraph</p>
<p>Arjun Jayakumar, Software Freedom Law Centre</p>
<p>Ashok Rao, Delhi Science Forum</p>
<p>Prof. Chinmayi Arun, National Law University, Delhi</p>
<p>Prof. Dinesh Abrol, Jawaharlal Nehru University</p>
<p>Prof. G Nagarjuna, Homi Bhabha Center for Science Education, Tata Institute of Fundamental Research, Mumbai</p>
<p>Dr. Gopal Krishna, Citizens Forum for Civil Liberties</p>
<p>Prof. Himanshu, Jawaharlal Nehru University</p>
<p>Japreet Grewal, the Centre for Internet and Society</p>
<p>Joshita Pai, National Law University, Delhi</p>
<p>Malini Chakravarty, Centre for Budget and Governance Accountability</p>
<p>Col. Mathew Thomas</p>
<p>Prof. MS Sriram, Indian Institute of Management, Bangalore</p>
<p>Nikhil Dey, Mazdoor Kisan Shakti Sangathan</p>
<p>Prabir Purkayastha, Knowledge Commons and Free Software Movement of India</p>
<p>Pukhraj Singh, Bhujang</p>
<p>Rajiv Mishra, Jawaharlal Nehru University</p>
<p>Prof. R Ramakumar, Tata Institute of Social Sciences, Mumbai</p>
<p>Dr. Reetika Khera, Indian Institute of Technology, Delhi</p>
<p>Dr. Ritajyoti Bandyopadhyay, Indian Institute of Science Education and Research, Mohali</p>
<p>S. Prasanna, Advocate</p>
<p>Sanjay Kumar, Science Journalist</p>
<p>Sharath, Software Freedom Law Centre</p>
<p>Shivangi Narayan, Jawaharlal Nehru University</p>
<p>Prof. Subhashis Banerjee, Indian Institute of Technology, Delhi</p>
<p>Sumandro Chattapadhyay, the Centre for Internet and Society</p>
<p>Dr. Usha Ramanathan, Legal Researcher</p>
<p><em>Note: This list is only indicative, and not exhaustive.</em></p>
<hr />
<p><a name="ftn1"><strong>[1]</strong></a> Civil Appeal No. 4853 of 2014</p>
<p><a name="ftn2"><strong>[2]</strong></a> WP(C) 494/2012</p>
<p><a name="ftn3"><strong>[3]</strong> </a>. WP(C) 829/2013</p>
<p><a name="ftn4"><strong>[4]</strong></a> WP(C) 833/2013</p>
<p><a name="ftn5"><strong>[5]</strong></a> WP (C) 37/2015; (Earlier intervened in the Aruna Roy petition in 2013)</p>
<p><a name="ftn6"><strong>[6]</strong></a> WP (C) 932/2015</p>
<p><a name="ftn7"><strong>[7]</strong></a> Transferred from Madras HC 2013.</p>
<p style="text-align: justify;"><a name="ftn8"><strong>[8]</strong></a> SLP (Crl) 2524/2014 filed against the order of the Goa Bench of the Bombay HC in CRLWP 10/2014 wherein the High Court had directed UIDAI to share biometric information held by them of all residents of a particular place in Goa to help with a criminal investigation in a case involving charges of rape and sexual assault.</p>
<p><a name="ftn9"><strong>[9]</strong></a> See :http://scroll.in/article/806243/rajasthan-presses-on-with-aadhaar-after-fingerprint-readers-fail-well-buy-iris-scanners</p>
<p> </p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/blog/report-on-understanding-aadhaar-and-its-new-challenges'>http://editors.cis-india.org/internet-governance/blog/report-on-understanding-aadhaar-and-its-new-challenges</a>
</p>
No publisherJapreet Grewal, Vanya Rakesh, Sumandro Chattapadhyay, and Elonnai HickockBig DataData SystemsPrivacyResearchers at WorkInternet GovernanceAadhaarWelfare GovernanceBiometricsBig Data for DevelopmentUID2019-03-16T04:42:52ZBlog EntryBig Data Governance Frameworks for 'Data Revolution for Sustainable Development'
http://editors.cis-india.org/internet-governance/blog/big-data-governance-frameworks-for-data-revolution-for-sustainable-development
<b>A key component of the process to achieve the Sustainable Development Goals is the call for a global 'data revolution' to better understand, monitor, and implement development interventions. Recently there has been several international proposals to use big data, along with reconfigured national statistical systems, to operationalise this 'data revolution for sustainable development.' This analysis by Meera Manoj highlights the different models of collection, management, sharing, and governance of global development data that are being discussed.</b>
<p> </p>
<p><strong>1.</strong> <a href="#1">What are the Sustainable Development Goals?</a></p>
<p><strong>2.</strong> <a href="#2">The Need for a Data Revolution</a></p>
<p><strong>3.</strong> <a href="#3">Big Data: Characteristics and Use for Development</a></p>
<p><strong>3.1.</strong> <a href="#3-1">Characteristics of Big Data</a></p>
<p><strong>3.2.</strong> <a href="#3-2">Using Big Data for Development</a></p>
<p><strong>4.</strong> <a href="#4">Sustainable Development and Data Rights</a></p>
<p><strong>5.</strong> <a href="#5">Governance Frameworks Proposed</a></p>
<p><strong>5.1.</strong> <a href="#5-1">UN Sustainable Development Solutions Network</a></p>
<p><strong>5.2.</strong> <a href="#5-2">The UN DATA Revolution Group</a></p>
<p><strong>5.3.</strong> <a href="#5-3">Organization for Economic Co-Operation and Development</a></p>
<p><strong>5.4.</strong> <a href="#5-4">The Global Partnership for Sustainable Development of Data</a></p>
<p><strong>5.5.</strong> <a href="#5-5">The World Economic Forum (WEF)</a></p>
<p><strong>5.6.</strong> <a href="#5-6">Dr. Julia Lane - A Quadruple Data Helix</a></p>
<p><strong>5.7.</strong> <a href="#5-7">Data Pop Alliance</a></p>
<p><strong>6.</strong> <a href="#6">Conclusion</a></p>
<p><strong>7.</strong> <a href="#7">Endnotes</a></p>
<p><strong>8.</strong> <a href="#8">Author Profile</a></p>
<hr />
<p>Speaking on Big Data, Dan Ariely commented that, "<em>Everyone talks about it, nobody really knows how to do it, and everyone thinks everyone else is doing it, so everyone claims they are doing it</em>" <strong>[1]</strong>. This offers a useful insight into the lack of adequate discourse on the kind of governance and accountability frameworks that are needed to facilitate the developmental, sustainable, and responsible uses of big data.</p>
<p>In light of the recent international proposals to use big data to track the Sustainable Development Goals, this paper highlights the different models of management, sharing, and governance of data that are being discussed, and concurrently, how they conceptualise the various rights around big data and how are they to be protected.</p>
<p> </p>
<h2 id="1">1. What are the Sustainable Development Goals?</h2>
<p>The Sustainable Development Goals, otherwise known as the Global Goals, build on the Millennium Development Goals (MDGs). Adopted on 1 January 2016, these universally applicable 17 goals of the 2030 Agenda for Sustainable Development, seek to end all forms of poverty, fight inequalities, tackle climate change and address a range of social needs like education, health, social protection and job opportunities over the next 15 years <strong>[2]</strong>.</p>
<p> </p>
<img src="https://raw.githubusercontent.com/cis-india/website/master/img/big-data-gov-framework_un-sdg.png" alt="Sustainable Development Goals" />
<h6>Source: UN Data Revolution Group, <em><a href="http://www.undatarevolution.org/wp-content/uploads/2014/12/A-World-That-Counts2.pdf">A World that Counts</a></em>, 2014, p.12.<br /></h6>
<p> </p>
<h2 id="2">2. The Need for a Data Revolution</h2>
<p>An overwhelming cause of concern regarding the precursor to the SDGs, the MDGs, is the data unavailability to monitor their progress. For instance, the figure below indicates that there is no five-year period when the availability of MDG related data is more than 70% of what is required. Entire groups of people and key issues remain invisible <strong>[3]</strong>. Lack of data is not only a problem for global statisticians, but also for people whose needs and demands remain invisible due to lack of quantitative representation of the same. For instance, the incidences of gender related crimes when not recorded could lead to a misconception on the achievement of the MDG of gender equality.</p>
<img src="https://raw.githubusercontent.com/cis-india/website/master/img/big-data-gov-framework_undrg_mdg-data.png" alt="UN Stats - Percentage of MDG data currently available for developing countries by nature of source." />
<h6>Source: UN, <a href="http://i0.wp.com/www.un.org/sustainabledevelopment/wp-content/uploads/2015/12/english_SDG_17goals_poster_all_languages_with_UN_emblem_1.png">Sustainable Development Goals</a>.<br /></h6>
<p>As the new goals (SDGs) cover a wider range of issues it is clear that a far higher level of detail is required. To this effect the High-Level Panel of Eminent Persons on the post-2015 agenda has called for a "data revolution for sustainable development" <strong>[4]</strong>.</p>
<p>The world is experiencing a Data Revolution and a "data deluge." One estimate has it that 90% of the data in the world has been created in the last 2 years. As Eric Schmidt of Google in 2010 famously said, "<em>There were 5 exabytes of information created between the dawn of civilization through 2003, but that much information is now created every 2 days</em> <strong>[5]</strong>.</p>
<p>In its report <em>A World that Counts</em>, the UN Data Revolution Group defines the data revolution as an explosion in the volume of data, the speed with which data are produced, the number of producers of data, the dissemination of data, and the range of things on which there is data, coming from new technologies such as mobile phones and the “internet of things”, and from other sources, such as qualitative data, citizen-generated data and perceptions data <strong>[6]</strong>.</p>
<p>This data revolution in the context of sustainable development has been defined by the UN Secretary General’s Independent Expert Advisory Group (IEAG) as follows:</p>
<blockquote>[T]he integration of data coming from new technologies with traditional data in order to produce relevant high‐quality information with more details and at higher frequencies to foster and monitor sustainable development. This revolution also entails the increase in accessibility to data through much more openness and transparency, and ultimately more empowered people for better policies, better decisions and greater participation and accountability, leading to better outcomes for the people and the planet <strong>[7]</strong>.</blockquote>
<p>The majority of such “data coming from new technologies” is what can be called big data. It is data being generated in real-time, in high velocity and volume, in a variety of forms and formats, and on an increasing range of phenomenon that are being mediated by digital technologies – from governance to human communication. Further, a good part of such big data is not about the content of the phenomenon concerned but about its process – for example, Call Detail Records are generated for each mobile phone call a person makes and it contains data about the process of the call (time, location, duration, recipient, etc.) but not about the content of the call. Big data about various governmental and human processes are becoming a crucial instrument for documenting and monitoring of the same.</p>
<p> </p>
<h2 id="3">3. Big Data: Characteristics and Use for Development</h2>
<h3 id="3-1">3.1. Characteristics of Big Data</h3>
<p>The simplest definition of big data is that it is a dataset of more than 1 petabyte. The US Bureau of Labour Statistics terms it to be non-sampled data, characterized by the creation of databases from electronic sources whose primary purpose is something other than statistical inference <strong>[8]</strong>.</p>
<p>The characteristics which broadly distinguish Big Data are sometimes called the “3 V’s”: more volume, more variety and higher rates of velocity <strong>[9]</strong>. Big data sources generally share some or all of these features <strong>[10]</strong>:</p>
<ul><li>Digitally generated,</li>
<li>Passively produced,</li>
<li>Automatically collected,</li>
<li>Geographically or temporally trackable, and</li>
<li>Continuously analysed.</li></ul>
<p>Increasingly, Big Data is recognised as creating "new possibilities for international development" <strong>[11]</strong>. It could provide faster, cheaper, more granular data and help meet growing and changing demands. It was claimed, for example, that "<em>Google knows or is in a position to know more about France than INSEE</em>" <strong>[12]</strong>, its highly resourceful national statistical agency. To illustrate, Global Pulse gives the example of a hypothetical small household facing soaring commodity prices, particularly food and fuel <strong>[13]</strong>. They have the options of:</p>
<ul><li>Getting part of their food at a nearby World Food Programme distribution centre,</li>
<li>Reducing mobile usage,</li>
<li>Temporarily taking their children out of school,</li>
<li>Calling a health hotline when children show signs of malnutrition related diseases, and</li>
<li>Venting about their frustration on social media.</li></ul>
<p>Such a systemic shock of food insecurity will prompt thousands of households to react in roughly similar ways. These collective behavioural changes may show up in different digital data sources:</p>
<ul><li>WFP might record that it serves twice as many meals a day,</li>
<li>The local mobile operator may see reduced usage,</li>
<li>UNICEF data may indicate that school attendance has dropped,</li>
<li>Health hotlines might see increased volumes of calls reporting malnutrition, and</li>
<li>Tweets mentioning the difficulty to “afford food” might begin to rise.</li></ul>
<p>Thus the power of real-time, digital data to predict paths for development is immense. Amassing such a large volume of data which tracks practically every aspect of social behavious can revolutionize the field of official statistics and policy making.</p>
<p>Two points to be noted are: 1) all these data sources are not available for comparison in the real-time by default, so one task before using big data in developmental work is to make data from different sources available across agencies and make them comparable, and 2) finding repeating patterns within large data sets, sourced from varied origins, can not only allow for monitoring but also (statistically) predicting future possibilities and implications for development action.</p>
<h3 id="3-2">3.2. Using Big Data for Development</h3>
<p>There are several international organizations attempting to use such data.</p>
<p>Global Pulse, a United Nations initiative, launched by the Secretary-General in 2009, seeks to leverage innovations in digital data, rapid data collection and analysis to help decision-makers gain a real-time understanding of how crises impact vulnerable populations. To this end, Global Pulse is establishing an integrated, global network of Pulse Labs, anchored in Pulse Lab New York, to pilot the approach at country level <strong>[14]</strong>.</p>
<p>The Global Working Group on Big Data for Official Statistics, created in May 2014, pursuant to Statistical Commission, makes an inventory of ongoing activities and examples regarding the use of big data, addresses concerns related to methodology, human resources, quality and confidentiality, and develops guidelines on classifying various types of big data sources <strong>[15]</strong>.</p>
<p>There have been applications even on a national and individual level. For instance, in 2013, various sources reported that the CIA had admitted to the “full monitoring of Facebook, Twitter, and other social networks” to identify links between events and sequences or paths leading to national security threats, ultimately leading to forecasting future activities and events <strong>[16]</strong>.</p>
<p>In the field of conflict prevention is the emerging applications to map and analyse unstructured data generated by politically active Internet use by academics, activists, civil society organizations, and even general citizens. In reference to Iran’s post-election crisis beginning in 2009, it is possible to detect web-based usage of terms that reflect a general shift from awareness towards mobilization, and eventually action within the population <strong>[17]</strong>.</p>
<p>The "Big Data, Small Credit" report proposes that financial inclusion can be promoted by allowing consumers with mobile phones to access credit formally as customers <strong>[18]</strong>.</p>
<p>At a national level, the biggest challenge for most big data projects is the limited or restricted access the government agencies have to potential big data sets owned by the private sector <strong>[19]</strong>. The overall consensus is that Big Data to track SDGs must complement traditional data sources <strong>[20]</strong>. This is because big data may not always be available for the entire population, or include a diverse enough sample of the population. Moreover most big data projects measure development indicators through a correlation which may not always be correct unlike official data. For instance big data might help in predicting lowered household income through reducing mobile bills while traditional data directly collects income statistics.</p>
<p>In a survey by the Global Working Group on Big Data for Official Statistics <strong>[21]</strong>, it was found that only a few countries have developed a long-term vision for the use of big data, while many are formulating a big data strategy. Most countries have not yet defined business processes for integrating big data sources and results into their work and do not have a defined structure for managing big data projects.</p>
<p>Thus there exists a need to identify a governance framework for big data for sustainable development, not only at national level, but also at the international level.</p>
<p> </p>
<h2 id="4">4. Sustainable Development and Data Rights</h2>
<p>Any discussion on governance frameworks would be incomplete without defining the kind of data rights they must seek to protect.</p>
<p>In the famous parable of the six blind men and the elephant they conclude that the elephant is like a wall, snake, spear, tree, fan or rope, depending upon where they touch. Similarly Internet experiences of individual users (what they touch) often contrast drastically with different views (what they conclude) on what would constitute data rights.</p>
<p>The IEAG in its report has identified the following set of data related rights, but has not defined any actual framework or process for ensuring them (yet) <strong>[22]</strong>:</p>
<ul><li>Right to be counted,</li>
<li>Right to an identity,</li>
<li>Right to privacy and to ownership of personal data,</li>
<li>Right to due process (for example when data is used as evidence in proceedings, or in administrative decisions),</li>
<li>Freedom of expression,</li>
<li>Right to participation,</li>
<li>Right to non-discrimination and equality, and</li>
<li>Principles of consent.</li></ul>
<p>Personal data is broadly defined as "<em>any information relating to an identified or identifiable individual</em>" <strong>[23]</strong>. Often primary data producers (users of services and devices generating data) are unaware of individual privacy infringements <strong>[24]</strong>.</p>
<p>A survey by the Global Working Group on Big Data for Official Statistics found that only a few countries have a specific privacy framework for big data, while most apply the privacy framework for traditional statistics to big data as well <strong>[25]</strong>.</p>
<p>Conventionally, safeguards against the re-use of big data to protect data rights have involved the “anonymization” or “de-identification” of data, to conceal individual identities. Global Pulse, for instance, is putting forth the concept of Data Philanthropy, whereby "<em>corporations take the initiative to anonymize (strip out all personal information) their data sets and provide this data to social innovators to mine the data for insights, patterns and trends in real-time or near real-time</em>" <strong>[26]</strong>. There however exists a debate on whether data can actually be anonymized effectively. Several state that data can never be effectively de-anonymized due to technological challenges <strong>[27]</strong>. For instance, when the New York City government released de-anonymised data sets of New York cab drivers were made re-identifiable by approaching a separate method. Within less than 2 hours work, researchers knew which driver drove every single trip in this entire dataset. It would be even be easy to calculate drivers’ gross income, or infer where they live <strong>[28]</strong>.</p>
<p>Even the OECD opines that the current model of limiting identifiability of individuals is unsustainable. It recommends moving towards one where the focus is on transparency around how data is being used, rather than preventing specific types of use, stating that - "<em>research funding agencies and data protection authorities should collaborate to develop an internationally recognized framework code of conduct covering the use of new forms of personal data, particularly those generated via network communication. This framework, built on best practice procedures for consent from data subjects, data sharing and re-use, anonymization methods, etc., could be adapted as necessary for specific national circumstances</em>" <strong>[29]</strong>.</p>
<p>Thus, there is a push for the arguement that the historical approaches to protecting privacy and confidentiality — namely, <em>informed consent</em> and <em>anonymity</em> — no longer hold <strong>[30]</strong>. Some have even suggested using big data itself to keep track of user permissions for each piece of data to act as a legal contract <strong>[31]</strong>.</p>
<p>There is an overall consensus that any legal or regulatory mechanisms set up to mobilise the 'data revolution for sustainable development' should protect the data rights of the people <strong>[32]</strong>, without any clear agreement on what these rights may be.</p>
<p> </p>
<h2 id="5">5. Governance Frameworks Proposed</h2>
<p>A largely unanswered question that is posed in light of the emerging consensus on the use of Big Data for monitoring SDGs is within what sort of governance frameworks these data collection and analysis methods will operate. Methods of collection and the key actors involved in data analysis, management, storage and coordination. The role of NGOs and CSOs, if any, within these systems must be delineated. Certain key global organizations and eminent researchers have suggested the following models.</p>
<h3 id="5-1">5.1. UN Sustainable Development Solutions Network</h3>
<p>In 2012, the UN Secretary-General launched the UN Sustainable Development Solutions Network (SDSN) to mobilize global scientific and technological expertise to promote practical problem solving for sustainable development, including the design and implementation of the Sustainable Development Goals (SDGs) <strong>[33]</strong>. It has proposed the following.</p>
<p><strong>Collection</strong></p>
<p>The Inter-Agency and Expert Group on Sustainable Development Goal Indicators (IAEGSDG) and the United Nations Statistical Commission are to establish roadmaps for strengthening specific data collection tools that enable the monitoring of SDG indicators.</p>
<p><strong>Analysis</strong></p>
<p>Based on discussions with a large number of statistical offices, including Eurostat, BPS Indonesia, the OECD, the Philippines, the UK, and many others, 100 is recommended to be the maximum number of global indicators to analyse data for which NSOs can report and communicate effectively in a harmonized manner. This conclusion was strongly endorsed during the 46th UN Statistical Commission and the Expert Group Meeting on SDG indicators <strong>[34]</strong>.</p>
<p>Specialist indicators developed by thematic communities must be used for data analysis as they include input and process metrics that are helpful complements to official indicators, which tend to be more outcome-focused. For example, the UN Inter-Agency Group on Child Mortality Estimation has developed a specialist hub responsible for analysing, checking, and improving mortality estimation. This is a leading source for child morality information for both governments and non-governmental actors <strong>[35]</strong>.</p>
<p>Research arms of private companies such as Microsoft Research, IBM research, SAS, and R&D arms of telecom companies could directly partner with official statistical systems to share sophisticated analysing techniques <strong>[36]</strong>.</p>
<p><strong>Management</strong></p>
<p>Four levels of monitoring, national, regional, global, and thematic, should be "<em>organized in an integrated architecture</em>" <strong>[37]</strong>.</p>
<p>Countries must decide individually whether official data must be complemented with non-official indicators from big data which can add richness to the monitoring of the SDGs.</p>
<p>Where possible, regional monitoring should build on existing regional mechanisms, such as the Regional Economic Commissions, the Africa Peer Review Mechanism, or the Asia-Pacific Forum on Sustainable Development <strong>[38]</strong>.</p>
<p>To coordinate thematic monitoring under the SDGs, each thematic initiative may have one or more lead specialist agencies or “custodians” as per the IAEG-MDG monitoring processes. Lead agencies would be responsible for convening multi-stakeholder groups, compiling detailed thematic reports, and encouraging ongoing dialogues on innovation. These thematic groups can become testing grounds in launching a data revolution for the SDGs, trialling new measurements and metrics that in time can feed into the global monitoring process with annual reports <strong>[39]</strong>.</p>
<img src="https://raw.githubusercontent.com/cis-india/website/master/img/big-data-gov-framework_unsdsn_monitoring.png" alt="UN Sustainable Development Solutions Network - Schematic illustration with explanation of the indicators for national, regional, global, and thematic monitoring." />
<h6>Schematic illustration with explanation of the indicators for national, regional, global, and thematic monitoring.<br />Source: UN Sustainable Development Solutions Network, <em><a href="http://unsdsn.org/wp-content/uploads/2015/05/150612-FINAL-SDSN-Indicator-Report1.pdf">Indicators and a Monitoring Framework for the Sustainable Development Goals: Launching a Data Revolution for the SDGs</a></em>, 2015, p.3.<br /></h6>
<p><strong>Role of NSOs</strong></p>
<p>Monitoring the SDG agenda will require substantive improvements in national statistical capacity. Assessments of existing capacity to fulfil SDG monitoring expectations must be undertaken and needs be integrated into National Strategies for the Development of Statistics (NSDSs) <strong>[40]</strong>.</p>
<p><strong>Coordination</strong></p>
<p>A Global Partnership for Sustainable Development Data must be established and a World Forum on Sustainable Development Data be convened in 2016 to create mechanisms for ongoing collaboration and innovation.</p>
<p>A high-level, powerful group of businesses and states must convene the various data and transparency sustainable development initiatives under one umbrella.</p>
