<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="http://editors.cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>http://editors.cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 5211 to 5225.
        
  </description>
  
  
  
  
  <image rdf:resource="http://editors.cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/Aayush.jpg"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/openness/events/aaron-swartz-memorial-hacknight"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/aakriti.jpg"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/aadhaar-truth"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/electronic-frontier-foundation-jyoti-panday-june-1-2017-aadhaar-ushering-in-a-commercialized-era-of-surveillance-in-india"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/livemint-march-9-2016-shreeja-sen-aadhaar-govt-will-not-compromise-on-national-security"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/bbc-news-soutik-biswas-may-4-2017-aadhaar-are-a-billion-identities-at-risk-on-indias-biometric-database"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/livemint-april-21-2017-komal-gupta-apurva-vishwanath-suranjana-roy-aadhaar-a-widening-net"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/economic-times-august-10-2016-neha-alawadhi-gulveen-aulakh-aadhaar-enabled-smartphones-will-ease-money-transfer"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/business-standard-rohith-jyothish-may-5-2017-aadhaar-the-largest-biometric-database-globally-but-it-is-leaky-by-design"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/business-standard-sanjay-kumar-singh-aadhaar-security-here-is-how-your-private-information-can-be-protected"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/dna-may-2-2017-report-aadhaar-numbers-of-135-mn-may-have-leaked-claims-cis-report"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/pti-news-may-2-2017-aadhaar-numbers-of-135mn-may-have-leaked-claims-cis-report"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/times-of-india-may-5-2017-aadhaar-numbers-of-135-mn-may-have-leaked-claims-cis-report"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/business-standard-sahil-makkar-march-12-2016-aadhaar-is-actually-surveillance-tech-sunil-abraham"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="http://editors.cis-india.org/home-images/Aayush.jpg">
    <title>Aayush Rathi</title>
    <link>http://editors.cis-india.org/home-images/Aayush.jpg</link>
    <description>
        &lt;b&gt;Aayush Rathi&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/Aayush.jpg'&gt;http://editors.cis-india.org/home-images/Aayush.jpg&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2019-09-22T15:17:01Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/openness/events/aaron-swartz-memorial-hacknight">
    <title>Aaron Swartz Memorial Hacknight</title>
    <link>http://editors.cis-india.org/openness/events/aaron-swartz-memorial-hacknight</link>
    <description>
        &lt;b&gt;On Saturday, January 19, 2013, HasGeek and the Centre for Internet and Society (CIS) are organizing a hacknight to understand Aaron’s work and contribute to his projects. The event starts from 2.00 p.m. onwards and ends at 8.00 a.m., the next day morning. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;span&gt;Among the hackers present will be some of Aaron's collaborators, such as &lt;/span&gt;&lt;a href="https://twitter.com/anandology"&gt;&lt;span&gt;Anand Chitipothu&lt;/span&gt;&lt;/a&gt;&lt;span&gt; and &lt;/span&gt;&lt;a href="https://twitter.com/asldevi"&gt;&lt;span&gt;A S L Devi.&lt;/span&gt;&lt;/a&gt;&lt;span&gt;The Aaron Swartz memorial hacknight is a free event. You &lt;/span&gt;&lt;span&gt;do not&lt;/span&gt;&lt;span&gt; have to be a hacker to contribute and do not have to be present for the  entire night. Join us even if just to show solidarity or inspire others  on what they can do. HasGeek encourages participants to bring their own  energy drinks and snacks for the evening so that there is enough to go  around. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b id="internal-source-marker_0.2664988487958908"&gt;&lt;span&gt;To register, visit: &lt;/span&gt;&lt;a href="http://hacknight.in/hasgeek/aaronsw-memorial"&gt;&lt;span&gt;http://hacknight.in/hasgeek/aaronsw-memorial&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. Once your registration is approved, you can add or join a project to work on during the hacknight.