You are here: Home / Internet Governance / Blog / Vulnerabilities in the UIDAI Implementation Not Addressed by the Aadhaar Bill, 2016

Vulnerabilities in the UIDAI Implementation Not Addressed by the Aadhaar Bill, 2016

Posted by Pooja Saxena and Amber Sinha at Mar 21, 2016 07:35 AM |
In this infographic, we document the various issues in the Aadhaar enrolment process implemented by the UIDAI, and highlight the vulnerabilities that the Aadhaar Bill, 2016 does not address. The infographic is based on Vidushi Marda’s article 'Data Flow in the Unique Identification Scheme of India,' and is designed by Pooja Saxena, with inputs from Amber Sinha.

 

Download the infographic: PDF and PNG.

 

Credits: The illustration uses the following icons from The Noun Project - Thumpbrint created by Daouna Jeong, Duplicate created by Pham Thi Dieu Linh, Copy created by Mahdi Ehsaei.

License: It is shared under Creative Commons Attribution 4.0 International License.

 

Vulnerabilities in the UIDAI Implementation Not Addressed by the Aadhaar Bill, 2016