<p>To ensure comparability, Global Monitoring Indicators must be harmonized across countries by one lead technical or specialist agency which will additionally coordinate data standards and collection and provide technical support.</p>
<p>The following table indicates the suggested Lead Agencies for individual SDGs <strong>[41]</strong>.</p>
<table>
<tbody>
<tr>
<td><strong>Number</strong></td>
<td><strong>Sustainable Development Goal</strong></td>
<td><strong>Lead Agencies</strong></td>
</tr>
<tr>
<td>1.</td>
<td>No Poverty</td>
<td>World Bank, UNDP, UNSD, UNICEF, ILO, FAO, UN-Habitat, UNISDR, WHO, CRED, UNFPA, and UN Population Division</td>
</tr>
<tr>
<td>2.</td>
<td>No Hunger</td>
<td>FAO, WHO, UNICEF, and Internal Fertilizer Industry Associaton (IFA)</td>
</tr>
<tr>
<td>3.</td>
<td>Good Health</td>
<td>WHO, UN Population Division, UNICEF, World Bank, GAVI, UN AIDS, and UN-Habitat</td>
</tr>
<tr>
<td>4.</td>
<td>Quality Education</td>
<td>UNESCO, UNICEF, and World Bank</td>
</tr>
<tr>
<td>5.</td>
<td>Gender Equality</td>
<td>UNICEF, UN Women, WHO, UNSD, ILO, UN Population Division, and UNFPA</td>
</tr>
<tr>
<td>6.</td>
<td>Clean Water and Sanitation</td>
<td>WHO/UNICEF Joint Monitoring Programme (JMP), FAO, UN Water, and UNEP</td>
</tr>
<tr>
<td>7.</td>
<td>Renewable Energy</td>
<td>Sustainable Energy for All, IEA, WHO, World Bank, and UNFCC</td>
</tr>
<tr>
<td>8.</td>
<td>Good Jobs and Economic Growth</td>
<td>IMF, World Bank, UNSD, and ILO</td>
</tr>
<tr>
<td>9.</td>
<td>Innovation and Infrastructure</td>
<td>World Bank, OECD, UNIDO, UNFCC, UNESCO, and ITU</td>
</tr>
<tr>
<td>10.</td>
<td>Reduced Inequalities</td>
<td>UNSD, World Bank, and OECD</td>
</tr>
<tr>
<td>11.</td>
<td>Sustainable Cities and Communities</td>
<td>UN-Habitat, Global City Indicators Facility, WHO, CRED, UNISDR, FAO, and UNEP</td>
</tr>
<tr>
<td>12.</td>
<td>Responsible Consumption</td>
<td>EITI, UNCTAD, UN Global Compact, FAO, UNEP Ozone Secretariat, WBCSD, GRI, IIRC, and Global Compact</td>
</tr>
<tr>
<td>13.</td>
<td>Climate Action</td>
<td>OECD DAC, UNFCCC, and IEA</td>
</tr>
<tr>
<td>14.</td>
<td>Life below Water</td>
<td>UNEP-WCMC, IUCN, and FMC</td>
</tr>
<tr>
<td>15.</td>
<td>Life on Land</td>
<td>FAO, UNEP, IUCN, and UNEP- WCMC</td>
</tr>
<tr>
<td>16.</td>
<td>Peace and Justice</td>
<td>UNODC, WHO, UNOCHA, UNCHR, IOM, OCHA, OECD, UN Global Compact, EITI, UNCTAD, UNICEF, UNESCO, and Transparency International</td>
</tr>
<tr>
<td>17.</td>
<td>Partnership for the Goals</td>
<td>BIS, IASB, IFRS, IMF, WIPO, WTO, UNSD, OECD, World Bank, OECD DAC, and SDSN</td>
</tr>
</tbody>
</table>
<h3 id="5-2">5.2. The UN DATA Revolution Group</h3>
<p>The group constituted by the UN Secretary-General Ban Ki-moon in August 2014, is an Independent Expert Advisory Group with the aim of making concrete recommendations on bringing about a 'data revolution for sustainable development' <strong>[42]</strong>. In its report, <em>A World that Counts</em>, it makes the following recommendations <strong>[43]</strong>.</p>
<p><strong>Collection</strong></p>
<p>Clear standards on data collection methods must be developed based on the UN Fundamental Principles of Official Statistics. Periodic audits must be conducted by professional and independent third parties to ensure data quality.</p>
<p>Governments, civil society, academia and the philanthropic sector must work together strengthening statistical literacy so that all people have capacity to input into and evaluate the quality of data.</p>
<p>Social entrepreneurs, private sector, academia, media, civil society and other individuals and institutions must be engaged globally with incentives (prizes, data challenges) to encourage data sharing.</p>
<p><strong>Analysis</strong></p>
<p>A SDGs Analysis and Visualisation Platform is to be set up for fostering private-public partnerships and community-led peer-production efforts for data analysis.</p>
<p>A dashboard on ”the state of the world” will engage the UN, think-tanks, academics and NGOs in analysing, and auditing data.</p>
<p>Academics and scientists are to analyse data to provide long-term perspectives, knowledge and data resources at all levels.</p>
<p>The “Global Forum of SDG-Data Users” will ensure feedback loops between data producers, processors and users to improve the usefulness of data and information produced.</p>
<p>A “SDGs data lab” to support the development of a first wave of SDG indicators is to be established mobilizing key public, private and civil society data providers, academics and stakeholders working with the Sustainable Development Solutions Network.</p>
<p><strong>Storage</strong></p>
<p>A “world statistics cloud” will store data and metadata produced by different institutions but according to common standards, rules and specifications.</p>
<p><strong>Role of NSOs</strong></p>
<p>Civil society organisations must share data and processing methods with private and public counterparts on the basis of agreements. They must hold governments and companies accountable using evidence on the impact of their actions, provide feedback to data producers, develop data literacy and help communities and individuals generate and use data.</p>
<p>NSOs are the central players of the Data Revolution. Their autonomy must be strengthened to maintain data quality. They must abandon expensive and cumbersome production processes, incorporate new data sources like big data that is human and machine-readable, compatible with geospatial information systems and available quickly enough to ensure that the data cycle matches the decision cycle. Collaborations with the private sector can boost technical and financial investments.</p>
<p><strong>Coordination</strong></p>
<p>Key stakeholders must create a “Global Consensus on Data”, to adopt principles concerning legal, technical, privacy, geospatial and statistical standards. Best practices related to public data such as the Open Government Partnership (OGP) and the G8 Open Data Charter are recommended foundations for such principles.</p>
<p>A UN-led “Global Partnership for Sustainable Development Data” is proposed, to coordinate and broker key global public-private partnerships for data sharing <strong>[44]</strong>.</p>
<p>A “World Forum on Sustainable Development Data” and “Network of Data Innovation Networks” will be a converging point for the data ecosystem to share ideas and experiences for improvements, innovation and technology transfer.</p>
<h3 id="5-3">5.3. Organization for Economic Co-Operation and Development (OECD)</h3>
<p>The Organisation for Economic Co-operation and Development (OECD) is an inter-governmental organization that seeks to promote policies that will improve the economic and social well-being of people globally. It has made the following proposals <strong>[45]</strong>.</p>
<p><strong>Collection</strong></p>
<p>Data is to be collected from National statistical agencies, national and international researchers and international organisations.</p>
<p><strong>Role of NSOs</strong></p>
<p>By leveraging the expertise of telecommunications companies and software developers, for instance, national statistical systems could potentially reduce costs and improve the availability of data to monitor development goals <strong>[46]</strong>.</p>
<p><strong>Coordination</strong></p>
<p>National Data Forums for Social Science Data must be created for the development of social science data for improved coordination between social scientists, data producers (national statistical agencies, government departments, large private sector businesses and sources undertaking academic direction), and data curators.</p>
<p>Social science research communities must contribute to national plans of action after a needs assessment <strong>[47]</strong>. Research funding agencies must collaborate at the international level for a common system for referencing datasets in research publications <strong>[48]</strong>.</p>
<h3 id="5-4">5.4. The Global Partnership for Sustainable Development of Data</h3>
<p>The partnership is a global network of governments, NGOs, and businesses working to strengthen the inclusivity, trust, and innovation in the way that data is used to address the world’s sustainable development efforts <strong>[49]</strong>.</p>
<p><strong>Analysis</strong></p>
<p>There must be a common framework for information processing. At minimum, a simple lexicon must tag each datum specifying:</p>
<ul><li><strong>What:</strong> i.e. the type of information contained in the data,</li>
<li><strong>Who:</strong> the observer or reporter,</li>
<li><strong>How:</strong> the channel through which the data was acquired,</li>
<li><strong>How much:</strong> whether the data is quantitative or qualitative, and</li>
<li><strong>Where and when:</strong> the spatio-temporal granularity of the data.</li></ul>
<p>Analysis of data involves filtering relevant information, summarising keywords and categorising into indicators. This intensive mining of socioeconomic data, known as “reality mining,” can be done by: (1) Continuous analysis of real time streaming data, (2) Digestion of semi-structured and unstructured data to determine perceptions, needs and wants. (3) Real-time correlation of streaming data with slowly accessible historical data repositories.</p>
<p>Use of big data for developmental goals can draw upon all three techniques to various degrees depending on availability of data and the specific needs.</p>
<p><strong>Role of NSOs</strong></p>
<p>NSOs have a pivotal part to play in the data revolution. Countries and organizations believe that big data cannot replace traditional official statistical data as it is based more on perception than facts. To quote Winston Churchill, "<em>Do not trust any statistics that you did not fake yourself</em>."</p>
<p>For instance, a study found that Google Flu Trends, to detect influenza epidemics, predicted nonspecific flu-like respiratory illnesses well but not actual flu. The mismatch was due to popular misconceptions on influenza symptoms. This has important policy implications. Doctors using Google Flu Trends may overstock on flu vaccines or be overly inclined to diagnose normal respiratory illnesses as influenza <strong>[50]</strong>.</p>
<p>However Big Data if understood correctly, can inform where further targeted investigation is necessary and give immediate responses to favourably change outcomes.</p>
<h3 id="5-5">5.5. The World Economic Forum (WEF)</h3>
<p>The WEF is an International Organization for Public-Private Cooperation. It engages the foremost political, business and other leaders of society to shape global, regional and industry agendas <strong>[51]</strong>. In the report titled <em>Big Data, Big Impact: New Possibilities for International Development</em>, it makes the following recommendations <strong>[52]</strong>.</p>
<p><strong>Collection</strong></p>
<p>Data production and development actors include individuals, public sector and the private sector. Each produce different kinds of data that have unique requirements. The private sector maintains vast troves of transactional data, much of which is "data exhaust," or data created as a by-product of other transactions. The public sector maintains enormous datasets in the form of census data, health indicators, and tax and expenditure information. The following figure highlights the different kinds of data that each sector collects and what incentives they have to share the data along with requirements to maintain such data.</p>
<img src="https://raw.githubusercontent.com/cis-india/website/master/img/big-data-gov-framework_wef_01.png" alt="" />
<h6>World Economic Forum - Diagram on Data Commons.<br />
Source: World Economic Forum, <em><a href="http://www3.weforum.org/docs/WEF_TC_MFS_BigDataBigImpact_Briefing_2012.pdf">Big Data, Big Impact: New Possibilities for International Development</a></em>, 2012, p.4.<br /></h6>
<p>Business models must be created to provide the appropriate incentives for private-sector actors to share data. Such models already exist in the Internet environment. For instance companies in search and social networking profit from products they offer at no charge to end users because the usage data these products generate is valuable to other ecosystem actors. Similar models could be created in garnering Big Data for SDGs. The following flowchart illustrates how different sectors must work together to incentivise data collection and sharing.</p>
<img src="https://raw.githubusercontent.com/cis-india/website/master/img/big-data-gov-framework_wef_02.png" alt="" />
<h6>World Economic Forum - Diagram on Global Coordination.<br />
Source: World Economic Forum, <em><a href="http://www3.weforum.org/docs/WEF_TC_MFS_BigDataBigImpact_Briefing_2012.pdf">Big Data, Big Impact: New Possibilities for International Development</a></em>, 2012, p.7.<br /></h6>
<h3 id="5-6">5.6. Dr. Julia Lane - A Quadruple Data Helix</h3>
<p>Dr. Julia Lane is a Professor in the Wagner School of Public Policy at New York University; and also a Provostial Fellow in Innovation Analytics and a Professor in the Center for Urban Science and Policy <strong>[53]</strong>. She has done extensive research on the uses of big data. In her paper titled "Big Data for Public Policy: A Quadruple Data Helix," she makes the following suggestions <strong>[54]</strong>.</p>
<p><strong>Collection</strong></p>
<p>In the future there will exist a model of a quadruple data helix for data collection which will have four strands — state and city agencies, universities, private data providers, and federal agencies.i</p>
<p>A new set of institution, city/university data facilities, must be established. These institutions should form the backbone of the quadruple helix, with direct connections to the private sector and to the federal statistical agencies.</p>
<p><strong>Analysis</strong></p>
<p>There is a need for graduate training for non-traditional students, who need to understand how to use data science tools as part of their regular employment. They must identify and capture the appropriate data, understand how data science models and tools can be applied, and determine how associated errors and limitations can be identified from a social science perspective.i</p>
<p>Universities can act as a trusted independent third party to process, store, analyze, and disseminate data. ii</p>
<p><strong>Management</strong></p>
<p>The new infrastructure must ensure that data from disparate sources are collected managed and used in a manner that is informed by end users. There are many technical challenges: disparate data sets must be ingested, their provenance determined, and metadata documented. Researchers must be able to query data sets to know what data are available and how they can be used. And if data sets are to be joined, they must be joined in a scientific manner, which means that workflows need to be traced and managed in such a way that the research can be replicated.</p>
<p><strong>Coordination</strong></p>
<p>The role of State and City agencies is to address immediate policy issues, rather than to build long-term data infrastructures as their mandate is to work with city data than the full spectrum of available data.</p>
<h3 id="5-7">5.7. Data-Pop Alliance</h3>
<p>Data-Pop Alliance is a global coalition on Big Data and development created by the Harvard Humanitarian Initiative, MIT Media Lab, and Overseas Development Institute that brings together researchers, experts, practitioners, and activists to promote a people-centred big data revolution through collaborative research, capacity building, and community engagement <strong>[55]</strong>. It makes the following suggestions.</p>
<p><strong>Collection</strong></p>
<p>The idea of <em>shared responsibility</em> between the public and private sector is a proposed operational principles to create a deliberative space. Mechanisms and legal frameworks must be devised for private companies to share their big data under formalized and stable arrangements instead of being compelled by ad hoc requests from researchers and policymakers.</p>
<p>The media too, could avoid publishing statistical data collected by unexplained methodologies by employing "statistical editors" and disseminate verified information.</p>
<p><strong>Role of NSOs</strong></p>
<p>For official statistics, engaging with Big Data is not a technical consideration but a political obligation. In a two tier system of official and non-official statistics, the public and investors tend to distrust official figures. For instance, the results of the 2010 census in the UK are being disputed on the basis of sewage data.</p>
<p>It is imperative for NSOs to retain, or regain, their primary role as the legitimate custodian of knowledge and creator of a deliberative public space to democratically drive human development <strong>[56]</strong>.</p>
<p> </p>
<h2 id="6">6. Conclusion</h2>
<p>The Big data frameworks provide some useful insights on monitoring mechanisms though some questions remain unanswered in each model. Key actors that have been proposed include city and state agencies like NSOs, private companies, social scientists, private individuals and international research agencies. Data analysis can be through public-private collaborations, data philanthropy, and using indicators by thematic communities.</p>
<p><strong>Collection</strong></p>
<p>There appears consensus across models that collection must be effected through public private partnerships while providing incentives.</p>
<p><strong>Analysis</strong></p>
<p>While several methods of analysis have been proposed by the Global Partnership it is unclear on who will be conducting the analysis. The UNSDSN has suggested that it be conducted by academics and scientists with Julia Lane stating it must be through public private partnerships which appear more feasible and transparent.</p>
<p><strong>Role of NSOs</strong></p>
<p>All frameworks agree on the pivotal role of NSOs and acknowledge them as the key players and coordinators at the national level. They must be strengthened financially, technologically and politically. Most frameworks seek to empower national agencies which will coordinate collaborations with the private sector through incentives while protecting personal data.</p>
<p><strong>Coordination</strong></p>
<p>Several international fora have been proposed to enable coordination while there is consensus that the NSOs. A Global Partnership for Sustainable Development Data, a Global Consensus on Data and a World Forum on Sustainable Development Data have been suggested. UN organizations appear to be suggesting more responsibility for those in the UN framework with UNSDSN giving an extensive list of lead agencies (UNDP, UN Women, Who etc) while the WEF emphasises on the private sector, Data Pop Alliance on NSOs, and Prof. Lane on State and City agencies.</p>
<p>On an international level countries can opt to join international organization that are being setup for the purpose. It remains to be seen whether all countries globally can achieve such a feat in a coordinated manner without infringing on data rights when unanswerable to any set international organization. The burden appears to fall on civil society and market forces within the private sector to regulate this process. For instance when a private sector company starts providing large un-anonymized data sets for government use, the privacy concerns of civil society that result in them opting for the company’s competitor’s more privacy friendly products will result in a regulation through market forces. However these forces may have disparate strengths in different contexts and countries depending on market practices and information asymmetry resulting in the lack of a uniform accountability mechanism.</p>
<p> </p>
<h2 id="7">7. Endnotes</h2>
<p><strong>[1]</strong> Dan Ariely, Facebook, January 06, 2013, <a href="https://www.facebook.com/dan.ariely/posts/904383595868">https://www.facebook.com/dan.ariely/posts/904383595868</a>.</p>
<p><strong>[2]</strong> United Nations Organizations, 'Sustainable Development Goals' (United Nations Sustainable Development, 26 September 2015), <a href="http://www.un.org/sustainabledevelopment/sustainable-development-goals/">http://www.un.org/sustainabledevelopment/sustainable-development-goals/</a>, accessed 6 June 2016.</p>
<p><strong>[3]</strong> Data Revolution Group, 'A World that Counts: Mobilising the Data Revolution for Sustainable Development' (November 2014), <a href="http://www.undatarevolution.org/wp-content/uploads/2014/12/A-World-That-Counts2.pdf">http://www.undatarevolution.org/wp-content/uploads/2014/12/A-World-That-Counts2.pdf</a>, accessed 8 June 2016.</p>
<p><strong>[4]</strong> High level panel on the post-2015 development agenda , 'A New Global Partnership: Eradicate Poverty and Transform Economies through Sustainable Development'(Post2015hlp,0rg, July 2012), <a href="http://www.post2015hlp.org/">http://www.post2015hlp.org/</a>, accessed 8 June 2016.</p>
<p><strong>[5]</strong> Gary King, 'Ensuring the Data-Rich Future of the Social Sciences' [2011] 3(2) Science, <a href="http://gking.harvard.edu/files/datarich.pdf">http://gking.harvard.edu/files/datarich.pdf</a>, accessed 8 June 2016.</p>
<p><strong>[6]</strong> See <strong>[3]</strong>.</p>
<p><strong>[7]</strong> Ibid.</p>
<p><strong>[8]</strong> Michael Horrigan, 'Big Data: A Perspective from the BLS' (Amstatorg, 1 January 2013) <a href="http://magazine.amstat.org/blog/2013/01/01/sci-policy-jan2013/">http://magazine.amstat.org/blog/2013/01/01/sci-policy-jan2013/</a>, accessed 4 June 2016.</p>
<p><strong>[9]</strong> UN Global Pulse, 'Big Data for Development: Challenges & Opportunities' (6 May 2012) <a href="http://www.unglobalpulse.org/sites/default/files/BigDataforDevelopment-UNGlobalPulseJune2012.pdf">http://www.unglobalpulse.org/sites/default/files/BigDataforDevelopment-UNGlobalPulseJune2012.pdf</a>, accessed 5 June 2016.</p>
<p><strong>[10]</strong> Emmanuel Letouzé and Johannes Jütting, 'Official Statistics, Big Data and Human Development: Towards a New Conceptual and Operational Approach' (2014) 12(3), Data-Pop Alliance White papers Series, <a href="https://www.odi.org/sites/odi.org.uk/files/odi-assets/events-documents/5161.pdf">https://www.odi.org/sites/odi.org.uk/files/odi-assets/events-documents/5161.pdf</a>, accessed 4 June 2016.</p>
<p><strong>[11]</strong> See <strong>[9]</strong>.</p>
<p><strong>[12]</strong> See <strong>[10]</strong>.</p>
<p><strong>[13]</strong> See <strong>[9]</strong>.</p>
<p><strong>[14]</strong> UN Global Pulse, 'About: United Nations Global Pulse' (2016) <a href="http://www.unglobalpulse.org/about-new">http://www.unglobalpulse.org/about-new</a>, accessed 7 June 2016.</p>
<p><strong>[15]</strong> UN Stats, 'Global Working Group' (2014) <a href="http://unstats.un.org/unsd/bigdata/">http://unstats.un.org/unsd/bigdata/</a>, accessed 8 June 2016.</p>
<p><strong>[16]</strong> New York City Press Release, ‘Mayor Bloomberg, Police Commissioner Kelly and Microsoft Unveil New, State-of-the-Art Law Enforcement Technology that Aggregates and Analyzes Existing Public Safety Data in Real Time to Provide a Comprehensive View of Potential Threats and Criminal Activity’ (New York City, 8 August 2012), <a href="http://www1.nyc.gov/office-of-the-mayor/news/291-12/mayor-bloomberg-police-commissioner-kelly-microsoft-new-state-of-the-art-law">http://www1.nyc.gov/office-of-the-mayor/news/291-12/mayor-bloomberg-police-commissioner-kelly-microsoft-new-state-of-the-art-law</a>, accessed 2 July 2016.</p>
<p><strong>[17]</strong> Francesco Mancini, 'New Technology and the Prevention of Violence and Conflict' (Reliefwebint, April 2013), <a href="http://reliefweb.int/sites/reliefweb.int/files/resources/ipi-e-pub-nw-technology-conflict-prevention-advance.pdf">http://reliefweb.int/sites/reliefweb.int/files/resources/ipi-e-pub-nw-technology-conflict-prevention-advance.pdf</a>, accessed 2 July 2016.</p>
<p><strong>[18]</strong> Arjuna Costa, Anamitra Deb, and Michael Kubzansky, 'Big Data, Small Credit: The Digital Revolution and Its Impact on Emerging Market Consumers,' (Omidyar, 3 March 2013) <a href="https://www.omidyar.com/sites/default/files/file_archive/insights/Big%20Data,%20Small%20Credit%20Report%202015/BDSC_Digital%20Final_RV.pdf">https://www.omidyar.com/sites/default/files/file_archive/insights/Big%20Data,%20Small%20Credit%20Report%202015/BDSC_Digital%20Final_RV.pdf</a>, accessed 2 July 2016.</p>
<p><strong>[19]</strong> United Nations Economic and Social Council, 'Report of the Global Working Group on Big Data for Official Statistics' (UN Stats, 3 March 2015), <a href="http://unstats.un.org/unsd/statcom/doc15/2015-4-BigData-E.pdf">http://unstats.un.org/unsd/statcom/doc15/2015-4-BigData-E.pdf</a>, accessed 8 June 2016.</p>
<p><strong>[20]</strong> Ibid.</p>
<p><strong>[21]</strong> Ibid.</p>
<p><strong>[22]</strong> See <strong>[3]</strong>.</p>
<p><strong>[23]</strong> OECD, 'OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data' (23 September 1980), <a href="http://www.oecd.org/sti/ieconomy/oecdguidelinesontheprotectionofprivacyandtransborderflowsofpersonaldata.htm">http://www.oecd.org/sti/ieconomy/oecdguidelinesontheprotectionofprivacyandtransborderflowsofpersonaldata.htm</a>, accessed 29 May 2016.</p>
<p><strong>[24]</strong> Amir Efrati, ''Like' Button Follows Web Users' (WSJ, 18 May 2011) <a href="http://www.wsj.com/articles/SB10001424052748704281504576329441432995616">http://www.wsj.com/articles/SB10001424052748704281504576329441432995616</a>, accessed 23 May 2016.</p>
<p><strong>[25]</strong> See <strong>[15]</strong>.</p>
<p><strong>[26]</strong> Robert Kirkpatrick, 'Data Philanthropy: Public and Private Sector Data Sharing for Global Resilience' (UN Global Pulse, 16 September 2011), <a href="http://www.unglobalpulse.org/blog/data-philanthropy-public-private-sector-data-sharing-global-resilience">http://www.unglobalpulse.org/blog/data-philanthropy-public-private-sector-data-sharing-global-resilience</a>, accessed 4 June 2016.</p>
<p><strong>[27]</strong> Ibid.</p>
<p><strong>[28]</strong> Arvind Narayanan, 'No silver bullet: De-identification still doesn't work' (1 April 2016), <a href="http://randomwalker.info/publications/no-silver-bullet-de-identification.pdf">http://randomwalker.info/publications/no-silver-bullet-de-identification.pdf</a>, accessed 3 July 2016.</p>
<p><strong>[29]</strong> OECD Global Science Forum, 'New Data for Understanding the Human Condition: International Perspectives,' (February 2013) <a href="http://www.oecd.org/sti/sci-tech/new-data-for-understanding-the-human-condition.pdf">http://www.oecd.org/sti/sci-tech/new-data-for-understanding-the-human-condition.pdf</a>, accessed 2 June 2016.</p>
<p><strong>[30]</strong> S. Barocas, 'The Limits of Anonymity and Consent in the Big Data Age,' in <em>Privacy, Big Data, and the public good: Frameworks for Engagement</em> (Cambridge University Press, 2014).</p>