&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;Aaron  Swartz&lt;/span&gt;&lt;/b&gt;&lt;span&gt;&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Aaron  Swartz was a hacktivist. He helped create RSS 1.0; contributed to  Creative Commons; was an early builder of Reddit, where he's often  acknowledged as a co-founder; created the &lt;/span&gt;&lt;a href="http://webpy.org/"&gt;&lt;span&gt;web.py&lt;/span&gt;&lt;/a&gt;&lt;span&gt; framework; and more recently, became a data liberator, first with  PACER, the US public case law archive, and then with scholarly articles  from JSTOR, both of which got him into trouble with the law. Aaron's &lt;/span&gt;&lt;a href="http://demandprogress.org/"&gt;&lt;span&gt;Demand Progress&lt;/span&gt;&lt;/a&gt;&lt;span&gt; project helped stop SOPA and PIPA, the Stop Online Piracy Act and the  Protect IP Act in the US, both of which threatened to have far reaching  unintended consequences.&lt;/span&gt;&lt;a href="http://rememberaaronsw.tumblr.com/"&gt;&lt;span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://rememberaaronsw.tumblr.com/"&gt;&lt;span&gt;Aaron Swartz took his life on Jan 11, 2013.&lt;/span&gt;&lt;/a&gt;&lt;span&gt; However, his work on making the world a better place should not die with him. On Saturday, January 19, &lt;/span&gt;&lt;a href="http://hasgeek.com/"&gt;&lt;span&gt;HasGeek&lt;/span&gt;&lt;/a&gt;&lt;span&gt; and the &lt;/span&gt;&lt;a href="http://editors.cis-india.org/"&gt;&lt;span&gt;Centre for Internet and Society (CIS)&lt;/span&gt;&lt;/a&gt;&lt;span&gt; are organizing a &lt;/span&gt;&lt;a href="http://hacknight.in/hasgeek/aaronsw-memorial"&gt;&lt;span&gt;hacknight&lt;/span&gt;&lt;/a&gt;&lt;span&gt; to understand Aaron’s work and contribute to his projects. Among the  hackers present will be some of Aaron's collaborators, such as &lt;/span&gt;&lt;a href="https://twitter.com/anandology"&gt;&lt;span&gt;Anand Chitipothu&lt;/span&gt;&lt;/a&gt;&lt;span&gt; and &lt;/span&gt;&lt;a href="https://twitter.com/asldevi"&gt;&lt;span&gt;A S L Devi&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, who can help you get started.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;About HasGeek&lt;/span&gt;&lt;span&gt;&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;HasGeek  creates discussion spaces around emerging technologies to foster the  growth of communities. Since 2010, HasGeek has organized a number of  conferences, hacknights and geekups around open source, web design and  development, big data, cloud computing and mobile opportunities. The &lt;/span&gt;&lt;a href="http://jobs.hasgeek.com/"&gt;&lt;span&gt;HasGeek Job Board&lt;/span&gt;&lt;/a&gt;&lt;span&gt; connects thousands of individuals every month with jobs around upcoming  technologies. HasGeek also builds tools to assist communities with  organizing events and meetups. For more information, write to &lt;/span&gt;&lt;a href="mailto:info@hasgeek.com"&gt;&lt;span&gt;info@hasgeek.com&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&lt;/span&gt;&lt;span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;About CIS&lt;/span&gt;&lt;span&gt;&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;CIS  is a research and advocacy organization based in Bangalore. Founded in  2008, the Centre critically engages with issues concerning internet  governance, freedom of speech, public accountability and digital  pluralism. &lt;/span&gt;&lt;span&gt;Through  multidisciplinary research, intervention, and collaboration, CIS seeks  to explore, understand, and affect the shape and form of the internet,  and its relationship with the political, cultural, and social milieu of  our times.&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/openness/events/aaron-swartz-memorial-hacknight'&gt;http://editors.cis-india.org/openness/events/aaron-swartz-memorial-hacknight&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    

   <dc:date>2013-01-17T05:18:22Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/home-images/aakriti.jpg">
    <title>Aakriti</title>
    <link>http://editors.cis-india.org/home-images/aakriti.jpg</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/aakriti.jpg'&gt;http://editors.cis-india.org/home-images/aakriti.jpg&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2012-02-15T10:50:56Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/aadhaar-truth">
    <title>Aadhaar’s moment of truth</title>
    <link>http://editors.cis-india.org/news/aadhaar-truth</link>
    <description>
        &lt;b&gt;It’s time for the unique identity project to answer tough questions it has dodged so far, writes MA Arun in the Deccan Herald. &lt;/b&gt;
        