<p><strong>[31]</strong> A. Pentland, 'Institutional Controls: The New Deal on Data,' in <em>Privacy, Big Data, and the public good: Frameworks for Engagement</em> (Cambridge University Press, 2014).</p>
<p><strong>[32]</strong> See <strong>[3]</strong>.</p>
<p><strong>[33]</strong> UN Sustainable Development Solutions Network, 'About Us: Vision and Organization' (2012) <a href="http://unsdsn.org/about-us/vision-and-organization/">http://unsdsn.org/about-us/vision-and-organization/</a>, accessed 2 June 2016.</p>
<p><strong>[34]</strong> UN Sustainable Development Solutions Network, 'Indicators and a Monitoring Framework for the Sustainable Development Goals: Launching a data revolution for the SDGs' (12 June 2015) <a href="http://unsdsn.org/wp-content/uploads/2015/05/150612-FINAL-SDSN-Indicator-Report1.pdf">http://unsdsn.org/wp-content/uploads/2015/05/150612-FINAL-SDSN-Indicator-Report1.pdf</a>, accessed 4 June 2016.</p>
<p><strong>[35]</strong> UNICEF, 'CME Info - Child Mortality Estimates' (2014) <a href="http://www.childmortality.org/">http://www.childmortality.org/</a>, accessed 1 June 2016.</p>
<p><strong>[36]</strong> See <strong>[10]</strong>.</p>
<p><strong>[37]</strong> UNESCO, 'Technical report by the Bureau of the United Nations Statistical Commission (UNSC) on the process of the development of an indicator framework for the goals and targets of the post-2015 development agenda' (6 March 2015) <a href="http://www.uis.unesco.org/ScienceTechnology/Documents/unsc-post-2015-draft-indicators.pdf">http://www.uis.unesco.org/ScienceTechnology/Documents/unsc-post-2015-draft-indicators.pdf</a>, accessed 3 June 2016.</p>
<p><strong>[38]</strong> UN, 'The Road to Dignity by 2030: Ending Poverty, Transforming All Lives and Protecting the Planet ' (4 December 2014) <a href="http://www.un.org/disabilities/documents/reports/SG_Synthesis_Report_Road_to_Dignity_by_2030.pdf">http://www.un.org/disabilities/documents/reports/SG_Synthesis_Report_Road_to_Dignity_by_2030.pdf</a>, accessed 7 June 2016.</p>
<p><strong>[39]</strong> Ibid.</p>
<p><strong>[40]</strong> UN Sustainable Development Solutions Network, 'Data for Development: An Action Plan to Finance the Data Revolution for Sustainable Development' (10 July 2015) <a href="http://unsdsn.org/wp-content/uploads/2015/04/Data-For-Development-An-Action-Plan-July-2015.pdf">http://unsdsn.org/wp-content/uploads/2015/04/Data-For-Development-An-Action-Plan-July-2015.pdf</a>, accessed 3 June 2016.</p>
<p><strong>[41]</strong> See <strong>[34]</strong>.</p>
<p><strong>[42]</strong> UN Data Revolution Group, 'About the Independent Expert Advisory Group' (6 November 2014) <a href="http://www.undatarevolution.org/about-ieag/">http://www.undatarevolution.org/about-ieag/</a>, accessed 4 June 2016.</p>
<p><strong>[43]</strong> See <strong>[3]</strong>.</p>
<p><strong>[44]</strong> The Partnership has already been established, and it is developing a further framework.</p>
<p><strong>[45]</strong> Organisation for Economic Co-Operation and Development), 'The Organisation for Economic Co-operation and Development (OECD): About' (2016) <a href="http://www.oecd.org/about/">http://www.oecd.org/about/</a>, accessed 2 June 2016.</p>
<p><strong>[46]</strong> Organisation for Economic Co-Operation and Development, 'Strengthening National Statistical Systems to Monitor Global Goals' (2015) <a href="http://www.oecd.org/dac/POST-2015%20P21.pdf">http://www.oecd.org/dac/POST-2015%20P21.pdf</a>, accessed 1 June 2016.</p>
<p><strong>[47]</strong> Ibid.</p>
<p><strong>[48]</strong> OECD Global Science Forum, 'New Data for Understanding the Human Condition: International Perspectives' (February 2013) <a href="http://www.oecd.org/sti/sci-tech/new-data-for-understanding-the-human-condition.pdf">http://www.oecd.org/sti/sci-tech/new-data-for-understanding-the-human-condition.pdf</a>, accessed 2 June 2016.</p>
<p><strong>[49]</strong> The Global Partnership On Sustainable Development Data, 'Who We Are: The Data Ecosystem and the Global Partnership' (2016) <a href="http://www.data4sdgs.org/who-we-are/">http://www.data4sdgs.org/who-we-are/</a>, accessed 5 June 2016.</p>
<p><strong>[50]</strong> World Economic Forum, 'Big Data, Big Impact: New Possibilities for International Development' (22 January 2012) <a href="http://www3.weforum.org/docs/WEF_TC_MFS_BigDataBigImpact_Briefing_2012.pdf">http://www3.weforum.org/docs/WEF_TC_MFS_BigDataBigImpact_Briefing_2012.pdf</a>, accessed 8 June 2016.</p>
<p><strong>[51]</strong> World Economic Forum, 'Our Mission: The World Economic Forum' (12 January 2016) <a href="https://www.weforum.org/about/world-economic-forum/">https://www.weforum.org/about/world-economic-forum/</a>, accessed 7 June 2016.</p>
<p><strong>[52]</strong> See <strong>[50]</strong>.</p>
<p><strong>[53]</strong> Julia Lane, Homepage, <a href="http://www.julialane.org/">http://www.julialane.org/</a>.</p>
<p><strong>[54]</strong> Julia Lane, 'Big Data for Public Policy: The Quadruple Helix' (2016) 8(1) <em>Journal of Policy Analysis and Management</em>, <a href="http://onlinelibrary.wiley.com/doi/10.1002/pam.21921/abstract">DOI:10.1002/pam.21921</a>, accessed 1 June 2016.</p>
<p><strong>[55]</strong> Data-Pop Alliance, 'Data-Pop Alliance: Our Mission' (May 2014) <a href="http://datapopalliance.org/">http://datapopalliance.org/</a>, accessed 1 June 2016.</p>
<p><strong>[56]</strong> See <strong>[10]</strong>.</p>
<p> </p>
<h2 id="8">8. Author Profile</h2>
<p>Meera Manoj is a law student at the Gujarat National Law University, Gandhinagar and has completed her first year. She is passionate about civil rights, feminism, economics in law and anything involving paneer. She aspires to travel the world and build up a vast library, with unparalleled sections on International Law and Archie comics.</p>
<p> </p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/blog/big-data-governance-frameworks-for-data-revolution-for-sustainable-development'>http://editors.cis-india.org/internet-governance/blog/big-data-governance-frameworks-for-data-revolution-for-sustainable-development</a>
</p>
No publisherMeera ManojDevelopmentBig DataData SystemsInternet GovernanceBig Data for DevelopmentSustainable Development Goals2016-07-05T13:13:32ZBlog EntrySmart City Policies and Standards: Overview of Projects, Data Policies, and Standards across Five International Smart Cities
http://editors.cis-india.org/internet-governance/blog/policies-and-standards-overview-of-five-international-smart-cities
<b>This blog post aims to review five Smart Cities across the globe, namely Singapore, Dubai, New York City, London and Seoul, the Data Policies and Standards adopted. Also, the research seeks to point the similarities, differences and best practices in the development of smart cities across jurisdictions.</b>
<p> </p>
<h4>Download the brief: <a href="http://cis-india.org/internet-governance/files/SmartCitiesPoliciesStandards-20160608/at_download/file">PDF</a>.</h4>
<hr />
<h2 style="text-align: justify;">Introduction</h2>
<p style="text-align: justify;">Smart City as a concept is evolutionary in nature, and the key elements like Information and Communication Technology (ICT), digitization of services, Internet of Things (IoT), open data, big data, social innovation, knowledge, etc., would be intrinsic to defining a Smart City <a href="#_ftn1">[1]</a>.</p>
<p style="text-align: justify;">A Smart City, as a “system of systems”, can potentially generate vast amounts of data, especially as cities install more sensors, gain access to data from sources such as mobile devices, and government and other agencies make more data accessible. Consequently, Big Data techniques and concepts are highly relevant to the future of Smart Cities. It was noted by Kenneth Cukier, Senior Editor of Digital Products at The Economist, that Big Data techniques can be used to enhance a number of processes essential to cities - for example, big data can be used to spot business trends, determine quality of research, prevent diseases, tack legal citations, combat crime, and determine real-time roadway traffic conditions <a href="#_ftn2">[2]</a>. Having said this, data is deemed to be the lifeblood of a Smart City and its availability, use, cost, quality, analysis, associated business models and governance are all areas of interest for a range of actors within a smart city <a href="#_ftn3">[3]</a></p>
<p style="text-align: justify;">This blog reviews five Smart Cities namely Singapore, Dubai, New York City, London and Seoul. In doing so, the research seeks to point the similarities, differences and best practices in the development of smart cities across jurisdictions. To achieve this, the research reviews:</p>
<ul style="text-align: justify;">
<li>The definition of a Smart City in a given context or project (if any).</li>
<li>Existing policy/regulations around data or notes the lack thereof.</li>
<li>The cities adherence to the International standards and providing an update on the current status of the Smart City programme.</li></ul>
<p> </p>
<h2 style="text-align: justify;">Singapore</h2>
<h3 style="text-align: justify;"><strong> </strong><strong>Introduction</strong></h3>
<p style="text-align: justify;"><strong> </strong>The Smart Nation programme in Singapore was launched on 24th November, 2014. The programme is being driven by the Infocomm Development Authority of Singapore, through which Singapore seeks to harness ICT, networks and data to support improved livelihoods, stronger communities and creation of new opportunities for its residents <a href="#_ftn4">[4]</a> According to the IDA, a Smart Nation is a city where <em>“people and businesses are empowered through increased access to data, more participatory through the contribution of innovative ideas and solutions, and a more anticipatory government that utilises technology to better serve citizens’ needs”</em> <a href="#_ftn5">[5]</a>. The Smart Nation programme is driven by a designated Office in the Prime Minister’s Office <a href="#_ftn6">[6]</a>. As a core component to the Smart Nation Programme, the Smart Nation Platform has been developed as the technical architecture to support the Programme. This Platform enables greater pervasive connectivity, better situational awareness through data collection, and efficient sharing and access to collected sensor data, allowing public bodies to use such data to develop policy and practical interventions <a href="#_ftn7">[7]</a> Such access would allow for anticipatory governance - a goal of the Smart Nation Programme as noted by Dr. Yaacob Ibrahim, Minister for Communications and Information stating “Insights gained from this data would enable us to better anticipate citizens’ needs and help in better delivery of services” <a href="#_ftn8">[8]</a>.</p>
<h3 style="text-align: justify;"><strong>Status of the Project</strong></h3>
<div style="text-align: justify;"><strong> </strong>The Smart Nation Programme is an ongoing initiative, being built on the past programme Intelligent Nation 2015 (iN2015 masterplan). The plan involves putting in place the infrastructure, policies, ecosystem and capabilities to enable a Smart Nation, by adopting a people-centric approach <a href="#_ftn9">[9]</a>. A number of co-creating solutions adopted by the Government include:</div>
<ul style="text-align: justify;">
<li>Development of Mobile Apps to facilitate communication between the public and the providers of public services.</li>
<li>Organization of Hackathons by government agencies or corporations in collaboration with schools and industry partners to ideate and develop solutions to tackle real-world challenges.</li>
<li>Adopt measure for smart mobility to create a more seamless transport experience and providing greater access to real-time transport information so that citizens can better plan their journeys.</li>
<li>Smart technologies are also being introduced to the housing estates <a href="#_ftn10">[10]</a>.</li></ul>
<h3 style="text-align: justify;"><strong>Policies and Regulations</strong></h3>
<p style="text-align: justify;"><strong> </strong>The Smart Nation plan derives its legitimacy from the constitution of Singapore, holding the Prime Minister responsible to take charge of the subject ‘Smart Nation’ blueprint under the Statutory body of ‘Smart Nation’ Programme Office <a href="#_ftn11">[11]</a>. Singapore has a comprehensive data protection law – the Personal Data Protection Act 2012, rules governing the collection, use, disclosure and care of personal data. The Personal Data Protection Commission of Singapore has committed to work closely with the private sector, and also to support the Smart Nation vision on data privacy and cyber security ecosystem <a href="#_ftn12">[12]</a> <a href="#_ftn13">[13]</a>.</p>
<p style="text-align: justify;">Towards achieving the Smart Nation vision the government has also promoted the use of open data. In 2015 the Department of Statistics has made a vast amount of data available (across multiple themes say transport, infocomm, population, etc.) for free to the public in order to encourage innovation and facilitate the Smart Nation <a href="#_ftn14">[14]</a>. Prior to this initiative, the government had adopted the Open Data Policy in 2011, enabling public data for analysis, research and application development <a href="#_ftn15">[15]</a>. The concept of Virtual Singapore, which is a part of the Smart Nation Initiative, has been developed to adopt and simulate solutions on a virtual platform using big data analytics <a href="#_ftn16">[16]</a>.</p>
<h3 style="text-align: justify;"><strong>Adoption of International Standards</strong></h3>
<p style="text-align: justify;"><strong> </strong>The Smart Nation initiative follows the standards laid under the purview of the Singapore Standards Council (SSC). It specifies three types of Internet of Things (IoT) Standards – sensor network standards (TR38 - for public areas & TR40 - for homes), IoT foundational standards (common set of guidelines for IoT requirements and architecture, information and service interoperability, security and data integrity) and domain-specific standards (healthcare, mobility, urban living, etc.) <a href="#_ftn17">[17]</a>.</p>
<p style="text-align: justify;">Singapore is part of ISO/IEC JTC 1/WG7 Sensor Networks and ISO/IEC JTC 1/WG10 Internet of Things (IoT) <a href="#_ftn18">[18]</a>. <a href="https://www.itsc.org.sg/standards/singapore-it-standards">Singapore IT standards</a> abides to the international standards as defined by ISO, ITU, etc.Singapore is a member of many international standards forums (see <a href="https://www.itsc.org.sg/international-participation/memberships-in-iso-iec-jtc1">Singapore International Standards Committee</a>) which includes JTC1/WG9 - Big Data; JTC1/WG10 - Internet of Things; JTC1/WG11 - Smart Cities.</p>
<p> </p>
<h2 style="text-align: justify;">Dubai, United Arab Emirates</h2>
<h3><strong> </strong><strong>Introduction</strong></h3>
<p style="text-align: justify;"><strong> </strong>The Dubai Smart City strategy was launched as part of the Dubai Plan 2021 vision, in the year 2015 <a href="#_ftn19">[19]</a>. Dubai Plan 2021 describes the future of Dubai evolving through holistic and complementary perspectives, starting with the people and the society and places the government as the custodian of the city’s development. Within the Plan, the smart city theme envisions a platform that is fully connected and integrated infrastructure that enables easy mobility for all residents and tourists, and provides easy access to all economic centers and social services, in line with the world’s best cities <a href="#_ftn20">[20]</a>. Center to the smart city platform is data and data analytics, particularly cross functional data and big data techniques to give a complete view of the city <a href="#_ftn21">[21]</a> As envisioned, the Dubai Data portal would provide a gateway to empower relevant stakeholders to understand the nuances of the city and pursue questions that will result in the greatest impact from the city’s data <a href="#_ftn22">[22]</a>. The platform will be based on current data and existing services, initiatives, and networks to identify opportunities for a smart city <a href="#_ftn23">[23]</a>. The Smart City Plan also includes a framework for aligning districts of Dubai with the Smart City vision and dimensions <a href="#_ftn24">[24]</a>.</p>
<p style="text-align: justify;">The Smart Dubai roadmap 2015 provides a consolidated report and planned smart city services, its status and the stage of its implementation, for e.g. Smart Grid, Mobile Payment, Smart Water, Health applications, Public Wi-Fi, Municipality, E-Traffic solutions, etc <a href="#_ftn25">[25]</a>.</p>
<h3 style="text-align: justify;"><strong>Status of the Project</strong></h3>
<p style="text-align: justify;"><strong> </strong>The Smart Dubai strategy is envisioned to be completed by the year 2020, and currently it’s ongoing. The first phase of Smart Dubai masterplan is expected to end by 2016. Between 2017 and 2019, the plan aims to deliver new initiatives and services. The second phase of the masterplan is expected to be completed by the year 2020 <a href="#_ftn26">[26]</a>.</p>
<h3 style="text-align: justify;"><strong>Policies and Regulations</strong></h3>
<p style="text-align: justify;">The Smart City Plan is being driven by the <strong>Dubai Smart City Office</strong> – which has been established under Law No. (29) of 2015 on the establishment of Dubai Smart City Office; Law No. (30) of 2015 on the establishment of Dubai Smart City Establishment; Decree No. (37) of 2015 on the formation of the Board of the Dubai Smart City Office; and Decree No (38) of 2015- appointing a Director General for the Office, which will develop overall policies and strategic plans, supervise the smart transformation process and approve joint initiatives, projects and services <a href="#_ftn27">[27]</a>. Also, an open data law called <strong>Dubai Open Data Law</strong> was issued to complete the legislative framework for transforming Dubai into a Smart City <a href="#_ftn28">[28]</a>. This law will enable the sharing of non-confidential data between public entities and other stakeholders.</p>
<h3 style="text-align: justify;"><strong>Adoption of International Standards</strong></h3>
<p style="text-align: justify;">In 2015 the Smart Dubai Executive Committee has collaborated through an agreement with the International Telecommunications Union (ITU) adopt the performance indicators by the ITU Focus Group on Smart Sustainable Cities to evaluate the feasibility of the indicators <a href="#_ftn29">[29]</a>. The Focus Group is working towards identifying global best practices for the development of smart cities <a href="#_ftn30">[30]</a>.</p>
<p> </p>
<h2 style="text-align: justify;">New York City, United States of America</h2>
<h3 style="text-align: justify;"><strong>Introduction</strong></h3>
<p style="text-align: justify;">The ‘One New York Plan’ announced in the year 2015 is a comprehensive plan for a sustainable and resilient city. It includes the adoption of digital technology and considers the importance of the role of data in transforming every aspect of the economy, communications, politics, and individual and family life <a href="#_ftn31">[31]</a>. Furthermore, through a publication on '<a href="http://www1.nyc.gov/site/forward/innovations/smartnyc.page">Building a Smart+Equitable City</a>', the Mayor’s Office of Technology and Innovation (MOTI) describes efforts to leverage new technologies to build Smart city.</p>
<p style="text-align: justify;">Accordingly, the plan seeks to establish better lives through establishing principles and strategic frameworks to guide connected device and Internet of Things (IoT) implementation; MOTI serving as the coordinating entity for new technology and IoT deployments across all City agencies; collaborating with academia and the private sector on innovative pilot projects, and partnering with municipal governments and organizations around the world to share best practices and leverage the impact of technological advancements <a href="#_ftn32">[32]</a>.</p>
<h3 style="text-align: justify;"><strong>Status of the Project</strong></h3>
<p style="text-align: justify;">OneNYC represents a unified vision for a sustainable, resilient, and equitable city developed with cross-cutting interagency collaboration, public engagement, and consultation with leading experts in their respective fields. The Mayor’s Office of Sustainability oversees the development of OneNYC and now shares responsibility with the Mayor’s Office of Recovery and Resiliency for ensuring its implementation <a href="#_ftn33">[33]</a>.</p>
<h3 style="text-align: justify;"><strong>Policies and Regulations</strong></h3>
<p style="text-align: justify;">As per the Local Law 11 of 2012, each City entity must identify and ultimately publish all of its digital public data for citywide aggregation and publication by 2018. In adherence to this law, there exists a NYC Open Data Plan which requires annual data updation <a href="#_ftn34">[34]</a>.</p>
<p style="text-align: justify;">The LinkNYC initiative, one of the key projects to make New York a ‘smart’ city, aims to connect everyone through a city wide wi-fi network. The LinkNYC initiative will retrofit payphones with kiosks to provide high-speed WiFi hotspots and charging stations for increased connectivity <a href="#_ftn35">[35]</a>. Data Privacy in the initiative is addressed through the customer first privacy policy, which considers user’s privacy on priority and will not sell any personal information or share with third parties for their own use. LinkNYC will use anonymized, aggregate data to make the system more efficient and to develop insights to improve your Link experience <a href="#_ftn36">[36]</a>.</p>
<h3 style="text-align: justify;"><strong>Adoption of International Standards</strong></h3>
<p style="text-align: justify;">The ANSI Network on Smart and Sustainable Cities (ANSSC) is a forum for information sharing and coordination on voluntary standards, conformity assessment and related activities for smart and sustainable cities in the US <a href="#_ftn37">[37]</a>. The US is a signatory of the ISO/ITU defined standards on smart cities <a href="#_ftn38">[38]</a>.</p>
<p> </p>
<h2 style="text-align: justify;">London, United Kingdom</h2>
<h3><strong>Introduction</strong></h3>
<p style="text-align: justify;">The Smart London Plan was unveiled in the year 2013 by the Mayor of London. The plan is being driven through the Greater London Authority, with the advice of the Smart London Board. The Smart London Plan envisions <em>‘Using the creative power of new technologies to serve London and improve Londoner’s lives</em>’ <a href="#_ftn39">[39]</a>. ‘Smart London’ is about harnessing new technology and data so that businesses, Londoners and visitors experience the city in a better way, and do not face bureaucratic hassle and congestion. Smart London seeks to improve the city as a whole and focuses on city macro functions that result from the interplay between city subsystems - such as local labour markets to financial markets, from local government to education, healthcare, transportation and utilities. According to strategy documents, a smarter London recognises and employs data as a service and will leverage data to enable informed decision making and the design of new activities.</p>
<h3 style="text-align: justify;"><strong>Status of the Project</strong></h3>
<p style="text-align: justify;">This project is currently ongoing. Since its formation in March 2013, the Smart London Board has been advising the Greater London Authority.The Plan sits within the overarching framework of the Mayor’s Vision 2020 <a href="#_ftn40">[40]</a>.</p>
<h3 style="text-align: justify;"><strong>Policies and Regulations</strong></h3>
<p style="text-align: justify;">The Smart London Plan incorporates the existing open data platform called ‘London DataStore’. The rules and guidelines for this platform are defined by the Greater London Authority, which includes working with public and private sector organisations to create, maintain and utilise it, enabling common data standards, identify and prioritise which data are needed to address London’s growth challenges, establish a Smart London Borough Partnership to encourage boroughs to free up London’s local level data. Also, privacy is protected and there is transparent use of data - to ensure data use is managed in the best interests of the public rather than private enterprise.<sup>42</sup> The Smart London Plan aims to build on this existing datastore to identify and publish data that addresses specific growth challenges, with an emphasis on working with companies and communities to create, maintain, and use this data <a href="#_ftn41">[41]</a>.</p>
<p style="text-align: justify;">The Open Data White Paper, issued by the Office of Paymaster General, seeks to build a transparent society by releasing public data through open data platforms and leveraging the potential of emerging technologies <a href="#_ftn42">[42]</a>. The Greater London Authority processes personal data in accordance with the Data Protection Act 1998 <a href="#_ftn43">[43]</a>.</p>
<h3 style="text-align: justify;"><strong>Adoption of International Standards</strong></h3>
<p style="text-align: justify;">The British Standards Institution (BSI) has already established Smart City standards and has associated with the ISO Advisory Group on smart city standards. The UK subscribes to the BSI standards for smart cities and has adopted the same <a href="#_ftn44">[44]</a>. The following standards and publications help address various issues for a city to become a smart city:</p>
<ul style="text-align: justify;">
<li>The development of a standard on <a href="http://www.bsigroup.com/en-GB/smart-cities/Smart-Cities-Standards-and-Publication/PAS-180-smart-cities-terminology/">Smart city terminology (PAS 180)</a></li>
<li>The development of a <a href="http://www.bsigroup.com/en-GB/smart-cities/Smart-Cities-Standards-and-Publication/PAS-181-smart-cities-framework/">Smart city framework standard (PAS 181)</a></li>
<li>The development of a <a href="http://www.bsigroup.com/en-GB/smart-cities/Smart-Cities-Standards-and-Publication/PAS-182-smart-cities-data-concept-model/">Data concept model for smart cities (PAS 182)</a></li>
<li>A <a href="http://www.bsigroup.com/en-GB/smart-cities/Smart-Cities-Standards-and-Publication/PD-8100-smart-cities-overview/">Smart city overview document (PD 8100)</a></li>
<li>A <a href="http://www.bsigroup.com/en-GB/smart-cities/Smart-Cities-Standards-and-Publication/PD-8101-smart-cities-planning-guidelines/">Smart city planning guidelines document (PD 8101)</a></li>
<li>BS 8904 Guidance for community sustainable development provides a decision-making framework that will help setting objectives in response to the needs and aspirations of city stakeholders</li>
<li>BS 11000 Collaborative relationship management</li>
<li>BSI BIP 2228:2013 Inclusive urban design - A guide to creating accessible public spaces.</li></ul>
<p style="text-align: justify;">Further, the Smart London Plan incorporates open data standards in accordance with London DataStore <a href="#_ftn45">[45]</a>. Various government reports – Smart Cities background paper, Open Data White Paper, etc., have suggested the use of standards related to Internet of Things (IoT), open data standards, etc <a href="#_ftn46">[46]</a>.</p>
<p> </p>
<h2 style="text-align: justify;">Seoul, Korea</h2>
<h3 style="text-align: justify;"><strong>Introduction</strong></h3>
<p style="text-align: justify;"><strong></strong>Smart Seoul 2015 was announced in June 2011 by the Seoul Metropolitan Government, which envisions integrating IT services into every field, including administration, welfare, industry and living. Through this, the Seoul Metropolitan Government plans to create a Seoul that uses smart technologies by 2015 <a href="#_ftn47">[47]</a>. Towards this, the Seoul Metropolitan Government plans to make use of Big Data in policy development, and through scientific analytics, will provide customized administrative services and reduce wasteful spending. Also, the government is utilising Big Data to analyse trends emerging from existing services <a href="#_ftn48">[48]</a>. Examples of projects that leverage big data that the government has undertaken include the Taxi Matchmaking Project – analyzes the data related to taxi stands and passengers, the Owl Bus <a href="#_ftn49">[49]</a> - maps the bus routes, etc.</p>
<h3 style="text-align: justify;"><strong>Status of the Project</strong></h3>
<p style="text-align: justify;"><strong></strong>Building on the Smart Seoul 2015, the Seoul Metropolitan Government plans to establish 'Global Digital Seoul 2020 – New Connections, Different Experiences' vision in next five-years. In this multi-objective plan, it aims to establish a ’Big Data campus’ providing win-win cooperation among public, private, industry and university <a href="#_ftn50">[50]</a>.</p>
<h3 style="text-align: justify;"><strong>Policies and Regulations </strong></h3>
<p style="text-align: justify;"><strong></strong>The Smart Seoul 2015 aims to create a ‘Seoul Data Mart’, which will be an open platform that makes public information available for data processing <a href="#_ftn51">[51]</a>. Furthermore, Seoul has opened the Seoul Open Data Plaza <a href="#_ftn52">[52]</a>, an online channel to share and provide citizens with all of Seoul’s public data, such as real-time bus operation schedules, subway schedules, non-smoking areas, locations of public Wi-Fi services, shoeshine shops, and facilities for disabled people, and the information registered in Seoul Open Data Plaza is provided in the open API format.<sup>45</sup></p>
<p style="text-align: justify;">South Korea has a comprehensive law governing data privacy – Personal Information Protection Act, 2011. The law includes data protection rules and principles, including obligations on the data controller and the consent of data subjects, rights to access personal data or object to its collection, and security requirements. It also covers cookies and spam, data processing by third parties and the international transfer of data <a href="#_ftn53">[53]</a>.</p>
<h3 style="text-align: justify;"><strong>International Standards</strong></h3>
<p style="text-align: justify;"><strong></strong>The smart city standards are adopted in the development of smart cities in Korea <a href="#_ftn54">[54]</a>. Korea has adopted the ISO/TC 268, which is focused on sustainable development in communities. Korea also has one working group developing city indicators and another working group developing metrics for smart community infrastructures <a href="#_ftn55">[55]</a>.</p>
<p> </p>
<h2>Conclusion</h2>
<p style="text-align: justify;">The smart city projects studied are at different levels of implementation and have both similarities and differences. Below is an analysis of some of the key similarities and differences between smart city projects, a comparison of these points to India’s 100 Smart City Mission, and a summary of best practices around the development of smart city frameworks.</p>
<h3><strong>Nodal Agency</strong></h3>
<p style="text-align: justify;">All cities studied have nodal agencies driving the smart city initiatives and many have policies in place backing these initiatives. For example, while the Smart Nation programme in Singapore is being driven by the Infocomm Development Authority, in London the smart city project is governed by the Great London Authority. The Smart Seoul Project in Korea is governed by the Seoul Metropolitan Government and New York has the Mayor’s Office of Technology and Innovation serving as the coordinating entity for new technology and IoT deployments across all City agencies. In India, the nodal agency driving the 100 Smart Cities Project is the Ministry of Urban Development under the Indian Government. In India, the implementation of the Mission at the City level will be done by a Special Purpose Vehicle (SPV), which will be a limited company and will plan, appraise, approve, release funds, implement, manage, operate, monitor and evaluate the Smart City development projects.</p>
<h3><strong>Policies</strong></h3>
<p style="text-align: justify;">Many of the cities had open data policies and data protection policies that pertain to the Smart City initiatives. In Dubai, an open data law called Dubai Open Data Law has been issued to complete the legislative framework for transforming Dubai into a Smart City and the Smart City Establishment will develop policies for the project. New York also has an Open Data Plan in place and LinkNYC will use anonymized, aggregate data to address data privacy of users. In London, the Smart London Plan incorporates the existing open data platform called ‘London DataStore’, the rules for which are defined by the Greater London Authority, which also ensures privacy and transparent use of data by processing personal data in accordance with the Data Protection Act 1998. For regulation of data in Seoul, a ‘Seoul Data Mart’ will be established to make public information available for data processing and the Seoul Open Data Plaza is an existing online channel to share and provide citizens with all of Seoul’s public data. South Korea has a comprehensive law governing data privacy in place as well. In Singapore, the Personal Data Protection Commission has committed to work and support the Smart Nation vision on data privacy and cyber security ecosystem. To achieve the vision of the project, the government has also promoted the use of open data. It can be said the these countries , with clearly laid out policies to support and guide the project, have well planned ecosystem for regulation and governance of systems, technologies and cities. All cities have incorporated open data into smart cities and many have developed guidelines for its use. All cities have similar goals of enhancing the lives of citizens and developing anticipatory regulation, however, there appears to be little discussion on the need to amend existing law or enable new law around privacy and data protection in light of data collection through smart cities. In India, no enabling legislation or policy has been formulated by the Government, apart from releasing “Mission Statement and Guidelines”, which provides details about the Project and vision, excluding a definition of a ‘smart city’ or the relevant applicable laws and policies. No information is publicly available regarding deployment of open data, use of specific technologies like cloud, big data, etc., the relevant policies and applicability of laws. Unlike India, all cities recognize the importance of big data techniques in enabling smart city visions, technology and policies. On the lines of these cities, India must work towards addressing the need for an open data framework in light of the 100 Smart Cities Mission to enable the sharing of non-confidential data between public entities and other stakeholders. This requires co-ordination to incorporate, enable and draw upon open data architecture in the cities by the Government with the existing open data framework in India, like the National Data Sharing and Accessibility Policy, 2012. Use of technology in the form of IoT and Big Data entails access to open data, bringing another policy area in its ambit which needs consideration. Also, identification and development of open standards for IoT must be looked at. Also, as data in smart cities will be generated, collected, used, and shared by both the public and private sector. It is essential that India’s existing data protection standards and regime must be amended to extend the data regulation beyond a body corporate and oversee the collection and use of data by the Government, and its agencies.</p>
<h3><strong>Standards</strong></h3>
<p style="text-align: justify;">In Singapore, the Smart Nation initiative follows the standards laid under the purview of the Singapore Standards Council (SSC)and the <a href="https://www.itsc.org.sg/standards/singapore-it-standards">Singapore IT standards</a> abides to the international standards as defined by ISO, ITU, etc. The Country is also a member of many international standards forums (see <a href="https://www.itsc.org.sg/international-participation/memberships-in-iso-iec-jtc1">Singapore International Standards Committee</a>) which includes JTC1/WG9- Big Data; JTC1/WG10 - Internet of Things; JTC1/WG11 - Smart Cities. In Dubai, the Smart Dubai Executive Committee with the International Telecommunications Union (ITU) to adopt the performance indicators by the ITU Focus Group on Smart Sustainable Cities to evaluate the feasibility of the indicators. For the purpose of standards, the ANSI Network on Smart and Sustainable Cities (ANSSC) in New York is a forum smart and sustainable cities, along with US being a signatory of the ISO/ITU defined standards on smart cities. Also, The British Standards Institution (BSI) has already established Smart City standards and has associated with the ISO Advisory Group on smart city standards. The UK subscribes to the BSI standards for smart cities and has adopted the same and the Smart London Plan incorporates open data standards in accordance with London DataStore. For development of smart cities, Korea has adopted the ISO/TC 268, which is focused on sustainable development in communities and also has one working group developing city indicators and another working group developing metrics for smart community infrastructures. However, in India, the Bureau of Indian Standards (BIS) has undertaken the task to formulate standardised guidelines for central and state authorities in planning, design and construction of smart cities by setting up a technical committee under the Civil engineering department of the Bureau. However, adoption of the standards by implementing agencies would be voluntary and intends to complement internationally available documents in this area. Also, The Global Cities Institute (GCI) has undertaken a mission in the year 2015 to align with the Bureau of Indian Standards regarding development of standards of smart cities and also to forge relationships with Indian cities in light of ISO 37120. It can be said that India has currently not yet adopted international standards, but is in the process of developing national standards and adopting key international standards. Unlike other cities,which are adopting standards - national, ISO, or ITU, Indian cities are yet to adopt standards for regulation of the future smart cities.</p>
<h3><strong>Notes for India</strong></h3>
<p style="text-align: justify;">India is in the nascent stages of developing smart cities across the country. Drawing from the practices adopted by cities across the world, smart cities in India should adopt strong regulatory and governance frameworks regarding technical standards, open data and data security and data protection policies. These policies will be essential in ensuring the sustainability and efficiency of smart cities while safeguarding individual rights. Some of these policies are already in place - such as India’s Open Data Policy and India’s data protection standards under section 43A of the ITA. It will be important to see how these policies are adopted and applied to the context of smart cities.</p>
<p> </p>
<h2>References</h2>
<p><a name="_ftn1">[1]</a> Smart Cities and Transparent Evolution, <a href="http://www.posterheroes.org/Posterheroes3/_mat/PH3_eng.pdf">http://www.posterheroes.org/Posterheroes3/_mat/PH3_eng.pdf</a>.</p>
<p><a name="_ftn2">[2]</a> "Data, Data Everywhere." The Economist, February 25, 2010. Accessed March 17, 2016, <a href="http://www.economist.com/node/15557443">http://www.economist.com/node/15557443</a>.</p>
<p><a name="_ftn3">[3]</a> "Smart Cities." ISO. 2015. Accessed March 17, 2016, <a href="http://www.iso.org/iso/smart_cities_report-jtc1.pdf">http://www.iso.org/iso/smart_cities_report-jtc1.pdf</a>.</p>
<p><a name="_ftn4">[4]</a> Transcript of Prime Minister Lee Hsien Loong's speech at Smart Nation launch on 24 November, <a href="http://www.pmo.gov.sg/mediacentre/transcript-prime-minister-lee-hsien-loongs-speech-smart-nation-launch-24-november">http://www.pmo.gov.sg/mediacentre/transcript-prime-minister-lee-hsien-loongs-speech-smart-nation-launch-24-november</a>.</p>
<p><a name="_ftn5">[5]</a> Smart Nation Vision, <a href="https://www.ida.gov.sg/Tech-Scene-News/Smart-Nation-Vision">https://www.ida.gov.sg/Tech-Scene-News/Smart-Nation-Vision</a>.</p>
<p><a name="_ftn6">[6]</a> Smart Nation, <a href="http://www.pmo.gov.sg/smartnation">http://www.pmo.gov.sg/smartnation</a>.</p>
<p><a name="_ftn7">[7]</a> Smart Nation Platform, <a href="https://www.ida.gov.sg/~/media/Files/About%20Us/Newsroom/Media%20Releases/2014/0617_smartnation/AnnexA_sn.pdf">https://www.ida.gov.sg/~/media/Files/About%20Us/Newsroom/Media%20Releases/2014/0617_smartnation/AnnexA_sn.pdf</a>.</p>
<p><a name="_ftn8">[8]</a> Transcript of Prime Minister Lee Hsien Loong's speech at Smart Nation launch on 24 November, <a href="https://www.ida.gov.sg/blog/insg/featured/singapore-lays-groundwork-to-be-worlds-first-smart-nation/">https://www.ida.gov.sg/blog/insg/featured/singapore-lays-groundwork-to-be-worlds-first-smart-nation/</a>.</p>
<p><a name="_ftn9">[9]</a> Prime Ministers’ Office Singapore-Smart Nation, <a href="http://www.pmo.gov.sg/smartnation">http://www.pmo.gov.sg/smartnation</a>.</p>
<p><a name="_ftn10">[10]</a> Prime Ministers’ Office Singapore-Smart Nation, <a href="http://www.pmo.gov.sg/smartnation">http://www.pmo.gov.sg/smartnation</a>.</p>
<p><a name="_ftn11">[11]</a> Constitution of the Republic of Singapore (Responsibility of the Prime Minister) Notification 2015, <a href="http://statutes.agc.gov.sg/aol/search/display/view.w3p;page=0;query=Status%3Acurinforce%20Type%3Aact,sl%20Content%3A%22smart%22;rec=4;resUrl=http%3A%2F%2Fstatutes.agc.gov.sg%2Faol%2Fsearch%2Fsummary%2Fresults.w3p%3Bquery%3DStatus%253Acurinforce%2520Type%253Aact,sl%2520Content%253A%2522smart%2522;whole=yes">http://statutes.agc.gov.sg/aol/search/display/view.w3p;page=0;query=Status%3Acurinforce%20Type%3Aact,sl%20Content%3A%22smart%22;rec=4;resUrl=http%3A%2F%2Fstatutes.agc.gov.sg%2Faol%2Fsearch%2Fsummary%2Fresults.w3p%3Bquery%3DStatus%253Acurinforce%2520Type%253Aact,sl%2520Content%253A%2522smart%2522;whole=yes</a>.</p>
<p><a name="_ftn12">[12]</a> Personal Data Protection Singapore-Annual Report 2014-15, <a href="https://www.pdpc.gov.sg/docs/default-source/Reports/pdpc-ar-fy14---online.pdf">https://www.pdpc.gov.sg/docs/default-source/Reports/pdpc-ar-fy14---online.pdf</a>.</p>
<p><a name="_ftn13">[13]</a> Balancing Innovation and Personal Data Protection, <a href="https://www.ida.gov.sg/Tech-Scene-News/Tech-News/Digital-Government/2015/9/Balancing-innovation-and-personal-data-protection">https://www.ida.gov.sg/Tech-Scene-News/Tech-News/Digital-Government/2015/9/Balancing-innovation-and-personal-data-protection</a>.</p>
<p><a name="_ftn14">[14]</a> Department of Statistics Singapore- Free Access to More Data on the SingStat Website from 1 March 2015, <a href="http://www.singstat.gov.sg/docs/default-source/default-document-library/news/press_releases/press27022015.pdf">http://www.singstat.gov.sg/docs/default-source/default-document-library/news/press_releases/press27022015.pdf</a>.</p>
<p><a name="_ftn15">[15]</a> Singapore Marks 50th Birthday With Open Data Contest, <a href="https://blog.hootsuite.com/singapore-open-data/">https://blog.hootsuite.com/singapore-open-data/</a>.</p>
<p><a name="_ftn16">[16]</a> Virtual Singapore - a 3D city model platform for knowledge sharing and community collaboration, <a href="http://www.sla.gov.sg/News/tabid/142/articleid/572/category/Press%20Releases/parentId/97/year/2014/Default.aspx">http://www.sla.gov.sg/News/tabid/142/articleid/572/category/Press%20Releases/parentId/97/year/2014/Default.aspx</a>.</p>
<p><a name="_ftn17">[17]</a> Internet of Things (IoT) Standards Outline to Support Smart Nation Initiative Unveiled, <a href="http://www.spring.gov.sg/NewsEvents/PR/Pages/Internet-of-Things-(IoT)-Standards-Outline-to-Support-Smart-Nation-Initiative-Unveiled-20150812.aspx">http://www.spring.gov.sg/NewsEvents/PR/Pages/Internet-of-Things-(IoT)-Standards-Outline-to-Support-Smart-Nation-Initiative-Unveiled-20150812.aspx</a>.</p>
<p><a name="_ftn18">[18]</a> Information Technology Standards Committee, <a href="https://www.itsc.org.sg/technical-committees/internet-of-things-technical-committee-iottc">https://www.itsc.org.sg/technical-committees/internet-of-things-technical-committee-iottc</a> and <a href="https://www.ida.gov.sg/~/media/Files/Infocomm%20Landscape/iN2015/Reports/realisingthevisionin2015.pdf">https://www.ida.gov.sg/~/media/Files/Infocomm%20Landscape/iN2015/Reports/realisingthevisionin2015.pdf</a>.</p>
<p><a name="_ftn19">[19]</a> Government of Dubai-2021 Dubai Plan-Purpose, <a href="http://www.dubaiplan2021.ae/the-purpose/">http://www.dubaiplan2021.ae/the-purpose/</a>.</p>
<p style="text-align: justify;"><a name="_ftn20">[20]</a> Government of Dubai-2021 Dubai Plan, <a href="http://www.dubaiplan2021.ae/dubai-plan-2021/">http://www.dubaiplan2021.ae/dubai-plan-2021/</a>.</p>
<p><a name="_ftn21">[21]</a> Smart Dubai, <a href="http://www.smartdubai.ae/foundation_layers.php">http://www.smartdubai.ae/foundation_layers.php</a>.</p>
<p><a name="_ftn22">[22]</a> The Internet of Things: Connections for People’s happiness, <a href="http://www.smartdubai.ae/story021002.php">http://www.smartdubai.ae/story021002.php</a>.</p>
<p><a name="_ftn23">[23]</a> Smart Dubai - Current State, <a href="http://www.smartdubai.ae/current_state.php">http://www.smartdubai.ae/current_state.php</a>.</p>
<p><a name="_ftn24">[24]</a> Smart Dubai - District Guidelines, <a href="http://smartdubai.ae/districtguidelines/Smart_Dubai_District_Guidelines_Public_Brief.pdf">http://smartdubai.ae/districtguidelines/Smart_Dubai_District_Guidelines_Public_Brief.pdf</a>.</p>
<p><a name="_ftn25">[25]</a> See; <a href="http://roadmap.smartdubai.ae/search-services-public.php">http://roadmap.smartdubai.ae/search-services-public.php</a> and <a href="http://roadmap.smartdubai.ae/search-initiatives-public.php">http://roadmap.smartdubai.ae/search-initiatives-public.php</a>.</p>
<p><a name="_ftn26">[26]</a> Smart Dubai-Smart District Guidelines, <a href="http://smartdubai.ae/districtguidelines/Smart_Dubai_District_Guidelines_Public_Brief.pdf">http://smartdubai.ae/districtguidelines/Smart_Dubai_District_Guidelines_Public_Brief.pdf</a>.</p>
<p><a name="_ftn27">[27]</a> Dubai Ruler issues new laws to further enhance the organisational structure and legal framework of Dubai Smart City, <a href="https://www.wam.ae/en/news/emirates/1395288828473.html">https://www.wam.ae/en/news/emirates/1395288828473.html</a>.</p>
<p><a name="_ftn28">[28]</a> See: <a href="http://slc.dubai.gov.ae/en/AboutDepartment/News/Lists/NewsCentre/DispForm.aspx?ID=147&ContentTypeId=0x01001D47EB13C23E544893300E8367A23439">http://slc.dubai.gov.ae/en/AboutDepartment/News/Lists/NewsCentre/DispForm.aspx?ID=147&ContentTypeId=0x01001D47EB13C23E544893300E8367A23439</a> and <a href="http://www.smartdubai.ae/dubai_data.php">http://www.smartdubai.ae/dubai_data.php</a>.</p>
<p><a name="_ftn29">[29]</a> Dubai first city to trial ITU key performance indicators for smart sustainable cities, <a href="http://www.itu.int/net/pressoffice/press_releases/2015/12.aspx#.VtaYtlt97IU">http://www.itu.int/net/pressoffice/press_releases/2015/12.aspx#.VtaYtlt97IU</a>.</p>
<p><a name="_ftn30">[30]</a> Smart Dubai Benchmark Report 2015 Executive Summary, <a href="http://smartdubai.ae/bmr2015/methodology-public.php">http://smartdubai.ae/bmr2015/methodology-public.php</a>.</p>
<p><a name="_ftn31">[31]</a> Building a Smart + Equitable City, <a href="http://www1.nyc.gov/assets/forward/documents/NYC-Smart-Equitable-City-Final.pdf">http://www1.nyc.gov/assets/forward/documents/NYC-Smart-Equitable-City-Final.pdf</a></p>
<p><a name="_ftn32">[32]</a> Building a Smart + Equitable City, <a href="http://www1.nyc.gov/site/forward/innovations/smartnyc.page">http://www1.nyc.gov/site/forward/innovations/smartnyc.page</a>.</p>
<p><a name="_ftn33">[33]</a> One New York: The Plan for a Strong and Just City, <a href="http://www1.nyc.gov/html/onenyc/about.html">http://www1.nyc.gov/html/onenyc/about.html</a></p>
<p><a name="_ftn34">[34]</a> Open Data for All, <a href="http://www1.nyc.gov/assets/home/downloads/pdf/reports/2015/NYC-Open-Data-Plan-2015.pdf">http://www1.nyc.gov/assets/home/downloads/pdf/reports/2015/NYC-Open-Data-Plan-2015.pdf</a>.</p>
<p><a name="_ftn35">[35]</a> 7 public projects that are turning New York into a “smart city”, <a href="http://www.builtinnyc.com/2015/11/24/7-projects-are-turning-new-york-futuristic-technology-hub">http://www.builtinnyc.com/2015/11/24/7-projects-are-turning-new-york-futuristic-technology-hub</a>.</p>
<p><a name="_ftn36">[36]</a> LinkNYC, <a href="https://www.link.nyc/faq.html#privacy">https://www.link.nyc/faq.html#privacy</a>.</p>
<p><a name="_ftn37">[7]</a> ANSI Network on Smart and Sustainable Cities, <a href="http://www.ansi.org/standards_activities/standards_boards_panels/anssc/overview.aspx?menuid=3">http://www.ansi.org/standards_activities/standards_boards_panels/anssc/overview.aspx?menuid=3</a></p>
<p><a name="_ftn38">[38]</a> IoT-Enabled Smart City Framework, <a href="http://publicaa.ansi.org/sites/apdl/Documents/News%20and%20Publications/Links%20Within%20Stories/IoT-EnabledSmartCityFrameworkWP20160213.pdf">http://publicaa.ansi.org/sites/apdl/Documents/News%20and%20Publications/Links%20Within%20Stories/IoT-EnabledSmartCityFrameworkWP20160213.pdf</a>.</p>
<p><a name="_ftn39">[39]</a> Smart London (UK) Plan: Digital Technologies, London and Londoners, <a href="http://munkschool.utoronto.ca/ipl/files/2015/03/KleinmanM_Smart-London-UK-v5_30AP2015.pdf">http://munkschool.utoronto.ca/ipl/files/2015/03/KleinmanM_Smart-London-UK-v5_30AP2015.pdf</a>.</p>
<p><a name="_ftn40">[40]</a> Smart London Plan, <a href="http://www.london.gov.uk/sites/default/files/smart_london_plan.pdf">http://www.london.gov.uk/sites/default/files/smart_london_plan.pdf</a>.</p>
<p><a name="_ftn41">[41]</a> Smart London Plan, <a href="http://www.london.gov.uk/sites/default/files/smart_london_plan.pdf">http://www.london.gov.uk/sites/default/files/smart_london_plan.pdf</a>.</p>
<p><a name="_ftn42">[42]</a> Open Data White Paper, <a href="https://data.gov.uk/sites/default/files/Open_data_White_Paper.pdf">https://data.gov.uk/sites/default/files/Open_data_White_Paper.pdf</a>.</p>
<p><a name="_ftn43">[43]</a> London Datastore-Privacy, <a href="http://data.london.gov.uk/about/privacy/">http://data.london.gov.uk/about/privacy/</a>.</p>
<p><a name="_ftn44">[44]</a> Future Cities Standards Centre in London, <a href="https://eu-smartcities.eu/commitment/5937">https://eu-smartcities.eu/commitment/5937</a>.</p>
<p><a name="_ftn45">[45]</a> Smart London Plan, <a href="http://www.london.gov.uk/sites/default/files/smart_london_plan.pdf">http://www.london.gov.uk/sites/default/files/smart_london_plan.pdf</a>.</p>
<p><a name="_ftn46">[46]</a> Smart Cities background paper, October 2013, <a href="https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/246019/bis-13-1209-smart-cities-background-paper-digital.pdf">https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/246019/bis-13-1209-smart-cities-background-paper-digital.pdf</a>.</p>
<p><a name="_ftn47">[47]</a> Presentation of 2015 Blueprint of Seoul as ‘State-of-the-art Smart City’, <a href="http://english.seoul.go.kr/presentation-of-2015-blueprint-of-seoul-as-%E2%80%98state-of-the-art-smart-city%E2%80%99/">http://english.seoul.go.kr/presentation-of-2015-blueprint-of-seoul-as-%E2%80%98state-of-the-art-smart-city%E2%80%99/</a>.</p>
<p><a name="_ftn48">[48]</a> “Policy Where There is Demand,” Seoul Utilizes Big Data, <a href="http://english.seoul.go.kr/policy-demand-seoul-utilizes-big-data/">http://english.seoul.go.kr/policy-demand-seoul-utilizes-big-data/</a></p>
<p><a name="_ftn49">[49]</a> Seoul’s “Owl Bus” Based on Big Data Technology, <a href="http://www.citiesalliance.org/sites/citiesalliance.org/files/Seoul-Owl-Bus-11052014.pdf">http://www.citiesalliance.org/sites/citiesalliance.org/files/Seoul-Owl-Bus-11052014.pdf</a></p>
<p><a name="_ftn50">[50]</a> Seoul Launches “Global Digital Seoul 2020”, <a href="http://english.seoul.go.kr/seoul-launches-global-digital-seoul-2020/">http://english.seoul.go.kr/seoul-launches-global-digital-seoul-2020/</a></p>
<p><a name="_ftn51">[51]</a> Smart Seoul 2015, <a href="http://english.seoul.go.kr/wp-content/uploads/2014/02/SMART_SEOUL_2015_41.pdf">http://english.seoul.go.kr/wp-content/uploads/2014/02/SMART_SEOUL_2015_41.pdf</a></p>
<p><a name="_ftn52">[52]</a> Disclosing public data through the Seoul Open Data Plaza, <a href="http://english.seoul.go.kr/policy-information/key-policies/informatization/seoul-open-data-plaza/">http://english.seoul.go.kr/policy-information/key-policies/informatization/seoul-open-data-plaza/</a></p>
<p><a name="_ftn53">[53]</a> Data protection in South Korea: overview, <a href="http://uk.practicallaw.com/2-579-7926">http://uk.practicallaw.com/2-579-7926</a>.</p>
<p><a name="_ftn54">[54]</a>Smart Cities Seoul: a case study, <a href="https://www.itu.int/dms_pub/itu-t/oth/23/01/T23010000190001PDFE.pdf">https://www.itu.int/dms_pub/itu-t/oth/23/01/T23010000190001PDFE.pdf</a></p>
<p><a name="_ftn55">[55]</a> Smart Cities-ISO, <a href="http://www.iso.org/iso/livelinkgetfile-isocs?nodeid=16193764">http://www.iso.org/iso/livelinkgetfile-isocs?nodeid=16193764</a>.</p>
<p> </p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/blog/policies-and-standards-overview-of-five-international-smart-cities'>http://editors.cis-india.org/internet-governance/blog/policies-and-standards-overview-of-five-international-smart-cities</a>