&lt;p&gt;On June 25, 2009, Prime Minister Manmohan Singh generated one of the biggest feel-good headlines of UPA2. He appointed former Infosys CEO Nandan Nilekani as Chairperson of Unique Identification Authority of India (UIDAI), which had been set up to assign a unique number to every resident of the country.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;UIDAI – billed as the world’s largest e-governance project – presented a numbing technical challenge. Fingerprint and iris samples of one billion plus Indian residents had to be collected along with details of name, gender, birth date and address. A unique identity had to be assigned to each resident in return and then authenticate it online whenever called for.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Nilekani using his stature in the IT industry assembled a smart team of engineers, who could take the challenge head on. He also started tirelessly crisscrossing the country promoting the project and tying up with different government agencies and PSUs.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;He addressed countless gatherings conveying a simple message: Indian growth has bypassed the poor and giving them legal identity was the first step in acknowledging their existence and making government services accessible.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In the last two years, there has been a little change in his script and in the response of the audience, which has by and large remained breathless and adulatory. There have been a few jarring notes. Once in a while he is accosted by individuals and organisations, who say the project takes away their privacy. &amp;nbsp;&lt;/p&gt;
&lt;p&gt;Most memorably, on January 7, 2011, Nilekani faced an uncharacteristically unruly audience at IISc, Bangalore, which demanded strong protection to privacy. People who attended the meeting found Nilekani evasive as protesting students waved placards outside the venue, urging him to go back. &amp;nbsp;&lt;/p&gt;
&lt;p&gt;But for the media, this reporter included, the dissenting opinion from possibly fringe protesters, sounded exaggerated, making too much of a small issue, debating an academic issue of little practical value.&lt;/p&gt;
&lt;p&gt;Perhaps reflecting the larger prevailing sentiments on Aadhaar, Sujeet Pillai of Feecounter, says with the rise of social networking, privacy has already eroded. "We put more information on Facebook and Twitter than we share with Aadhaar. The benefits of the project outweigh the cost," he adds. &amp;nbsp;&lt;/p&gt;
&lt;p&gt;Many say it is only the middleclass which worries about privacy, while the poor would be more concerned about the benefits. &amp;nbsp; Trying to address privacy concerns, Aadhaar officials have maintained they collect just basic details, enrollment is voluntary and information is encrypted. Your approval is required to authenticate your identity and while revealing who you are, the system just gives a yes or no response, they say.&lt;/p&gt;
&lt;p&gt;Over the last year Aadhaar has picked up steam and observers, who expected the bureaucracy to resist, given its anti-corruption overtone, are mildly surprised. Various government departments are embracing it in competition. Several central ministries, state governments, PSUs have begun to tie their programmes to the Aadhaar number.&lt;/p&gt;
&lt;p&gt;Aadhaar officials say they are on course to enroll 600 million by 2014 and by October this year they expect to start enrolling one million numbers a day. The pilot projects at Mysore, Tumkur and Hyderabad have already enrolled 85 per cent of the population and the project is ramping up to other districts and states.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Early last month the Cabinet Committee on Security in a seemingly unrelated move gave partial approval for a Home ministry project, National Intelligence Grid (Natgrid). The development alarmed the privacy advocates to again raise a cry over Aadhaar. Among other things, Natgrid, being run by an ex-army man, Capt Raghu Raman, reportedly seeks to integrate 21 databases - &amp;nbsp;railways, airlines, stock exchanges, income tax, bank account details, credit card transactions, visa and immigration records, telecom service providers and chemical vendors.&lt;/p&gt;
&lt;p&gt;Most of us reading this article appear in many these databases, which today are islands of information controlled by different government agencies. They cover different segments of the population and may overlap to some extent. Stitching together these disparate databases together would require a mammoth exercise to uniquely identify all Indian residents. That is precisely what Aadhaar, the missing link, is doing, say critics.&lt;/p&gt;
&lt;p&gt;"If Aadhaar ever succeeds in assigning a unique number to all residents, it will take a maximum of two years to create a common Natgrid database. Using a terminal in his office, a cop would be able to watch whatever you do - &amp;nbsp;travelling, talking, buying - &amp;nbsp;in real time. &amp;nbsp;The surveillance technology is pretty straightforward," says noted security expert and IIT Mumbai alumni, Dr Samir Kelekar of Teknotrends.&lt;/p&gt;
&lt;p&gt;The system is being designed to catch terrorists and criminals, say Natgrid supporters. "But why subject the entire population to potentially the same level of surveillance," asks Sunil Abraham of Centre for Internet and Society.&lt;/p&gt;