</p>
No publisherKiran A. B., Elonnai Hickok and Vanya RakeshBig DataInternet GovernanceFeaturedSmart CitiesPoliciesHomepage2016-06-11T13:29:04ZBlog EntryCPRsouth 2016 – Young Scholars Programme
http://editors.cis-india.org/internet-governance/news/cprsouth-2016-2013-young-scholars-programme
<b>Rohini Lakshané, Amber Sinha and Vidushi Marda have been selected to attend the two-day Young Scholars' Programme to be held in Zanzibar, Tanzania in early September this year. The programme is a part of the CPRSouth conference.</b>
<p style="text-align: justify; ">Read the original announcement published by CPRSouth <a class="external-link" href="http://www.cprsouth.org/cprsouth-2016-young-scholars-programme/">here</a>.</p>
<p style="text-align: justify; ">Following highly successful joint Afro-Asian CPR conferences in Mauritius in 2012, and India in 2013, CPRafrica and CPRsouth formally merged under the banner of CPRsouth in 2014. Since then, CPRsouth has hosted conferences in the Cradle of Humankind in South Africa (2014), and at the Innovation Center for Big Data and Digital Convergence at Yuan Ze University, Taiwan (2015).</p>
<p style="text-align: justify; ">This year’s conference is co-hosted by<em> COSTECH </em>and<em> TCRA </em>in Zanzibar, and will include sessions on cutting-edge developments on ICT policy and regulation in the South and discussion of the research-policy interface.</p>
<p style="text-align: justify; ">30 Young Scholars from Africa and the Asia-Pacific region will be selected to participate in a tutorial programme taught by recognised scholars and practitioners from Africa and Asia, and they will attend the main conference thereafter.</p>
<p style="text-align: justify; "><strong>Tutorials are scheduled to be held on the 6<sup>th</sup> and 7<sup>th</sup> of September 2016, prior to the main CPR<em>south</em> conference.</strong></p>
<p style="text-align: justify; "><strong> Who will qualify?</strong></p>
<ul style="text-align: justify; ">
<li>Masters/PhD students in Economics, Public policy, Communications and Journalism</li>
<li>Officers of government/regulatory agencies undertaking ICT policy research, developing/gathering indicators (monitoring and evaluation)</li>
<li>Staff of private companies in the communication industries working in regulatory affairs</li>
<li>Officers in NGOs/INGOs working in policy and regulation</li>
<li>Researchers from think tanks, university research centres</li>
<li>Journalists covering communication public policy and regulation</li>
</ul>
<p style="text-align: justify; "><strong>Seminar</strong></p>
<p style="text-align: justify; ">The seminar will cover a number of topics of the two days, such as:</p>
<ul style="text-align: justify; ">
<li>policy analysis using supply-side or demand-side data;</li>
<li>ICT impact analysis;</li>
<li>convergence, net neutrality;</li>
<li>funding broadband network extension, open access networks, spectrum;</li>
<li>sector and competition regulation;</li>
<li>research to policy interventions;</li>
<li>Internet governance – privacy, surveillance, human rights online; and</li>
<li>introduction to big data, open data.</li>
</ul>
<p style="text-align: justify; "><em>(2016 tutorial programme still to be confirmed)</em></p>
<p style="text-align: justify; ">Previous tutorial presentations can be accessed at <a href="http://www.cprsouth.org/"><span style="text-decoration: underline;">http://www.cprsouth.org/</span></a></p>
<p style="text-align: justify; "><strong>Application deadline: 22 April 2016</strong></p>
<p style="text-align: justify; "><strong>Application guidelines</strong></p>
<p style="text-align: justify; "><a href="https://form.myjotform.com/60813291616555" target="_blank"><span style="text-decoration: underline;">Applications should be submitted via this link</span></a> by 22 April 2016, and must contain the following:</p>
<ol style="text-align: justify; ">
<li>one-page curriculum vitae; and</li>
<li>one-page write-up outlining why you wish to become an African or Asia-Pacific based expert capable of contributing to ICT related policy and regulatory reform in the region</li>
</ol>
<p style="text-align: justify; ">Applicants’ <strong>write-ups and biographies should be in a single word document</strong>, and named: CPRsouth2016_YoungScholar_ApplicantLastName.</p>
<p style="text-align: justify; "><strong><em>Kindly note:</em></strong><strong> Late applications and applications that do not conform to the prescribed format above will automatically be disqualified.</strong></p>
<p style="text-align: justify; "><strong>Review Criteria</strong></p>
<p style="text-align: justify; ">Applications will be reviewed according to the following criteria:</p>
<ol style="text-align: justify; ">
<li>content of application;</li>
<li>evidence of interest in, and commitment to, policy-relevant research for Africa or the Asia-Pacific region;</li>
<li>quality of writing; and</li>
<li>gender and country representation</li>
</ol>
<p style="text-align: justify; ">The selection committee may contact your supervisor or mentor before making the final selections.</p>
<p style="text-align: justify; ">Candidates selected to participate in the tutorial programme must:</p>
<ul style="text-align: justify; ">
<li>provide a one-page research proposal <em>upon acceptance onto the tutorial programme</em></li>
<li>participate in all tutorial sessions</li>
<li>participate in the entire CPR<em>south</em> 2016 conference</li>
</ul>
<p style="text-align: justify; "><strong>Funding</strong></p>
<p style="text-align: justify; ">Selected young scholars who are passport holders of, and travelling from, low and middle income countries within the Asia Pacific and Africa (as classified by the World Bank http://data.worldbank.org/about/country-classifications/country-and-lending-groups#Low_income) will be provided with:</p>
<ul style="text-align: justify; ">
<li>lowest-cost economy airfare to conference destination (less USD 150 registration fee);</li>
<li>ground transfers between the conference venue and airport; and</li>
<li>twin sharing accommodation on bed and breakfast basis, 5 lunches and 1 dinner for the duration of the conference and tutorials (6 – 10 September 2016). <em>Not all meals are covered.</em></li>
</ul>
<p style="text-align: justify; ">The registration fee for young scholars to attend the conference and tutorials is USD150, and airfares will be reimbursed less this registration fee. Participants will be required to cover:</p>
<ul style="text-align: justify; ">
<li>transport to and from airports in their home countries;</li>
<li>visa fees (if any);</li>
<li>meals not provided; and</li>
<li>any other incidental costs</li>
</ul>
<p style="text-align: justify; "><em>As the registration fee is so low and should be met personally even if there is no institutional support for attendance of the course and conference, please note that only under exceptional circumstances of extreme financial hardship may the organisers consider a waiver of the conference registration fee. Such waivers will be considered on a case-by-case basis and only where a scholar would otherwise be prevented from attending the YS programme and conference.</em></p>
<p style="text-align: justify; "><strong>Visas</strong></p>
<p style="text-align: justify; ">Letters of invitation will be provided for purposes of visa applications after participant selections have been made. Participants are responsible for securing their own visas to enter Tanzania, and are strongly advised to initiate visa approval procedures immediately on receipt of confirmation of their participation.</p>
<p style="text-align: justify; ">Kindly direct all enquiries to Ondine Bello: admin@researchictafrica.net orinfo@CPRsouth.org</p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/news/cprsouth-2016-2013-young-scholars-programme'>http://editors.cis-india.org/internet-governance/news/cprsouth-2016-2013-young-scholars-programme</a>
</p>
No publisherpraskrishnaInternet GovernanceBig Data2016-05-30T02:01:21ZNews ItemUnderstanding Aadhaar and its New Challenges, May 26-27, 2016
http://editors.cis-india.org/internet-governance/events/understanding-aadhaar-and-its-new-challenges-may-26-27-2016
<b>A workshop on “Understanding Aadhaar and its New Challenges” is being organised by the Centre for Studies in Science Policy, Jawaharlal Nehru University, and the Centre for Internet and Society, during May 26-27. It is also supported by the Centre for Communication Governance at NLU Delhi, Free Software Movement of India, Knowledge Commons, PEACE, and Center for Advancement of Public Understanding of Science & Technology. This is a legal and technical workshop to be attended by various key researchers and practitioners to discuss the current status of the implementation of the project, in the context of the passing of the Act and the various ongoing cases.</b>
<p> </p>
<h1>Workshop Programme</h1>
<h3>First Day, May 26</h3>
<table>
<tbody>
<tr>
<td>9:00-9:30</td>
<td><strong>Registration</strong></td>
</tr>
<tr>
<td>9:30-10:00</td>
<td>Prof. Dinesh Abrol - <em>Welcome</em><br />Self-introduction and expectations of participants<br />Dr. Usha Ramanathan - <em>Overview of the Workshop</em></td>
</tr>
<tr>
<td>10:00-11:00</td>
<td><strong>Current Status of Aadhaar</strong><br />Dr. Usha Ramanathan, Legal Researcher, New Delhi - <em>What the 2016 Law Says, and How it Came into Being</em><br />S. Prasanna, Advocate, New Delhi - <em>Status and Force of Supreme Court Orders on Aadhaar</em><br />Discussion</td>
</tr>
<tr>
<td>11:00-11:30</td>
<td><strong>Tea Break</strong></td>
</tr>
<tr>
<td>11:30-13:30</td>
<td><strong>Direct Benefits Transfers</strong><br />Prof. Reetika Khera, Indian Institute of Technology, Delhi - <em>Welfare Needs Aadhaar like a Fish Needs a Bicycle</em><br />Prof. Ram Kumar, Tata Institute of Social Sciences, Mumbai - <em>Aadhaar and the Social Sector: A critical analysis of the claims of benefits and inclusion</em><br />Ashok Rao, Delhi Science Forum - <em>Cash Transfers Study</em><br />Discussion</td>
</tr>
<tr>
<td>13:30-14:30</td>
<td><strong>Lunch</strong></td>
</tr>
<tr>
<td>14:30-16:00</td>
<td><strong>Aadhaar: Science, Technology, and Security</strong><br />Prof. Subashis Banerjee, Deptt of Computer Science & Engineering, IIT, Delhi - <em>Privacy and Security Issues Related to the Aadhaar Act</em><br />Pukhraj Singh, former National Cyber Security Manager, Aadhaar, New Delhi - <em>Aadhaar: Security and Surveillance Dimensions</em><br />Discussion</td>
</tr>
<tr>
<td>16:00-16:30</td>
<td><strong>Tea Break</strong></td>
</tr>
<tr>
<td>16:30-17:30</td>
<td><strong>Aadhaar - International Dimensions</strong><br />Prof. Chinmayi Arun, Center for Communication Governance, National Law University, Delhi - <em>Biometrics and Mandatory IDs in other parts of the world</em><br />Dr. Gopal Krishna, Citizens Forum for Civil Liberties - <em>International Dimensions of Aadhaar
</em><br />Discussion</td>
</tr>
<tr>
<td>17:30-18:00</td>
<td><strong>High Tea</strong></td>
</tr>
<tr>
<td>18:00-19:00</td>
<td><strong>Video Presentations</strong></td>
</tr>
</tbody>
<tbody></tbody>
</table>
<h3>Second Day, May 27</h3>
<table>
<tbody>
<tr></tr>
<tr>
<td>9:30-11:00</td>
<td><strong>Privacy, Surveillance, and Ethical Dimensions of Aadhaar</strong><br />Prabir Purkayastha, Free Software Movement of India, New Delhi - <em>Surveillance Capitalism and the Commodification of Personal Data</em><br />Arjun Jayakumar, SFLC - <em>Surveillance Projects Amalgamated</em><br />Col Mathew Thomas, Bengaluru
- <em>The Deceit of Aadhaar</em><br />Discussion</td>
</tr>
<tr>
<td>11:00-11:30</td>
<td><strong>Tea Break</strong></td>
</tr>
<tr>
<td>11:30-10:30</td>
<td><strong>Aadhaar: Broad Issues - I</strong><br />Prof. G Nagarjuna, Homi Bhabha Center for Science Education, Tata Institute of Fundamental Research, Mumbai - <em>How to prevent linked data in the context of Aadhaar</em><br />Dr. Anupam Saraph, Pune - <em>Aadhaar and Moneylaundering</em><br />Discussion</td>
</tr>
<tr>
<td>13:00-13:30</td>
<td><strong>Video Presentations</strong></td>
</tr>
<tr>
<td>13:30-14:30</td>
<td><strong>Lunch</strong></td>
</tr>
<tr>
<td>14:30-15:30</td>
<td><strong>Aadhaar: Broad Issues - II</strong><br />Prof. MS Sriram, Visiting Faculty, Indian Institute of Management, Bangalore - <em>Financial lnclusion</em><br />Nikhil Dey, MKSS, Rajasthan (TBC) - <em>Field witness: Technology on the Ground</em><br />Prof. Himanshu, Centre for Economic Studies & Planning, JNU - <em>UID Process and Financial Inclusion</em><br />Discussion</td>
</tr>
<tr>
<td>15:30-16:00</td>
<td><strong>Conclusion</strong></td>
</tr>
</tbody>
<tbody></tbody>
</table>
<p> </p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/events/understanding-aadhaar-and-its-new-challenges-may-26-27-2016'>http://editors.cis-india.org/internet-governance/events/understanding-aadhaar-and-its-new-challenges-may-26-27-2016</a>
</p>
No publishersumandroUIDBig DataPrivacyInternet GovernanceAadhaarBiometrics2016-05-26T10:29:43ZEventIdentity of the Aadhaar Act: Supreme Court and the Money Bill Question
http://editors.cis-india.org/internet-governance/blog/identity-of-the-aadhaar-act-supreme-court-and-the-money-bill-question
<b>A writ petition has been filed by former Union minister Jairam Ramesh on April 6 challenging the constitutionality and legality of the treatment of this Act as a money bill. The Supreme Court heard the matter on April 25 and invited the Union government to present its view. It is our view that the Supreme Court can not only review the Lok Sabha speaker’s decision, but should also ask the government to draft the Aadhaar Bill again, this time with greater parliamentary and public deliberation. Vanya Rakesh and Sumandro Chattapadhyay wrote this article on The Wire.</b>
<p> </p>
<p>Published by and cross-posted from <a href="http://thewire.in/2016/05/09/identity-of-the-aadhaar-act-supreme-court-and-the-money-bill-question-34721/">The Wire</a>.</p>
<hr />
<p>The Aadhaar Act 2016, passed in the Lok Sabha on March 16, 2016, <a href="http://www.thehindu.com/news/national/opposition-picks-holes-in-aadhaar-bill/article8361213.ece">faced opposition</a> ever since it was tabled in parliament. In particular, the move to introduce it as a money bill has been vehemently challenged on grounds of this being an attempt to bypass the Rajya Sabha completely. <a href="http://www.thehindu.com/news/national/jairam-ramesh-moves-supreme-court-against-treating-aadhaar-bill-as-money-bill/article8446997.ece">A writ petition has been filed by former Union minister Jairam Ramesh on April 6</a> challenging the constitutionality and legality of the treatment of this Act as a money bill. The Supreme Court heard the matter on April 25 and invited the Union government to present its view.</p>
<p>It is our view that the Supreme Court can not only review the Lok Sabha speaker’s decision, but should also ask the government to draft the Aadhaar Bill again, this time with greater parliamentary and public deliberation.</p>
<h3>The money bill question</h3>
<p>M.R. Madhavan <a href="http://indianexpress.com/article/opinion/columns/aadhaar-bill-money-bill-name-of-the-bill-2754080/">has argued</a> that the Aadhaar Act contains matters other than “only” those incidental to expenditure from the consolidated fund, as it establishes a biometrics-based unique identification number for beneficiaries of government services and benefits, but also allows the number to be used for other purposes beyond service delivery. While Pratap Bhanu Mehta <a href="http://indianexpress.com/article/opinion/columns/privacy-after-aadhaar-money-bill-rajya-sabha-upa/">calls this a subversion</a> of “the spirit of the constitution”, P.D.T. Achary, former secretary general of the Lok Sabha, <a href="http://indianexpress.com/article/opinion/columns/show-me-the-money-4/">expressed concern</a> about the attempts to pass off financial bills like Aadhaar as money bills as a means to <a href="http://www.thehindu.com/opinion/lead/circumventing-the-rajya-sabha/article7531467.ece">circumvent</a> and erode the supervisory role of the Rajya Sabha. Arvind Datar has further emphasised that when the primary purpose of a bill is not governed by Article 110(1), then certifying it as a money bill is <a href="http://indianexpress.com/article/opinion/columns/making-a-money-bill-of-it/">an unconstitutional act</a>.</p>
<p>Article 110(1) of the Constitution identifies a bill as a money bill if it contains “only” provisions dealing with the following matters, or those incidental to them:</p>
<ol>
<li>imposition and regulation of any tax,</li>
<li>financial obligations undertaken by Indian Government,</li>
<li>payment into or withdrawal from the Consolidated Fund of India (CFI) or Contingent Fund of India,</li>
<li>appropriation of money and expenditure charged on the CFI or receipt, and</li>
<li>custody, issue or audit of money into CFI or public account of India.</li></ol>
<p>However, the link of the Act with the Consolidated Fund of India is rather tenuous, since it depends on the Union or state governments declaring a certain subsidy to be available upon verification of the Aadhaar number. The objectives and validity of the Act would not actually change if the Aadhaar number no longer was directly connected to the delivery of services. The use of the word “if” in section 7 explicitly leaves scope for a situation where the government does not declare an Aadhaar verification as necessary for accessing a subsidy. In such a scenario, the Act will still be valid but without any formal connection with any charges on the Consolidated Fund of India.</p>
<h3>A case of procedural irregularity?</h3>
<p>The constitution of India borrows the idea of providing the speaker with the authority to certify a bill as money bill from British law, but operationalises it differently. In the UK, though the speaker’s certificate on a money bill is <a href="https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/480476/Money_Bills__12_Nov_2015___accessible_PDF_.pdf">conclusive</a> for all purposes under section 3 of the Parliament Act 1911, the speaker is <a href="http://www.publications.parliament.uk/pa/ld201011/ldselect/ldconst/97/9703.htm">required to consult</a> two senior members, usually one from either side of the house, appointed by the committee from amongst those senior MPs who chair general committees. In India, the speaker makes the decision on her own.</p>
<p>Although article 110 (3) of the Indian constitution states that the decision of the speaker of the Lok Sabha shall be final in case a question arises regarding whether a bill is a money bill or not, this does not restrict the Supreme Court from entertaining and hearing a petition contesting the speaker’s decision. As the Aadhaar Act was introduced in the Lok Sabha as a money bill even though it does not meet the necessary criteria for such a classification, this treatment of the bill may be considered as an instance of <em>procedural irregularity</em>.</p>
<p>There is ample jurisprudence on what happens when the Supreme Court’s power of judicial review comes up against Article 122 – which states that the validity of any proceeding in the parliament can (only) be called into question on the grounds of procedural irregularities. In the crucial judgment of <a href="https://indiankanoon.org/doc/1757390/"><em>Raja Ram Pal vs Hon’ble Speaker, Lok Sabha and Others</em></a> (2007), the court evaluated the scope of judicial review and observed that although parliament is supreme, unlike Britain, proceedings which are found to suffer from substantive illegality or unconstitutionality, cannot be held protected from judicial scrutiny by article 122, as opposed to mere irregularity. Deciding upon the scope for judicial intervention in respect of exercise of power by the speaker, in <a href="https://indiankanoon.org/doc/1686885/"><em>Kihoto Hollohan vs Zachillhu and Ors.</em></a> (1992), the Supreme Court held that though the speaker of the house holds a pivotal position in a parliamentary democracy, the decision of the speaker (while adjudicating on disputed disqualification) is subject to judicial review that may look into the correctness of the decision.</p>
<p>Several past decisions of the Supreme Court discuss how the tests of legality and constitutionality help decide whether parliamentary proceedings are immune from judicial review or not. In <a href="https://indiankanoon.org/doc/1249806/"><em>Ramdas Athawale vs Union of India</em></a> (2010), the case of <a href="https://indiankanoon.org/doc/638013/"><em>Keshav Singh vs Speaker, Legislative Assembly</em></a> (1964) was referred to, in which the judges had unequivocally upheld the judiciary’s power to scrutinise the actions of the speaker and the houses. It was observed that if the parliamentary procedure is illegal and unconstitutional, it would be open to scrutiny in a court of law and could be a ground for interference by courts under <a href="https://indiankanoon.org/doc/981147/">Article 32</a>, though the immunity from judicial interference under this article is confined to matters of irregularity of procedure. These observations were reiterated in <a href="https://indiankanoon.org/docfragment/108219590/?formInput=lokayukta"><em>Mohd. Saeed Siddiqui vs State of Uttar Pradesh</em></a> (2014) and <a href="https://indiankanoon.org/doc/199851373/"><em>Yogendra Kumar Jaiswal vs State of Bihar</em></a> (2016).</p>
<p>Thus, the decision of the Lok Sabha speaker to pass and certify a bill as a money bill is definitely not immune from judicial review. Additionally, the Supreme Court has the power to issue directions, orders or writs for enforcement of rights under Article 32 of the constitution, therefore, allowing the judiciary to decide upon the manner of introducing the Aadhaar Act in parliament.</p>
<h3>National implications demand public deliberation</h3>
<p>As the provisions of the Aadhaar Act have <a href="http://indianexpress.com/article/opinion/columns/privacy-after-aadhaar-money-bill-rajya-sabha-upa/">far reaching implications</a> for the fundamental and constitutional rights of Indian citizens, the Supreme Court should look into the matter of its identification and treatment as a money bill and whether such decisions lead to the thwarting of legislative and procedural justice.</p>
<p>The Supreme Court may also take this opportunity to reflect on the very decision making process for classification of bills in general. As <a href="http://www.thehoot.org/media-watch/law-and-policy/aadhar-why-classification-matters-in-law-making-9281">Smarika Kumar argues</a>, experience with the Aadhaar Act reveals a structural concern regarding this classification process, which may have substantial implications in terms of undermining public and parliamentary deliberative processes. This “trend,” as <a href="http://indianexpress.com/article/opinion/columns/making-a-money-bill-of-it/">Arvind Datar notes</a>, of limiting legislative discussions and decisions of national importance within the space of the Lok Sabha must be swiftly curtailed.</p>
<p>Apart from deciding upon the legality of the nature of the bill, it is vital that the apex court ask the government to categorically respond to the concerns red-flagged by the <a href="http://164.100.47.134/lsscommittee/Finance/15_Finance_42.pdf">Standing Committee on Finance</a>, which had taken great exception to the continued collection of data and issuance of Aadhaar numbers in its report, and to the recommendations <a href="http://thewire.in/2016/03/16/three-rajya-sabha-amendments-that-will-shape-the-aadhaar-debate-24993/">passed in the Rajya Sabha recently</a>. Further, the repeated violation of the Supreme Court’s interim orders – that the Aadhaar number cannot be made mandatory for availing benefits and services – in contexts ranging from <a href="http://www.caravanmagazine.in/vantage/how-get-married-without-aadhaar-number">marriages</a> to the <a href="http://www.thehindu.com/news/national/payment-denied-for-nrega-workers-without-uidai-cards-in-jharkhand/article5674969.ece">guaranteed work programme</a> should also be addressed and responses sought from the Union government.</p>
<p>Evidently, the substantial implications of the Aadhaar Act for national security and fundamental rights of citizens, primarily privacy and data security, make it imperative to conduct a duly balanced public deliberation process, both within and outside the houses of parliament, before enacting such a legislation.</p>
<p> </p>
<p> </p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/blog/identity-of-the-aadhaar-act-supreme-court-and-the-money-bill-question'>http://editors.cis-india.org/internet-governance/blog/identity-of-the-aadhaar-act-supreme-court-and-the-money-bill-question</a>
</p>
No publisherVanya Rakesh and Sumandro ChattapadhyayUIDBig DataPrivacyInternet GovernanceAadhaar2016-05-09T11:52:44ZBlog EntryCall for Proposal: Big Data for Development – Initial Field Studies
http://editors.cis-india.org/jobs/call-for-proposal-big-data-for-development-field-studies
<b>The Centre for Internet and Society, as part of a project with the University of Manchester and University of Sheffield, is inviting calls from researchers to undertake a brief initial study of a specific instance of use of big data for development in India. This is an exercise to build preliminary understanding of the landscape of big data for development in India, identify key research questions and priorities, and start developing connections with researchers interested in the field. The studies will be 6 weeks long - running from May to June 2016 - and the researchers are expected to produce a 3,000 words long report. We will support three field studies.</b>
<p> </p>
<h3>Study Process and Deliverable</h3>
<p>The researcher is expected to propose and undertake a 6 weeks long study – starting from <strong>May 09</strong> and ending on <strong>June 17</strong> – of an instance of big data is being used to inform, target, operationalise, monitor, or support developmental and/or humanitarian activity in India.</p>
<p>During this period, the researcher is expected to interview <strong>4-5</strong> persons directly involved in the big data for development project concerned, and <strong>2-3</strong> other persons to get a wider sense of the context of the project.</p>
<p>By the end of the 6 weeks period, the researcher is expected to submit a <strong>3,000 words</strong> long report. The report will be commented upon by Prof. Richard Heeks (University of Manchester), Dr. Christopher Foster (University of Sheffield), and Sumandro Chattapadhyay (CIS), and revised accordingly during the last weeks of June.</p>
<p>The individual reports will be published independently and as part of the larger project report, under Creative Commons <a href="https://creativecommons.org/licenses/by/4.0/">Attribution 4.0 International</a> license. The authors will be attributed appropriately.</p>
<p>All researchers will take part in a work-in-progress meeting (held over internet) during last week of May or first week of June.</p>
<h3>Research Questions</h3>
<p>The interviews will focus on the following topics:</p>
<ul><li><strong>Innovation:</strong> What is the nature of the innovation being done by the use of big data? What technical systems and/or applications are being deployed and replaced/superceded? Who are key actors in this innovation process?</li>
<li><strong>Implementation:</strong> What is the grounded experience of implementing the big data technology? What are the key enablers and constraints being faced, both in the data collection stage, and the analysis and decision making stage?</li>
<li><strong>Value:</strong> What is the value being created, and how is it understood? Is it organisational value, or socio-economic value? Who is gaining this value?</li>
<li><strong>Ethics:</strong> What ethical concerns are emerging? Do they involve concerns about data quality, representation, privacy, or security? Is there concerns about a data divide being created among people who are represented in data and who are not, or among people who can gain value from the data and who cannot?</li></ul>
<h3>Application, Eligibility, and Remuneration</h3>
<p>Please submit the following documents to apply:</p>
<ul><li><strong>Proposal:</strong> A one page note on the big data for development project that you would like to study. Please share a brief description of the project and how you will study it, including the name/designation of key people you will speak to.</li>
<li><strong>Writing Sample:</strong> An article or a collection of articles, of not more than 8,000 words length in total.</li>
<li><strong>CV:</strong> A short CV, two pages or less.</li></ul>
<p>Please e-mail the documents to <strong>raw[at]cis-india[dot]org</strong> by <strong>Wednesday, May 04</strong>, 2016.</p>
<p>There is <strong>no eligibility criteria</strong> for submitting proposals. However, we will prioritise researchers living and studying big data for development projects in <strong>non <a href="https://en.wikipedia.org/wiki/Classification_of_Indian_cities">X-class</a> cities</strong>, that is in cities other than Ahmedabad, Bangalore, Chennai, Delhi, Hyderabad, Kolkata, Mumbai, and Pune.</p>
<p>We will select <strong>three</strong> researchers, and will offer <strong>Rs. 35,000</strong> to each of them for this study. The amount will be paid in a <strong>single</strong> installment, <strong>after</strong> the draft field study report is submitted for comments.</p>
<p> </p>
<p>
For more details visit <a href='http://editors.cis-india.org/jobs/call-for-proposal-big-data-for-development-field-studies'>http://editors.cis-india.org/jobs/call-for-proposal-big-data-for-development-field-studies</a>
</p>
No publishersumandroBig DataData SystemsBig Data for DevelopmentResearchResearchers at Work2016-04-28T07:28:23ZBlog EntryAadhaar Bill 2016 Evaluated against the National Privacy Principles
http://editors.cis-india.org/internet-governance/aadhaar-bill-2016-evaluated-against-the-national-privacy-principles
<b>In this infographic, we evaluate the privacy provisions of the Aadhaar Bill 2016 against the national privacy principles developed by the Group of Experts on Privacy led by the Former Chief Justice A.P. Shah in 2012. The infographic is based on Vipul Kharbanda’s article 'Analysis of Aadhaar Act in the Context of A.P. Shah Committee Principles,' and is designed by Pooja Saxena, with inputs from Amber Sinha.</b>
<p> </p>
<h4>Download the infographic: <a href="https://github.com/cis-india/website/raw/master/infographics/CIS_Aadhaar-2016-Vs-Privacy-Principles_v.1.0.pdf">PDF</a> and <a href="https://github.com/cis-india/website/raw/master/infographics/CIS_Aadhaar-2016-Vs-Privacy-Principles_v.1.0.png">PNG</a>.</h4>
<p> </p>
<p><strong>License:</strong> It is shared under Creative Commons <a href="https://creativecommons.org/licenses/by/4.0/">Attribution 4.0 International</a> License.</p>
<p> </p>
<img src="https://github.com/cis-india/website/raw/master/infographics/CIS_Aadhaar-2016-Vs-Privacy-Principles_v.1.0.png" alt="Aadhaar Bill 2016 Evaluated against the National Privacy Principles" />
<p> </p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/aadhaar-bill-2016-evaluated-against-the-national-privacy-principles'>http://editors.cis-india.org/internet-governance/aadhaar-bill-2016-evaluated-against-the-national-privacy-principles</a>
</p>
No publisherPooja Saxena and Amber SinhaUIDBig DataPrivacyInternet GovernanceInfographicDigital IndiaAadhaarBiometrics2016-03-21T08:38:34ZBlog EntryVulnerabilities in the UIDAI Implementation Not Addressed by the Aadhaar Bill, 2016
http://editors.cis-india.org/internet-governance/blog/vulnerabilities-in-the-uidai-implementation-not-addressed-by-the-aadhaar-bill-2016
<b>In this infographic, we document the various issues in the Aadhaar enrolment process implemented by the UIDAI, and highlight the vulnerabilities that the Aadhaar Bill, 2016 does not address. The infographic is based on Vidushi Marda’s article 'Data Flow in the Unique Identification Scheme of India,' and is designed by Pooja Saxena, with inputs from Amber Sinha.</b>
<p> </p>
<h4>Download the infographic: <a href="https://github.com/cis-india/website/raw/master/infographics/CIS_Aadhaar-2016-Enrolment-Vulnerabilities_v.1.0.pdf">PDF</a> and <a href="https://github.com/cis-india/website/raw/master/infographics/CIS_Aadhaar-2016-Enrolment-Vulnerabilities_v.1.0.png">PNG</a>.</h4>
<p> </p>
<p><strong>Credits:</strong> The illustration uses the following icons from The Noun Project - <a href="https://thenounproject.com/term/fingerprint/231547/">Thumpbrint</a> created by Daouna Jeong, Duplicate created by Pham Thi Dieu Linh, <a href="https://thenounproject.com/term/copy/377777/">Copy</a> created by Mahdi Ehsaei.</p>
<p><strong>License:</strong> It is shared under Creative Commons <a href="https://creativecommons.org/licenses/by/4.0/">Attribution 4.0 International</a> License.</p>
<p> </p>
<img src="https://github.com/cis-india/website/raw/master/infographics/CIS_Aadhaar-2016-Enrolment-Vulnerabilities_v.1.0.png" alt="Vulnerabilities in the UIDAI Implementation Not Addressed by the Aadhaar Bill, 2016" />
<p> </p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/blog/vulnerabilities-in-the-uidai-implementation-not-addressed-by-the-aadhaar-bill-2016'>http://editors.cis-india.org/internet-governance/blog/vulnerabilities-in-the-uidai-implementation-not-addressed-by-the-aadhaar-bill-2016</a>
</p>
No publisherPooja Saxena and Amber SinhaUIDBig DataPrivacyInternet GovernanceInfographicDigital IndiaAadhaarBiometrics2016-03-21T08:33:53ZBlog EntryAdoption of Standards in Smart Cities - Way Forward for India
http://editors.cis-india.org/internet-governance/blog/adoption-of-standards-in-smart-cities-way-forward-for-india
<b>With a paradigm shift towards the concept of “Smart Cities’ globally, as well as India, such cities have been defined by several international standardization bodies and countries, however, there is no uniform definition adopted globally. The glue that allows infrastructures to link and operate efficiently is standards as they make technologies interoperable and efficient.</b>
<p style="text-align: justify; "><b><a href="http://editors.cis-india.org/internet-governance/blog/adoption-of-standards-in-smart-cities.pdf" class="internal-link">Click here to download the full file</a></b></p>
<p style="text-align: justify; ">Globally, the pace of urbanization is increasing exponentially. The world’s urban population is projected to rise from 3.6 billion to 6.3 billion between 2011 and 2050. A solution for the same has been development of sustainable cities by improving efficiency and integrating infrastructure and services <strong>[1]</strong>. It has been estimated that during the next 20 years, 30 Indians will leave rural India for urban areas every minute, necessitating smart and sustainable cities to accommodate them <strong>[2]</strong>. The Smart Cities Mission of the Ministry of Urban Development was announced in the year 2014, followed by selection of 100 cities in the year 2015 and 20 of them being selected for the first Phase of the project in the year 2016. The Mission <strong>[3]</strong> lists the “core infrastructural elements” that a smart city would incorporate like adequate water supply, assured electricity, sanitation, efficient public transport, affordable housing (especially for the poor), robust IT connectivity and digitisation, e-governance and citizen participation, sustainable environment, safety and security for citizens, health and education.</p>
<p style="text-align: justify; ">With a paradigm shift towards the concept of “Smart Cities’ globally, as well as India, such cities have been defined by several international standardization bodies and countries, however, there is no uniform definition adopted globally. The envisioned modern and smart city promises delivery of high quality services to the citizens and will harness data capture and communication management technologies. The performance of such cities would be monitored on the basis of physical as well as the social structure comprising of smart approaches and solution to utilities and transport.</p>
<p style="text-align: justify; ">The glue that allows infrastructures to link and operate efficiently is standards as they make technologies interoperable and efficient. Interoperability is essential and to ensure smart integration of various systems in a smart city, internationally agreed standards that include technical specifications and classifications must be adhered to. Development of international standards ensure seamless interaction between components from different suppliers and technologies <strong>[4]</strong>.</p>
<p style="text-align: justify; ">Standardized indicators within standards benefit smart cities in the following ways:</p>
<ol style="text-align: justify; ">
<li>
<div style="text-align: justify; ">Effective governance and efficient delivery of services.</div>
</li>
<li>
<div style="text-align: justify; ">International and Local targets, benchmarking and planning.</div>
</li>
<li>
<div style="text-align: justify; ">Informed decision making and policy formulation.</div>
</li>
<li>
<div style="text-align: justify; ">Leverage for funding and recognition in international entities.</div>
</li>
<li>
<div style="text-align: justify; ">Transparency and open data for investment attractiveness.</div>
</li>
<li>
<div style="text-align: justify; ">A reliable foundation for use of big data and the information explosion to assist cities in building core knowledge for city decision-making, and enable comparative insight.</div>
</li>
</ol>
<p style="text-align: justify; ">The adoption of standards for smart cities has been advocated across the world as they are perceived to be an effective tool to foster development of the cities. The Director of the ITU Telecommunication Standardization Bureau Chaesub Lee is of the view that “Smart cities will employ an abundance of technologies in the family of the Internet of Things (IoT) and standards will assist the harmonized implementation of IoT data and applications , contributing to effective horizontal integration of a city’s subsystems” <strong>[5]</strong>.</p>
<h3 style="text-align: justify; ">Smart Cities standards in India</h3>
<p style="text-align: justify; ">National Association of Software and Services Companies (NASSCOM) partnered with Accenture <strong>[6]</strong> to prepare a report called ‘Integrated ICT and Geospatial Technologies Framework for 100 Smart Cities Mission’ <strong>[7]</strong> to explore the role of ICT in developing smart cities <strong>[8]</strong>, after the announcement of the Mission by Indian Government. The report, released in May 2015, lists down 55 global standards, keeping in view several city sub-systems like urban planning, transport, governance, energy, climate and pollution management, etc which could be applicable to the smart cities in India.</p>
<p style="text-align: justify; ">Though NASSCOM is working closely with the Ministry of Urban Development to create a sustainable model for smart cities <strong>[9]</strong>, due to lack of regulatory standards for smart cities, the Bureau of Indian Standards (BIS) in India has undertaken the task to formulate standardised guidelines for central and state authorities in planning, design and construction of smart cities by setting up a technical committee under the Civil engineering department of the Bureau. However, adoption of the standards by implementing agencies would be voluntary and intends to complement internationally available documents in this area <strong>[10]</strong>.</p>
<p style="text-align: justify; ">Developing national standards in line with these international standards would enable interoperability (i.e. devices and systems working together) and provide a roadmap to address key issues like data protection, privacy and other inherent risks in the digital delivery and use of public services in the envisioned smart cities, which call for comprehensive data management standards in India to instill public confidence and trust <strong>[11]</strong>.</p>
<h3 style="text-align: justify; ">Key International Smart Cities Standards</h3>
<p style="text-align: justify; ">Following are the key internationally accepted and recognized Smart Cities standards developed by leading organisations and the national standardization bodies of several countries that India could adopt or develop national standards in line with these.</p>
<h4 style="text-align: justify; ">The International Organization for Standardization (ISO) - Smart Cities Standards</h4>
<p style="text-align: justify; ">ISO is an instrumental body advocating and developing for smart cities to safeguard rights of the people against a liveable and sustainable environment. The ISO Smart Cities Strategic Advisory Group uses the following working definition: A ‘Smart City’ is one that dramatically increases the pace at which it improves its social, economic and environmental (sustainability) outcomes, responding to challenges such as climate change, rapid population growth, and political and economic instability by fundamentally improving how it engages society, how it applies collaborative leadership methods, how it works across disciplines and city systems, and how it uses data information and modern technologies in order to transform services and quality of life for those in and involved with the city (residents, businesses, visitors), now and for the foreseeable future, without unfair disadvantage of others or degradation of the natural environment. [For details see ISO/TMB Smart Cities Strategic Advisory Group Final Report, September 2015 ( ISO Definition, June 2015)].</p>
<p style="text-align: justify; ">The ISO Technical Committee 268 works on standardization in the field of Sustainable Development in Communities <strong>[12]</strong> to encourage the development and implementation of holistic, cross-sector and area-based approaches to sustainable development in communities. The Committee comprises of 3 Working Groups <strong>[13]</strong>:</p>
<ul style="text-align: justify; ">
<li>
<div style="text-align: justify; ">Working Group 1: System Management ISO 37101- This standard sets requirements, guidance and supporting techniques for sustainable development in communities. It is designed to help all kinds of communities manage their sustainability, smartness and resilience to improve the contribution of communities to sustainable development and assess their performance in this area <strong>[14]</strong>.</div>
</li>
<li>
<div style="text-align: justify; ">Working Group 2 : City Indicators- The key Smart Cities Standards developed by ISO TC 268 WG 2 (City Indicators) are:</div>
</li>
</ul>
<h4 style="text-align: justify; ">ISO 37120 Sustainable Development of Communities — Indicators for City Services and Quality of Life</h4>
<p style="text-align: justify; ">One of the key standards and an important step in this regard was ISO 37120:2014 under the ISO’s Technical Committee 268 (See Working on Standardization in the field of Sustainable Development in Communities) providing clearly defined city performance indicators (divided into core and supporting indicators) as a benchmark for city services and quality of life, along with a standard approach for measuring each for city leaders and citizens <strong>[15]</strong>. The standard is global in scope and can help cities prioritize city budgets, improve operational transparency, support open data and applications <strong>[16]</strong>. It follows the principles <strong>[17]</strong> set out and can be used in conjunction with ISO 37101.</p>
<p style="text-align: justify; ">ISO 37120 was the first ISO Standard on Global City Indicators published in the year 2014, developed on the basis of a set of indicators developed and extensively tested by the Global City Indicators Facility (a project by University of Toronto) and its 250+ member cities globally. GCIF is committed to build standardized city indicators for performance management including a database of comparable statistics that allow cities to track their effectiveness on everything from planning and economic growth to transportation, safety and education <strong>[18]</strong>.</p>
<p style="text-align: justify; ">The World Council on City Data (WCCD) <strong>[19]</strong> - a sister organization of the GCI/GCIF - was established in the year 2014 to operationalize ISO 37120 across cities globally. The standards encompasses 100 indicators developed around 17 themes to support city services and quality of life, and is accessible through the WCCD Open City Data Portal which allows for cutting-edge visualizations and comparisons. Indian cities are not yet listed with WCCD <strong>[20]</strong>.</p>
<p style="text-align: justify; ">The indicators are listed under the following heads <strong>[21]</strong>:</p>
<ol style="text-align: justify; ">
<li>
<div style="text-align: justify; ">Economy</div>
</li>
<li>
<div style="text-align: justify; ">Education</div>
</li>
<li>
<div style="text-align: justify; ">Environment</div>
</li>
<li>
<div style="text-align: justify; ">Energy</div>
</li>
<li>
<div style="text-align: justify; ">Finance</div>
</li>
<li>
<div style="text-align: justify; ">Fire and Emergency Responses</div>
</li>
<li>
<div style="text-align: justify; ">Governance</div>
</li>
<li>
<div style="text-align: justify; ">Health</div>
</li>
<li>
<div style="text-align: justify; ">Safety</div>
</li>
<li>
<div style="text-align: justify; ">Shelter</div>
</li>
<li>
<div style="text-align: justify; ">Recreation</div>
</li>
<li>
<div style="text-align: justify; ">Solid Waste</div>
</li>
<li>
<div style="text-align: justify; ">Telecommunication and innovation</div>
</li>
<li>
<div style="text-align: justify; ">Transportation</div>
</li>
<li>
<div style="text-align: justify; ">Urban Planning</div>
</li>
<li>
<div style="text-align: justify; ">Waste water</div>
</li>
<li>
<div style="text-align: justify; ">Water and Sanitation</div>
</li>
</ol>
<p style="text-align: justify; ">This International Standard is applicable to any city, municipality or local government that undertakes to measure its performance in a comparable and verifiable manner, irrespective of size and location or level of development. City indicators have the potential to be used as critical tools for city managers, politicians, researchers, business leaders, planners, designers and other professionals <strong>[22]</strong>. The WCCD forum highlights need for cities to have a set of globally standardized indicators to <strong>[23]</strong>:</p>
<ol style="text-align: justify; ">
<li>
<div style="text-align: justify; ">Manage and make informed decisions through data analysis</div>
</li>
<li>
<div style="text-align: justify; ">Benchmark and target</div>
</li>
<li>
<div style="text-align: justify; ">Leverage Funding with senior levels of government</div>
</li>
<li>
<div style="text-align: justify; ">Plan and establish new frameworks for sustainable urban development</div>
</li>
<li>
<div style="text-align: justify; ">Evaluate the impact of infrastructure projects on the overall performance of a city.</div>
</li>
</ol>
<h4 style="text-align: justify; ">ISO/DTR 37121- Inventory and Review of Existing Indicators on Sustainable Development and Resilience in Cities</h4>
<p style="text-align: justify; ">The second standard under ISO TC 268 WG 2 is ISO 37121, which defines additional indicators related to sustainable development and resilience in cities. Some of the indicators include: Smart Cities, Smart Grid, Economic Resilience, Green Buildings, Political Resilience, Protection of biodiversity, etc. The complete list can be viewed on the Resilient Cities website <strong>[24]</strong>.</p>
<p style="text-align: justify; "><strong>Working Group 3:</strong> Terminology - There are no publicly available documents so far, giving details about the status of the activities of this group. The ISO Technical Committee 268 also includes Sub Committee 1 (Smart Community Infrastructure) <strong>[25]</strong>, comprising of the following Working Groups: 1) WG 1 Infrastructure metrics, and 2) WG 2 Smart Community Infrastructure.</p>
<p style="text-align: justify; ">The key Smart Cities Standards developed by ISO under this are:</p>
<ul style="text-align: justify; ">
<li>
<p style="text-align: justify; "><strong>ISO 37151:2015 Smart community infrastructures — Principles and Requirements for Performance Metrics</strong><br />In the year 2015, a new ISO technical specification for smart cities- 37151:2015 for Principles and requirements for performance metrics was released. The purpose of standardization in the field of smart community infrastructures such as energy, water, transportation, waste, information and communications technology (ICT), etc. is to promote the international trade of community infrastructure products and services and improve sustainability in communities by establishing harmonized product standards <strong>[26]</strong>. The metrics in this standard will support city and community managers in planning and measuring performance, and also compare and select procurement proposals for products and services geared at improving community infrastructures <strong>[27]</strong>. <br />This Technical Specification gives principles and specifies requirements for the definition,identification, optimization, and harmonization of community infrastructure performance metrics, and gives recommendations for analysis, regarding interoperability, safety, security of community infrastructures <strong>[28]</strong>. This new Technical Specification supports the use of the ISO 37120 <strong>[29]</strong>.</p>
</li>
<li>
<p style="text-align: justify; "><strong>ISO/TR 37150:2014 Smart Community Infrastructures - Review of Existing Activities Relevant to Metrics<br /></strong>This standard addresses community infrastructures such as energy, water, transportation, waste and information and communications technology (ICT). Smart community infrastructures take into consideration environmental impact, economic efficiency and quality of life by using information and communications technology (ICT) and renewable energies to achieve integrated management and optimized control of infrastructures. Integrating smart community infrastructures for a community helps improve the lifestyles of its citizens by, for example: reducing costs, increasing mobility and accessibility, and reducing environmental pollutants.<br />ISO/TR 37150 reviews relevant metrics for smart community infrastructures and provides stakeholders with a better understanding of the smart community infrastructures available around the world to help promote international trade of community infrastructure products and give information about leading-edge technologies to improve sustainability in communities <strong>[30]</strong>. This standard, along with the above mentioned standards <strong>[31]</strong> supports the multi-billion dollar smart cities technology industry.</p>
</li>
</ul>
<p style="text-align: justify; ">Several other ISO Working Groups developing standards applicable to smart and sustainable cities have been listed in our website <strong>[32]</strong>.</p>
<h4 style="text-align: justify; ">The International Telecommunications Union (ITU)</h4>
<p style="text-align: justify; ">The ITU is another global body working on development of standards regarding smart cities.</p>
<p style="text-align: justify; ">A study group was formed in the year 2015 to tackle standardization requirements for the Internet of Things, with an initial focus on IoT applications in smart cities to address urban development challenges <strong>[33]</strong>, to enable the coordinated development of IoT technologies, including machine-to-machine communications and ubiquitous sensor networks. The group is titled “ITU-T Study Group 20: IoT and its applications, including smart cities and communities”, established to develop standards that leverage IoT technologies to address urban-development challenges and the mechanisms for the interoperability of IoT applications and datasets employed by various vertically oriented industry sectors <strong>[34]</strong>.</p>
<p style="text-align: justify; ">ITU-T also concluded a focused study group looking at smart sustainable cities in May 2015, acting as an open platform for smart city stakeholders to exchange knowledge in the interests of identifying the standardized frameworks needed to support the integration of ICT services in smart cities. Its parent group is ITU-T Study Group 5, which has agreed on the following definition of a Smart Sustainable City:<br />"A smart sustainable city is an innovative city that uses information and communication technologies (ICTs) and other means to improve quality of life, efficiency of urban operation and services, and competitiveness, while ensuring that it meets the needs of present and future generations with respect to economic, social, environmental as well as cultural aspects".</p>
<h4 style="text-align: justify; ">UK - British Standards Institution</h4>
<p style="text-align: justify; ">Apart from the global standards setting organisations, many countries have been looking at developing standards to address the growth of smart cities across the globe. In the UK, the British Standards Institution (BSI) has been commissioned by the UK Department of Business, Innovation and Skills (BIS) to conceive a Smart Cities Standards Strategy to identify vectors of smart city development where standards are needed. The standards would be developed through a consensus-driven process under the BSI to ensure good practise is shared between all the actors. The BIS launched the City's Standards Institute to bring together cities and key industry leaders and innovators to work together in identifying the challenges facing cities, providing solutions to common problems and defining the future of smart city standards <strong>[35]</strong>.</p>
<ul style="text-align: justify; ">
<li>
<p style="text-align: justify; "><strong>PAS 181</strong> <em><strong>Smart city framework- Guide to establishing strategies for smart cities and communities</strong></em> establishes a good practice framework for city leaders to develop, agree and deliver smart city strategies that can help transform their city’s ability to meet challenges faced in the future and meet the goals. The smart city framework (SCF) does not intend to describe a one-size-fits-all model for the future of UK cities but focuses on the enabling processes by which the innovative use of technology and data, together with organizational change, can help deliver the diverse visions for future UK cities in more efficient, effective and sustainable ways <strong>[36]</strong>.</p>
</li>
<li>
<p style="text-align: justify; "><strong>PD 8101</strong> <em><strong>Smart cities- Guide to the role of the planning and development process</strong></em><em> </em>gives guidance regarding planning for new development for smart city plans and<em> </em>provides an overview of the key issues to be considered and prioritized. The document is for use by local authority planning and regeneration officers to identify good practice in a UK context, and what tools they could use to implement this good practice. This aims to enable new developments to be built in a way that will support smart city aspirations at minimal cost <strong>[37]</strong>.</p>
</li>
<li>
<p style="text-align: justify; "><strong>PAS 182<em> Smart city concept model. Guide to establishing a model for data</em></strong><em> </em>establishes an interoperability framework and data-sharing between agencies for smart cities for the following purposes:</p>
<ol style="text-align: justify; ">
<li>To have a city where information can be shared and understood between organizations and people at each level</li>
<li>The derivation of data in each layer can be linked back to data in the previous layer </li>
<li>The impact of a decision can be observed back in operational data. The smart city concept model (SCCM) provides a framework that can normalize and classify information from many sources so that data sets can be discovered and combined to gain a better picture of the needs and behaviours of a city’s citizens (residents and businesses) to help identify issues and devise solutions. PAS 182 is aimed at organizations that provide services to communities in cities, and manage the resulting data, as well as decision-makers and policy developers in cities <strong>[38]</strong>.</li>
</ol> </li>
<li>
<p style="text-align: justify; "><strong>PAS 180 Smart cities <em>Vocabulary</em></strong> helps build a strong foundation for future standardization and good practices by providing an industry-agreed understanding of smart city terms and definitions to be used in the UK. It provides a working definition of a Smart City- “Smart Cities” is a term denoting the effective integration of physical, digital and human systems in the built environment to deliver a sustainable, prosperous and inclusive future for its citizens <strong>[39]</strong>. This aims to help improve communication and understanding of smart cities by providing a common language for developers, designers, manufacturers and clients. The standard also defines smart city concepts across different infrastructure and systems’ elements used across all service delivery channels and is intended for city authorities and planners, buyers of smart city services and solutions <strong>[40]</strong>, as well as product and service providers.</p>
</li>
</ul>
<p style="text-align: justify; "> </p>
<h3 style="text-align: justify; ">Endnotes</h3>
<p style="text-align: justify; "><strong>[1]</strong> See: <a class="external-link" href="http://www.iec.ch/whitepaper/pdf/iecWP-smartcities-LR-en.pdf">http://www.iec.ch/whitepaper/pdf/iecWP-smartcities-LR-en.pdf</a>.</p>
<p style="text-align: justify; "><strong>[2]</strong> See: <a class="external-link" href="http://www.ibm.com/smarterplanet/in/en/sustainable_cities/ideas/">http://www.ibm.com/smarterplanet/in/en/sustainable_cities/ideas/</a>.</p>
<p style="text-align: justify; "><strong>[3]</strong> See: <a class="external-link" href="http://www.thehindubusinessline.com/economy/smart-cities-mission-welcome-to-tomorrows-world/article8163690.ece">http://www.thehindubusinessline.com/economy/smart-cities-mission-welcome-to-tomorrows-world/article8163690.ece</a>.</p>
<p style="text-align: justify; "><strong>[4]</strong> See: <a class="external-link" href="http://www.iec.ch/whitepaper/pdf/iecWP-smartcities-LR-en.pdf">http://www.iec.ch/whitepaper/pdf/iecWP-smartcities-LR-en.pdf</a>.</p>
<p style="text-align: justify; "><strong>[5]</strong> See: <a class="external-link" href="http://www.iso.org/iso/news.htm?refid=Ref2042">http://www.iso.org/iso/news.htm?refid=Ref2042</a>.</p>
<p style="text-align: justify; "><strong>[6]</strong> See: <a class="external-link" href="http://www.livemint.com/Companies/5Twmf8dUutLsJceegZ7I9K/Nasscom-partners-Accenture-to-form-ICT-framework-for-smart-c.html">http://www.livemint.com/Companies/5Twmf8dUutLsJceegZ7I9K/Nasscom-partners-Accenture-to-form-ICT-framework-for-smart-c.html</a>.</p>
<p style="text-align: justify; "><strong>[7]</strong> See: <a class="external-link" href="http://www.nasscom.in/integrated-ict-and-geospatial-technologies-framework-100-smart-cities-mission">http://www.nasscom.in/integrated-ict-and-geospatial-technologies-framework-100-smart-cities-mission</a>.</p>
<p style="text-align: justify; "><strong>[8]</strong> See: <a class="external-link" href="http://www.cxotoday.com/story/nasscom-creates-framework-for-smart-cities-project/">http://www.cxotoday.com/story/nasscom-creates-framework-for-smart-cities-project/</a>.</p>
<p style="text-align: justify; "><strong>[9]</strong> See: <a class="external-link" href="http://www.livemint.com/Companies/5Twmf8dUutLsJceegZ7I9K/Nasscom-partners-Accenture-to-form-ICT-framework-for-smart-c.html">http://www.livemint.com/Companies/5Twmf8dUutLsJceegZ7I9K/Nasscom-partners-Accenture-to-form-ICT-framework-for-smart-c.html</a>.</p>
<p style="text-align: justify; "><strong>[10]</strong> See: <a class="external-link" href="http://www.business-standard.com/article/economy-policy/in-a-first-bis-to-come-up-with-standards-for-smart-cities-115060400931_1.html">http://www.business-standard.com/article/economy-policy/in-a-first-bis-to-come-up-with-standards-for-smart-cities-115060400931_1.html</a>.</p>
<p style="text-align: justify; "><strong>[11]</strong> See: <a class="external-link" href="http://www.longfinance.net/groups7/viewdiscussion/72-financing-financing-tomorrow-s-cities-how-standards-can-support-the-development-of-smart-cities.html?groupid=3">http://www.longfinance.net/groups7/viewdiscussion/72-financing-financing-tomorrow-s-cities-how-standards-can-support-the-development-of-smart-cities.html?groupid=3</a>.</p>
<p style="text-align: justify; "><strong>[12]</strong> See: <a class="external-link" href="http://www.iso.org/iso/iso_technical_committee?commid=656906">http://www.iso.org/iso/iso_technical_committee?commid=656906</a>.</p>
<p style="text-align: justify; "><strong>[13]</strong> See: <a class="external-link" href="http://cityminded.org/wp-content/uploads/2014/11/Patricia_McCarney_PDF.pdf">http://cityminded.org/wp-content/uploads/2014/11/Patricia_McCarney_PDF.pdf</a>.</p>
<p style="text-align: justify; "><strong>[14]</strong> See: <a class="external-link" href="http://www.iso.org/iso/news.htm?refid=Ref1877">http://www.iso.org/iso/news.htm?refid=Ref1877</a>.</p>
<p style="text-align: justify; "><strong>[15]</strong> See: <a class="external-link" href="http://smartcitiescouncil.com/article/new-iso-standard-gives-cities-common-performance-yardstick">http://smartcitiescouncil.com/article/new-iso-standard-gives-cities-common-performance-yardstick</a>.</p>
<p style="text-align: justify; "><strong>[16]</strong> See: <a class="external-link" href="http://smartcitiescouncil.com/article/dissecting-iso-37120-why-new-smart-city-standard-good-news-cities">http://smartcitiescouncil.com/article/dissecting-iso-37120-why-new-smart-city-standard-good-news-cities</a>.</p>
<p style="text-align: justify; "><strong>[17]</strong> See: <a class="external-link" href="http://www.iso.org/iso/catalogue_detail?csnumber=62436">http://www.iso.org/iso/catalogue_detail?csnumber=62436</a>.</p>
<p style="text-align: justify; "><strong>[18]</strong> See: <a class="external-link" href="http://www.cityindicators.org/">http://www.cityindicators.org/</a>.</p>
<p style="text-align: justify; "><strong>[19]</strong> See: <a class="external-link" href="http://www.dataforcities.org/">http://www.dataforcities.org/</a>.</p>
<p style="text-align: justify; "><strong>[20]</strong> See: <a class="external-link" href="http://news.dataforcities.org/2015/12/world-council-on-city-data-and-hatch.html">http://news.dataforcities.org/2015/12/world-council-on-city-data-and-hatch.html</a>.</p>
<p style="text-align: justify; "><strong>[21]</strong> See: <a class="external-link" href="http://news.dataforcities.org/2015/12/world-council-on-city-data-and-hatch.html">http://news.dataforcities.org/2015/12/world-council-on-city-data-and-hatch.html</a>.</p>
<p style="text-align: justify; "><strong>[22]</strong> See: <a class="external-link" href="http://www.iso.org/iso/37120_briefing_note.pdf">http://www.iso.org/iso/37120_briefing_note.pdf</a>.</p>
<p style="text-align: justify; "><strong>[23]</strong> See: <a class="external-link" href="http://www.dataforcities.org/wccd/">http://www.dataforcities.org/wccd/</a>.</p>
<p style="text-align: justify; "><strong>[24]</strong> See: <a class="external-link" href="http://resilient-cities.iclei.org/fileadmin/sites/resilient-cities/files/Webinar_Series/HERNANDEZ_-_ICLEI_Resilient_Cities_Webinar__FINAL_.pdf">http://resilient-cities.iclei.org/fileadmin/sites/resilient-cities/files/Webinar_Series/HERNANDEZ_-_ICLEI_Resilient_Cities_Webinar__FINAL_.pdf</a>.</p>
<p style="text-align: justify; "><strong>[25]</strong> See: <a class="external-link" href="http://www.iso.org/iso/iso_technical_committee?commid=656967">http://www.iso.org/iso/iso_technical_committee?commid=656967</a>.</p>
<p style="text-align: justify; "><strong>[26]</strong> See: <a class="external-link" href="https://www.iso.org/obp/ui/#iso:std:iso:ts:37151:ed-1:v1:en">https://www.iso.org/obp/ui/#iso:std:iso:ts:37151:ed-1:v1:en</a>.</p>
<p style="text-align: justify; "><strong>[27]</strong> See: <a class="external-link" href="http://www.iso.org/iso/home/news_index/news_archive/news.htm?refid=Ref2001&utm_medium=email&utm_campaign=ISO+Newsletter+November&utm_content=ISO+Newsletter+November+CID_4182720c31ca2e71fa93d7c1f1e66e2f&utm_source=Email%20marketing%20software&utm_term=Read%20more">http://www.iso.org/iso/home/news_index/news_archive/news.htm?refid=Ref2001&utm_medium=email&utm_campaign=ISO+Newsletter+November&utm_content=ISO+Newsletter+November+CID_4182720c31ca2e71fa93d7c1f1e66e2f&utm_source=Email%20marketing%20software&utm_term=Read%20more</a>.</p>
<p style="text-align: justify; "><strong>[28]</strong> See: <a class="external-link" href="http://www.iso.org/iso/37120_briefing_note.pdf">http://www.iso.org/iso/37120_briefing_note.pdf</a>.</p>
<p style="text-align: justify; "><strong>[29]</strong> See: <a class="external-link" href="http://standardsforum.com/isots-37151-smart-cities-metrics/">http://standardsforum.com/isots-37151-smart-cities-metrics/</a>.</p>
<p style="text-align: justify; "><strong>[30]</strong> See: <a class="external-link" href="http://www.iso.org/iso/executive_summary_iso_37150.pdf">http://www.iso.org/iso/executive_summary_iso_37150.pdf</a>.</p>
<p style="text-align: justify; "><strong>[31]</strong> See: <a class="external-link" href="http://standardsforum.com/isots-37151-smart-cities-metrics/">http://standardsforum.com/isots-37151-smart-cities-metrics/</a>.</p>
<p style="text-align: justify; "><strong>[32]</strong> See: <a class="external-link" href="http://cis-india.org/internet-governance/blog/database-on-big-data-and-smart-cities-international-standards">http://cis-india.org/internet-governance/blog/database-on-big-data-and-smart-cities-international-standards</a>.</p>
<p style="text-align: justify; "><strong>[33]</strong> See: <a class="external-link" href="http://smartcitiescouncil.com/article/itu-takes-internet-things-standards-smart-cities">http://smartcitiescouncil.com/article/itu-takes-internet-things-standards-smart-cities</a>.</p>
<p style="text-align: justify; "><strong>[34]</strong> See: <a class="external-link" href="https://www.itu.int/net/pressoffice/press_releases/2015/22.aspx">https://www.itu.int/net/pressoffice/press_releases/2015/22.aspx</a>.</p>
<p style="text-align: justify; "><strong>[35]</strong> See: <a class="external-link" href="http://www.bsigroup.com/en-GB/smart-cities/">http://www.bsigroup.com/en-GB/smart-cities/</a>.</p>
<p style="text-align: justify; "><strong>[36]</strong> See: <a class="external-link" href="http://www.bsigroup.com/en-GB/smart-cities/Smart-Cities-Standards-and-Publication/PAS-181-smart-cities-framework/">http://www.bsigroup.com/en-GB/smart-cities/Smart-Cities-Standards-and-Publication/PAS-181-smart-cities-framework/</a>.</p>
<p style="text-align: justify; "><strong>[37]</strong> See: <a class="external-link" href="http://www.bsigroup.com/en-GB/smart-cities/Smart-Cities-Standards-and-Publication/PD-8101-smart-cities-planning-guidelines/">http://www.bsigroup.com/en-GB/smart-cities/Smart-Cities-Standards-and-Publication/PD-8101-smart-cities-planning-guidelines/</a>.</p>
<p style="text-align: justify; "><strong>[38]</strong> See: <a class="external-link" href="http://www.bsigroup.com/en-GB/smart-cities/Smart-Cities-Standards-and-Publication/PAS-182-smart-cities-data-concept-model/">http://www.bsigroup.com/en-GB/smart-cities/Smart-Cities-Standards-and-Publication/PAS-182-smart-cities-data-concept-model/</a>.</p>
<p style="text-align: justify; "><strong>[39]</strong> See: <a class="external-link" href="http://www.iso.org/iso/smart_cities_report-jtc1.pdf">http://www.iso.org/iso/smart_cities_report-jtc1.pdf</a>.</p>
<p style="text-align: justify; "><strong>[40]</strong> See: <a class="external-link" href="http://www.bsigroup.com/en-GB/smart-cities/Smart-Cities-Standards-and-Publication/PAS-180-smart-cities-terminology/">http://www.bsigroup.com/en-GB/smart-cities/Smart-Cities-Standards-and-Publication/PAS-180-smart-cities-terminology/</a>.</p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/blog/adoption-of-standards-in-smart-cities-way-forward-for-india'>http://editors.cis-india.org/internet-governance/blog/adoption-of-standards-in-smart-cities-way-forward-for-india</a>
</p>
No publishervanyaOpen StandardsBig DataOpen DataInternet GovernanceSmart Cities2016-04-11T03:04:46ZBlog EntryAnalysis of Aadhaar Act in the Context of A.P. Shah Committee Principles
http://editors.cis-india.org/internet-governance/blog/analysis-of-aadhaar-act-in-context-of-shah-committee-principles
<b>Whilst there are a number of controversies relating to the Aadhaar Act including the fact that it was introduced in a manner so as to circumvent the majority of the opposition in the upper house of the Parliament and that it was rushed through the Lok Sabha in a mere eight days, in this paper we shall discuss the substantial aspects of the Act in relation to privacy concerns which have been raised by a number of experts. In October 2012, the Group of Experts on Privacy constituted by the Planning Commission under the chairmanship of Justice AP Shah Committee submitted its report which listed nine principles of privacy which all legislations, especially those dealing with personal should adhere to. In this paper, we shall discuss how the Aadhaar Act fares vis-à-vis these nine principles.</b>
<p> </p>
<h2>Introduction</h2>
<p>The Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Act, 2016 (the “Aadhaar Act”) was introduced in the Lok Sabha (lower house of the Parliament) by Minister of Finance, Mr. Arun Jaitley, in on March 3, 2016, and was passed by the Lok Sabha on March 11, 2016. It was sent back by the Rajya Sabha with suggestions but the Lok Sabha rejected those suggestions, which means that the Act is now deemed to have been passed by both houses as it was originally introduced as a Money Bill. Whilst there are a number of controversies relating to the Aadhaar Act including the fact that it was introduced in a manner so as to circumvent the majority of the opposition in the upper house of the Parliament and that it was rushed through the Lok Sabha in a mere eight days, in this paper we shall discuss the substantial aspects of the Act in relation to privacy concerns which have been raised by a number of experts. In October 2012, the Group of Experts on Privacy constituted by the Planning Commission under the chairmanship of Justice AP Shah Committee submitted its report which listed nine principles of privacy which all legislations, especially those dealing with personal should adhere to. In this paper, we shall discuss how the Aadhaar Act fares vis-à-vis these nine principles.</p>
<p>In order for the reader to better understand the frame of reference on which we shall analyse the Aadhaar Act, the nine principles contained in the report of the Group of Experts on Privacy are explained in brief below:</p>
<ul><li><strong>Principle 1: Notice</strong> - Does the legislation/regulation require that entities governed by the Act give simple to understand notice of its information practices to all individuals, in clear and concise language, before any personal information is collected from them.</li>
<li><strong>Principle 2: Choice and Consent</strong> - Does the legislation/regulation require that entities governed under the Act provide the individual with the option to opt in/opt out of providing their personal information.</li>
<li><strong>Principle 3: Collection Limitation</strong> - Does the legislation/regulation require that entities governed under the Act collect personal information from individuals only as is necessary for a purpose identified.</li>
<li><strong>Principle 4: Purpose Limitation</strong> - Does the legislation/regulation require that personal data collected and processed by entities governed by the Act be adequate and relevant to the purposes for which they are processed.</li>
<li><strong>Principle 5: Access and Correction</strong> - Does the legislation/regulation allow individuals: access to personal information about them held by an entity governed by the Act; the ability to seek correction, amendments, or deletion of such information where it is inaccurate, etc.</li>
<li><strong>Principle 6: Disclosure</strong> - Does the legislation ensure that information is only disclosed to third parties after notice and informed consent is obtained. Is disclosure allowed for law enforcement purposes done in accordance with laws in force.</li>
<li><strong>Principle 7: Security</strong> - Does the legislation/regulation ensure that information that is collected and processed under that Act, is done so in a manner that protects against loss, unauthorized access, destruction, etc.</li>
<li><strong>Principle 8: Openness</strong> - Does the legislation/regulation require that any entity processing data take all necessary steps to implement practices, procedures, policies and systems in a manner proportional to the scale, scope, and sensitivity to the data that is collected and processed and is this information made available to all individuals in an intelligible form, using clear and plain language?</li>
<li><strong>Principle 9: Accountability</strong> - Does the legislation/regulation provide for measures that ensure compliance of the privacy principles? This would include measures such as mechanisms to implement privacy policies; including tools, training, and education; and external and internal audits.</li></ul>
<p> </p>
<h2>Analysis of the Aadhaar Act</h2>
<p>The Aadhaar Act has been brought about to give legislative backing to the most ambitious individual identity programme in the world which aims to provide a unique identity number to the entire population of India. The rationale behind this scheme is to correctly identify the beneficiaries of government schemes and subsidies so that leakages in government subsidies may be reduced. In furtherance of this rationale the Aadhaar Act gives the Unique Identification Authority of India (“UIDAI”) the power to enroll individuals by collecting their demographic and biometric information and issuing an Aadhaar number to them. Below is an analysis of the Act based on the privacy principles enumerated I the A.P. Shah Committee Report.</p>
<h3>Collection Limitation</h3>
<p><strong>Collection of Biometric and Demographic Information:</strong> The Aadhaar Act entitles every “resident”
<strong>[1]</strong> to obtain an Aadhaar number by submitting his/her biometric (photograph, finger print, Iris scan) and demographic information (name, date of birth, address <strong>[2]</strong>) <strong>[3]</strong>. It must be noted that the Act leaves scope for further information to be included in the collection process if so specified by regulations. It must be noted that although the Act specifically provides what information can be collected, it does not specifically prohibit the collection of further information. This becomes relevant because it makes it possible for enrolling agencies to collect extra information relating to individuals without any legal implications of such act.</p>
<p><strong>Authentication Records:</strong> The UIDAI is mandated to maintain authentication records for a period which is yet to be specified (and shall be specified in the regulations) but it cannot collect or keep any information regarding the purpose for which the authentication request was made <strong>[4]</strong>.</p>
<p><strong>Unauthorized Collection:</strong> Any person who in not authorized to collect information under the Act, and pretends that he is authorized to do so, shall be punishable with imprisonment for a term which may extend to three years or with a fine which may extend to Rs. 10,000/- or both. In case of companies the maximum fine amount would be increased to Rs. 10,00,000/- <strong>[5]</strong>. It must be noted that the section, as it is currently worded seems to criminalize the act of impersonation of authorized individuals and the actual collection of information is not required to complete this offence. It is not clear if this section will apply if a person who is authorized to collect information under the Act in general, collects some information that he/she is not authorized to collect.</p>
<h3>Notice</h3>
<p><strong>Notice during Collection:</strong> The Aadhaar Act requires that the agencies enrolling people for distribution of Aadhaar numbers should give people notice regarding: (a) the manner in which the information shall be used; (b) the nature of recipients with whom the information is intended to be shared during authentication; and (c) the existence of a right to access information, the procedure for making requests for such access, and details of the person or department in-charge to whom such requests can be made <strong>[6]</strong>. A failure to comply with this requirement will make the agency liable for imprisonment of upto 3 years or a fine of Rs. 10,000/- or both. In case of companies the maximum fine amount would be increased to Rs. 10,00,000/- <strong>[7]</strong>. It must be noted that the Act leaves the manner of giving such notice in the realm of regulations and does not specify how this notice is to be provided, which leaves important specifics to the realm of the executive.</p>
<p><strong>Notice during Authentication:</strong> The Aadhaar Act requires that authenticating agencies shall give information to the individuals whose information is to be authenticated regarding (a) the nature of information that may be shared upon authentication; (b) the uses to which the information received during authentication may be put by the requesting entity; and (c) alternatives to submission of identity information to the requesting entity <strong>[8]</strong>. A failure to comply with this requirement will make the agency liable for imprisonment of upto 3 years or a fine of Rs. 10,000/- or both. In case of companies the maximum fine amount would be increased to Rs. 10,00,000/- <strong>[9]</strong>. Just as in the case of notice during collection, the manner in which the notice is required to be given is left to regulations leaving an unclear picture as to how comprehensive, accessible, and frequent this notice must be.</p>
<h3>Access and Correction</h3>
<p><strong>Updating Information:</strong> The Aadhaar Act give the UIDAI the power to require residents to update their demographic and biometric information from time to time so as to maintain its accuracy <strong>[10]</strong>.</p>
<p><strong>Access to Information:</strong> The Aadhaar Act provides that Aadhaar number holders may request the UIDAI to provide access to their identity information expect their core biometric information <strong>[11]</strong>. It is not clear why access to the core biometric information <strong>[12]</strong> is not provided to an individual. Further, since section 6 seems to place the responsibility of updation and accuracy of biometric information on the individual, it is not clear how a person is supposed to know that the biometric information contained in the database has changed if he/she does not have access to the same. It may also be noted that the Aadhaar Act provides only for a request to the UIDAI for access to the information and does not make access to the information a right of the individual, this would mean that it would be entirely upon the discretion of the UIDAI to refuse to grant access to the information once a request has been made.</p>
<p><strong>Alteration of Information:</strong> The Aadhaar Act gives individuals the right to request the UIDAI to alter their demographic if the same is incorrect or has changed and biometric information if it is lost or has changed. Upon receipt of such a request, if the UIDAI is satisfied, then it may make the necessary alteration and inform the individual accordingly. The Act also provides that no identity information in the Central database shall be altered except as provided in the regulations <strong>[13]</strong>. This section provides for alteration of identity information but only in the circumstances given in the section, for example demographic information cannot be changed if it has been lost, similarly biometric information cannot be changed if it is inaccurate. Further, the section does not give a right to the individual to get the information altered but only entitles him/her to request the UIDAI to make a change and the final decision is left to the “satisfaction” of the UIDAI.</p>
<p><strong>Access to Authentication Record:</strong> Every individual is given the right to obtain his/her authentication record in a manner to be specified by regulations. [14]</p>
<h3>Disclosure</h3>
<p><strong>Sharing during Authentication:</strong> The UIDAI is entitled to reply to any authentication query with a positive, negative or any other response which may be appropriate and may share identity information except core biometric information with the requesting entity <strong>[15]</strong>. The language in this provision is ambiguous and it is unclear what 'identity information' may be shared and why it would be necessary to share such information as Aadhaar is meant to be only a means of authentication so as to remove duplication.</p>
<p><strong>Potential Disclosure during Maintenance of CIDR:</strong> The UIDAI has been given the power to appoint any one or more entities to establish and maintain the Central Identities Data Repository (CIDR) <strong>[16]</strong>. If a private entity is involved in the maintenance and establishment of the CIDR it can be presumed that there is the possibilty that they would, to some degree, have access to the information stored in the CIDR, yet there are no clear standards in the Act regarding this potential access. And the process for appointing such entities. The fact that the UIDAI has been given the freedom to appoint an outside entity to maintain a sensitive asset such as the CIDR raises security concerns.</p>
<p><strong>Restriction on Sharing Information:</strong> The Aadhaar Act creates a blanket prohibition on the usage of core biometric information for any purpose other than generation of Aadhaar numbers and also prohibits its sharing for any reason whatsoever <strong>[17]</strong>. Other identity information is allowed to be shared in the manner specified under the Act or as may be specified in the regulations <strong>[18]</strong>. The Act further provides that the requesting entities shall not disclose the identity information except with the prior consent of the individual to whom the information relates <strong>[19]</strong>. There is also a prohibition on publicly displaying Aadhaar number or core biometric information except as specified by regulations <strong>[20]</strong>. Officers or the UIDAI or the employees of the agencies employed to maintain the CIDR are prohibited from revealing the information stored in the CIDR or authentication record to anyone <strong>[21]</strong>. It is not clear why an exception has been carved out and what circumstances would require publicly displaying Aadhaar numbers and core biometric information, especially since the reasons for which such important information may be displayed has been left up to regulations which have relatively less oversight. The section also provides the requesting entities with an option to further disclose information if they take consent of the individuals. This may lead to a situation where a requesting entity, perhaps the of an essential service, may take the consent of the individual to disclose his/her information in a standard form contract, without the option of saying no to such a request. It may lead to situations where the option is between giving consent to disclosure or denial or service altogether. For this reason it is necessary that there should be an opt in and opt out provision wherever a requesting entity has the power to ask for disclosure of information, so that people are not coerced into giving consent.</p>
<p><strong>Disclosure in Specific Cases:</strong> The prohibition on disclosure of information (except for core biometric information) does not apply in case of any disclosure made pursuant to an order of a court not below that of a District Judge <strong>[22]</strong>. There is another exception to the prohibition on disclosure of information (including core biometric information) in the interest of national security if so directed by an officer not below the rank of a Joint Secretary to the Government of India specially authorised in this behalf by an order of the Central Government. Before any such direction can take effect, it will be reviewed by an oversight committee consisting of the Cabinet Secretary and the Secretaries to the Government of India in the Department of Legal Affairs and the Department of Electronics and Information Technology. Any such direction shall be valid for a period of three months and may be extended by another three months after the review by the Oversight Committee <strong>[23]</strong>. Although this provision has been criticized, and rightly so, for the lack of accountability since the entire process is being handled within the executive and there is no independent oversight, however it must be mentioned that the level of oversight provided here is similar to that provided to interception requests, which involve a much graver if not the same level of invasion of privacy.</p>
<p><strong>Penalty for Disclosure:</strong> Any person who intentionally and in an unauthorized manner discloses, transmits, copies or otherwise disseminates any identity information collected in the course of enrolment or authentication shall be punishable with imprisonment of upto 3 years or a fine of Rs. 10,000/- or both. In case of companies the maximum fine amount would be increased to Rs. 10,00,000/ <strong>[24]</strong>. Further any person who intentionally and in an unathorised manner, accesses information in the CIDR <strong>[25]</strong>, downloads, copies or extracts any data from the CIDR <strong>[26]</strong>, or reveals or shares or distributes any identity information, shall be punishable with imprisonment of upto 3 years and a fine of not less than Rs. 10,00,000/-.</p>
<h3>Consent</h3>
<p><strong>Consent for Authentication:</strong> A requesting entity has to take the consent of the individual before collecting his/her identity information for the purposes of authentication and also has to inform the individual of the alternatives to submission of the identity information <strong>[27]</strong>. Although this provision requires entities to take consent from the individuals before collecting information for authentication, however how useful this requirement of consent would be, still remains to be seen. There may be instances where a requesting entity may take the consent of the individual in a standard form contract, without the individual realizing what he/she is consenting to.</p>
<p><strong>Note:</strong> The Aadhaar Act provides no requirement or standard for the form of consent that must be taken during enrollment. This is significant as it is the point at which individuals are providing raw biometric material and during previous enrollment, has been a point of weakness as the consent taken is an enabler to function creep as it allows the UIDAI to share information with engaged in delivery of welfare services <strong>[28]</strong>.</p>
<h3>Purpose</h3>
<p><strong>Use of Information:</strong> The authenticating entities are allowed to use the identity information only for the purpose of submission to the CIDR for authentication <strong>[29]</strong>. Further, the Act specifies that identity information available with a requesting entity shall not be used for any purpose other than that specified to the individual at the time of submitting the information for authentication <strong>[30]</strong>. The Act also provides that any authentication entity which uses the information for any purpose not already specified will be liable to punishment of imprisonment of upto 3 years or a fine of Rs. 10,000/- or both. In case of companies the maximum fine amount would be increased to Rs. 10,00,000/ <strong>[31]</strong>.</p>
<h3>Security</h3>
<p><strong>Security and Confidentiality of Information:</strong> It is the responsibility of the UIDAI to ensure the security and confidentiality of the identity and authentication information and it is required to take all necessary action to ensure that the information in the CIDR is protected against unauthorized access, use or disclosure and against accidental or intentional destruction, loss or damage <strong>[32]</strong>. The UIDAI is required to adopt and implement appropriate technical and organisational security measures and also ensure that its contractors do the same <strong>[33]</strong>. It is also required to ensure that the agreements entered into with its contractors impose the same conditions as are imposed on the UIDAI under the Act and that they shall act only upon the instructions of the UIDAI <strong>[34]</strong>.</p>
<p><strong>Biometric Information to be Electronic Record:</strong> The biometric information collected by the UIDAI has been deemed to be an “electronic record” as well as “sensitive personal data or information”, which would mean that in addition to the provisions of the Aadhaar Act, the provisions contained in the Information Technology Act, 2000 will also apply to such information <strong>[35]</strong>. It must be noted that while the Act lays down the principle that UIDAI is required to ensure the saecurity of the information, it does not lay down any guidelines as to the minimum security standards to be implemented by the Authority. However, through this section the legislature has linked the security standards contained in the IT Act to the information contained in this Act. While this is a clean way of dealing with the issue, some people may argue that the extremely sensitive nature of the information contained in the CIDR requires the standards for security to be much stricter than those provided in the IT Act. However, a perusal of Rule 8 of the Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 2011 shows that the Rules themselves provide that the standard of security must be commensurate with the information assets being protected. It would thus seem that the Act provides enough room to protect such important information, but perhaps leaves too much room for interpretation for such an important issue.</p>
<p><strong>Penalty for Unauthorised Access:</strong> Apart from the security provisions included in the legislation, the Aadhaar Act also provides for punishment of imprisonment of upto 3 years and a fine which shall not be less than Rs. 10,00,000/-, in case of the following offences:</p>
<ol><li>introduction of any virus or other computer contaminant in the CIDR <strong>[36]</strong>;</li>
<li>causing damage to the data in the CIDR <strong>[37]</strong>;</li>
<li>disruption of access to the CIDR <strong>[38]</strong>;</li>
<li>denial of access to any person who is authorised to access the CIDR <strong>[39]</strong>;</li>
<li>destruction, deletion or alteration of any information stored in any removable storage media or in the CIDR or diminishing its value or utility or affecting it injuriously by any means <strong>[40]</strong>;</li>
<li>stealing, concealing, destroying or altering any computer source code used by the Authority with an intention to cause damage <strong>[41]</strong>.</li></ol>
<p>Further, unauthorized usage or tampering with the data in the CIDR or in any removable storage medium with the intent of modifying information relating to Aadhaar number holder or discovering any information thereof, is also punishable with imprisonment for a term which may extend to 3 years and also a fine which may extend to Rs. 10,000/- <strong>[42]</strong>.</p>
<h3>Accountability</h3>
<p><strong>Inspections and Audits:</strong> One of the functions listed in the powers and functions of the UIDAI is the power to call for information and records, conduct inspections, inquiries and audit of the operations of the CIDR, Registrars, enrolling agencies and other agencies appointed under the Aadhaar Act <strong>[43]</strong>.</p>
<p><strong>Grievance Redressal:</strong> Another function of the UIDAI is to set up facilitation centres and grievance redressal mechanisms for redressal of grievances of individuals, Registrars, enrolling agencies and other service providers <strong>[44]</strong>. It must be said here that considering the importance that the government has given to and intends to give to Aadhaar in the future, an essential task such as grievance redressal should not be left entirely to the discretion of the UIDAI and some grievance redressal mechanism should be incorporated into the Act itself.</p>
<h3>Openness</h3>
<p>There does not seem to be any provision in the Aadhaar Act which requires the UIDAI to make its privacy policies and procedure available to the public in general even though the UIDAI has the responsibility to maintain the security and confidentiality of the information.</p>
<p> </p>
<h2>Endnotes</h2>
<p><strong>[1]</strong> A resident is defined as any person who has resided in India for a period of atleasy 182 days in the previous 12 months.</p>
<p><strong>[2]</strong> It has been specified that demographic information will not include race, religion, caste, tribe, ethnicity, language, records of entitlement, income or medical history.</p>
<p><strong>[3]</strong> Section 3(1) of the Aadhaar Act.</p>
<p><strong>[4]</strong> Section 32(1) and 32(3) of the Aadhaar Act.</p>
<p><strong>[5]</strong> Section 36 of the Aadhaar Act.</p>
<p><strong>[6]</strong> Section 3(2) of the Aadhaar Act.</p>
<p><strong>[7]</strong> Section 41 of the Aadhaar Act.</p>
<p><strong>[8]</strong> Section 8(3) of the Aadhaar Act.</p>
<p><strong>[9]</strong> Section 41 of the Aadhaar Act.</p>
<p><strong>[10]</strong> Section 6 of the Aadhaar Act.</p>
<p><strong>[11]</strong> Section 28, <em>proviso</em> of the Aadhaar Act.</p>
<p><strong>[12]</strong> Core biometric information is defined as fingerprints, iris scan or other biological attributes which may be specified by regulations.</p>
<p><strong>[13]</strong> Section 31 of the Aadhaar Act.</p>
<p><strong>[14]</strong> Section 32(2) of the Aadhaar Act.</p>
<p><strong>[15]</strong> Section 8(4) of the Aadhaar Act.</p>
<p><strong>[16]</strong> Section 10 of the Aadhaar Act.</p>
<p><strong>[17]</strong> Section 29(1) of the Aadhaar Act.</p>
<p><strong>[18]</strong> Section 29(2) of the Aadhaar Act.</p>
<p><strong>[19]</strong> Section 29(3)(b) of the Aadhaar Act.</p>
<p><strong>[20]</strong> Section 29(4) of the Aadhaar Act.</p>
<p><strong>[21]</strong> Section 28(5) of the Aadhaar Act.</p>
<p><strong>[22]</strong> Section 33(1) of the Aadhaar Act.</p>
<p><strong>[23]</strong> Section 33(2) of the Aadhaar Act.</p>
<p><strong>[24]</strong> Section 37 of the Aadhaar Act.</p>
<p><strong>[25]</strong> Section 38(a) of the Aadhaar Act.</p>
<p><strong>[26]</strong> Section 38(b) of the Aadhaar Act.</p>
<p><strong>[27]</strong> Section 8(2)(a) and (c) of the Aadhaar Act.</p>
<p><strong>[28]</strong> For example, see: <a href="http://www.karnataka.gov.in/aadhaar/Downloads/Application%20form%20-%20English.pdf">http://www.karnataka.gov.in/aadhaar/Downloads /Application%20form%20-%20English.pdf</a>.</p>
<p><strong>[29]</strong> Section 8(2)(b) of the Aadhaar Act.</p>
<p><strong>[30]</strong> Section 29(3)(a) of the Aadhaar Act.</p>
<p><strong>[31]</strong> Section 37 of the Aadhaar Act.</p>
<p><strong>[32]</strong> Section 28(1), (2) and (3) of the Aadhaar Act.</p>
<p><strong>[33]</strong> Section 28(4)(a) and (b) of the Aadhaar Act.</p>
<p><strong>[34]</strong> Section 28(4)(c) of the Aadhaar Act.</p>
<p><strong>[35]</strong> Section 30 of the Aadhaar Act.</p>
<p><strong>[36]</strong> Section 38(c) of the Aadhaar Act.</p>
<p><strong>[37]</strong> Section 38(d) of the Aadhaar Act.</p>
<p><strong>[38]</strong> Section 38(e) of the Aadhaar Act.</p>
<p><strong>[39]</strong> Section 38(f) of the Aadhaar Act.</p>
<p><strong>[40]</strong> Section 38(h) of the Aadhaar Act.</p>
<p><strong>[41]</strong> Section 38(i) of the Aadhaar Act.</p>
<p><strong>[42]</strong> Section 39 of the Aadhaar Act.</p>
<p><strong>[43]</strong> Section 23(2)(l) of the Aadhaar Act.</p>
<p><strong>[44]</strong> Section 23(2)(s) of the Aadhaar Act.</p>
<p> </p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/blog/analysis-of-aadhaar-act-in-context-of-shah-committee-principles'>http://editors.cis-india.org/internet-governance/blog/analysis-of-aadhaar-act-in-context-of-shah-committee-principles</a>
</p>
No publisherVipul KharbandaBig DataPrivacyInternet GovernanceFeaturedDigital IndiaAadhaarBiometricsHomepage2016-03-17T19:43:53ZBlog EntryList of Recommendations on the Aadhaar Bill, 2016 - Letter Submitted to the Members of Parliament
http://editors.cis-india.org/internet-governance/blog/list-of-recommendations-on-the-aadhaar-bill-2016
<b>On Friday, March 11, the Lok Sabha passed the Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Bill, 2016. The Bill was introduced as a money bill and there was no public consultation to evaluate the provisions therein even though there are very serious ramifications for the Right to Privacy and the Right to Association and
Assembly. Based on these concerns, and numerous others, we submitted an initial list of recommendations to the Members of Parliaments to highlight the aspects of the Bill that require immediate attention.</b>
<p> </p>
<h4>Download the submission letter: <a href="https://github.com/cis-india/website/raw/master/docs/CIS_Aadhaar-Bill-2016_List-of-Recommendations_2016.03.16.pdf">PDF</a>.</h4>
<p> </p>
<h3>Text of the Submission</h3>
<p>On Friday, March 11, the Lok Sabha passed the Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Bill, 2016. The Bill was introduced as a money bill and there was no public consultation to evaluate the provisions therein even though there are very serious ramifications for the Right to Privacy and the Right to Association and Assembly. The Bill has made it compulsory for all Indian to enroll for Aadhaar in order to receive any subsidy, benefit, or service from the Government whose expenditure is incurred from the Consolidate Fund of India. Apart from the issue of centralisation of the national biometric database leading to a deep national vulnerability, the Bill also keeps unaddressed two serious concerns regarding the technological framework concerned:</p>
<ul><li><strong>Identification without Consent:</strong> Before the Aadhaar project it was not possible for the Indian government or any private entity to identify citizens (and all residents) without their consent. But biometrics allow for non-consensual and covert identification and authentication. The only way to fix this is to change the technology configuration and architecture of the project. The law cannot be used to correct the problems in the technological design of the project.<br /><br /></li>
<li><strong>Fallible Technology:</strong> The Biometrics Standards Committee of UIDAI has acknowledged the lack of data on how a biometric authentication technology will scale up where the population is about 1.2 billion. The technology has been tested and found feasible only for a population of 200 million. Further, a report by 4G Identity Solutions estimates that while in any population, approximately 5% of the people have unreadable fingerprints, in India it could lead to a failure to enroll up to 15% of the population. For the current Indian population of 1.2 billion the expected proportion of duplicates is 1/121, a ratio which is far too high. <strong>[1]</strong></li></ul>
<p>Based on these concerns, and numerous others, we sincerely request you to ensure that the Bill is rigorously discussed in Rajya Sabha, in public, and, if needed, also by a Parliamentary Standing Committee, before considering its approval and implementation. Towards this, we humbly submit an initial list of recommendations to highlight the aspects of the Bill that require immediate attention:</p>
<ol><li><strong>Implement the Recommendations of the Shah and Sinha Committees:</strong> The report by the Group of Experts on Privacy chaired by the Former Chief Justice A P Shah <strong>[2]</strong> and the report by the Parliamentary Standing Committee on Finance (2011-2012) chaired by Shri Yashwant Sinha <strong>[3]</strong> have suggested a rigorous and extensive range of recommendations on the Aadhaar / UIDAI / NIAI project and the National Identification Authority of India Bill, 2010 from which the majority sections of the Aadhaar Bill, 2016, are drawn. We request that these recommendations are seriously considered and incorporated into the Aadhaar Bill, 2016.<br /><br /></li>
<li><strong>Authentication using the Aadhaar number for receiving government subsidies, benefits, and services cannot be made mandatory:</strong> Section 7 of the Aadhaar Bill, 2016, states that authentication of the person using her/his Aadhaar number can be made mandatory for the purpose of disbursement of government subsidies, benefits, and services; and in case the person does not have an Aadhaar number, s/he will have to apply for Aadhaar enrolment. This sharply contradicts the claims made by UIDAI earlier that the Aadhaar number is “optional, and not mandatory”, and more importantly the directive given by the Supreme Court (via order dated August 11, 2015). The Bill must explicitly state that the Aadhaar number is only optional, and not mandatory, and a person without an Aadhaar number cannot be denied any democratic rights, and public subsidies, benefits, and services, and any private services.<br /><br /></li>
<li><strong>Vulnerabilities in the Enrolment Process:</strong> The Bill does not address already documented issues in the enrolment process. In the absence of an exhaustive list of information to be collected, some Registrars are permitted to collect extra and unnecessary information. Also, storage of data for elongated periods with Enrollment agencies creates security risks. These vulnerabilities need to be prevented through specific provisions. It should also be mandated for all entities including the Enrolment Agencies, Registrars, CIDR and the requesting entities to shift to secure system like PKI based cryptography to ensure secure method of data transfer.<br /><br /></li>
<li><strong>Precisely Define and Provide Legal Framework for Collection and Sharing of Biometric Data of Citizens:</strong> The Bill defines “biometric information” is defined to include within its scope “photograph, fingerprint, iris scan, or other such biological attributes of an individual.” This definition gives broad and sweeping discretionary power to the UIDAI / Central Government to increase the scope of the term. The definition should be exhaustive in its scope so that a legislative act is required to modify it in any way.<br /><br /></li>
<li><strong>Prohibit Central Storage of Biometrics Data:</strong> The presence of central storage of sensitive personal information of all residents in one place creates a grave security risk. Even with the most enhanced security measures in place, the quantum of damage in case of a breach is extremely high. Therefore, storage of biometrics must be allowed only on the smart cards that are issued to the residents.<br /><br /></li>
<li><strong>Chain of Trust Model and Audit Trail:</strong> As one of the objects of the legislation is to provide targeted services to beneficiaries and reduce corruption, there should be more accountability measures in place. A chain of trust model must be incorporated in the process of enrolment where individuals and organisations vouch for individuals so that when a ghost is introduced someone has can be held accountable blame is not placed simply on the technology. This is especially important in light of the questions already raised about the deduplication technology. Further, there should be a transparent audit trail made available that allows public access to use of Aadhaar for combating corruption in the supply chain.<br /><br /></li>
<li><strong>Rights of Residents:</strong> There should be specific provisions dealing with cases where an individual is not issued an Aadhaar number or denied access to benefits due to any other factor. Additionally, the Bill should make provisions for residents to access and correct information collected from them, to be notified of data breaches and legal access to information by the Government or its agencies, as matter of right. Further, along with the obligations in Section 8, it should also be mandatory for all requesting entities to notify the individuals of any changes in privacy policy, and providing a mechanism to opt-out.<br /><br /></li>
<li><strong>Establish Appropriate Oversight Mechanisms:</strong> Section 33 currently specifies a procedure for oversight by a committee, however, there are no substantive provisions laid down that shall act as the guiding principles for such oversight mechanisms. The provision should include data minimisation, and “necessity and proportionality” principles as guiding principles for any exceptions to Section 29.<br /><br /></li>
<li><strong>Establish Grievance Redressal and Review Mechanisms:</strong> Currently, there are no grievance redressal mechanism created under the Bill. The power to set up such a mechanism is delegated to the UIDAI under Section 23 (2) (s) of the Bill. However, making the entity administering a project, also responsible for providing for the frameworks to address the grievances arising from the project, severely compromises the independence of the grievance redressal body. An independent national grievance redressal body with state and district level bodies under it, should be set up. Further, the NIAI Bill, 2010, provided for establishing an Identity Review Committee to monitor the usage pattern of Aadhaar numbers. This has been removed in the Aadhaar Bill 2016, and must be restored.</li></ol>
<p> </p>
<h3>Endnotes</h3>
<p><strong>[1]</strong> See: <a href="http://cis-india.org/internet-governance/blog/Flaws_in_the_UIDAI_Process_0.pdf.">http://cis-india.org/internet-governance/blog/Flaws_in_the_UIDAI_Process_0.pdf</a>.</p>
<p><strong>[2]</strong> See: <a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf">http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf</a>.</p>
<p><strong>[3]</strong> See: <a href="http://164.100.47.134/lsscommittee/Finance/15_Finance_42.pdf">http://164.100.47.134/lsscommittee/Finance/15_Finance_42.pdf</a>.</p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/blog/list-of-recommendations-on-the-aadhaar-bill-2016'>http://editors.cis-india.org/internet-governance/blog/list-of-recommendations-on-the-aadhaar-bill-2016</a>
</p>
No publisherAmber Sinha, Sumandro Chattapadhyay, Sunil Abraham, and Vanya RakeshUIDBig DataPrivacyInternet GovernanceFeaturedDigital IndiaAadhaarBiometricsHomepage2016-03-21T08:50:09ZBlog Entry