&lt;p&gt;Noted jurist Usha Ramanathan says since 2008 several measures such as the Collection of Statistics Act, The Information Technology Act, &amp;nbsp;Aadhaar, National Grid have come about to collect information about people. “After 9/11 in the guise of homeland security USA expanded police powers. Something similar is happening in India after 26/11,” she says.&lt;/p&gt;
&lt;p&gt;The claims of Aadhaar benefiting the poor is untested as there has been no feasibility study, she adds. "This is a security project masquerading as an anti-poverty project," says Abraham. &amp;nbsp;&lt;/p&gt;
&lt;p&gt;Aadhaar has eluded a debate so far on these issues, say critics. Ramanathan says she made three attempts in November 2009, July 2010 and February 2011 to engage Nilekani, Aadhaar Director General R S Sharma and few other project officials on the issue.&lt;/p&gt;
&lt;h3&gt;Dubious demands&lt;/h3&gt;
&lt;p&gt;A New Delhi-based Aadhaar government official, speaking on the condition of anonymity, said there was no discussion within the project on the potential risks it posed. "The main focus is in making a paradigm shift in governance and reaching out to the poor to ensure that the Rs 3,26,000 crore being spent on subsidy is not pilfered," he said.&lt;/p&gt;
&lt;p&gt;But he went on to acknowledge that Aadhaar was like 'nuclear energy', which could be used to either make bombs or generate electricity. “It is for the media and civil society to apply pressure for the right safeguards," he said. &amp;nbsp;&lt;/p&gt;
&lt;p&gt;While the engineers and bureaucrats are steamrolling the project, the laws of the land and the promised safeguards are yet to catch up with it.&lt;/p&gt;
&lt;p&gt;Indian judiciary has also given a free hand to the law enforcement authorities to conduct surveillance. According to the latest Google Transparency Report, Indian government officials made 67 requests to remove contentious items from various Google services between July to December 2010. Only 6 requests were backed by court orders and rest were demands made by police and other executive agencies.&lt;/p&gt;
&lt;p&gt;Why is Nilekani who has emerged as the face of Aadhaar silent about the security dimension of the project, ask critics. After all, the Infosys credo is to ‘disclose when in doubt’, they point out. "Nilekani and team are good people without any evil intention. They have never lived in villages and believe that technology can solve any problem," says Abraham.&lt;/p&gt;
&lt;p&gt;Ramanathan differs. "In 2009, I would have said he was unaware of the possible risks of Aadhaar. I will not attribute that innocence to him anymore. People in power tend to be blinded by it," she says.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;"Their response has varied from ‘nobody else is asking these questions’, ‘have not come prepared to address these issues today’ and ‘we will get back to you’," she says. &amp;nbsp; &amp;nbsp;&lt;/p&gt;
&lt;p&gt;Critics also accuse Aadhaar officials of presenting a misleading picture. Enrollment started as a voluntary exercise, but is now being made mandatory to get LPG cylinders. "They were supposed to collect only basic details, but Aadhaar enrollment forms now ask for email ids and phone numbers," Ramanathan said.&lt;/p&gt;
&lt;div&gt;This news appeared in the Deccan Herald on 5 July 2011. The original post can be read &lt;a class="external-link" href="http://www.deccanherald.com/content/173274/aadhaars-moment-truth.html"&gt;here&lt;/a&gt;.&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/aadhaar-truth'&gt;http://editors.cis-india.org/news/aadhaar-truth&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2011-07-05T07:16:58Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/electronic-frontier-foundation-jyoti-panday-june-1-2017-aadhaar-ushering-in-a-commercialized-era-of-surveillance-in-india">
    <title>Aadhaar: Ushering in a Commercialized Era of Surveillance in India</title>
    <link>http://editors.cis-india.org/internet-governance/news/electronic-frontier-foundation-jyoti-panday-june-1-2017-aadhaar-ushering-in-a-commercialized-era-of-surveillance-in-india</link>
    <description>
        &lt;b&gt;Since last year, Indian citizens have been required to submit their photograph, iris and fingerprint scans in order to access legal entitlements, benefits, compensation, scholarships, and even nutrition programs. Submitting biometric information is needed for the rehabilitation of manual scavengers, the training and aid of disabled people, and anti-retroviral therapy for HIV/AIDS patients. Soon police in the Alwar district of Rajasthan will be able to register criminals, and track missing persons through an app that integrates biometric information with the Crime and Criminal Tracking Network Systems (CCTNS).&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Jyoti Panday was published by the &lt;a class="external-link" href="https://www.eff.org/deeplinks/2017/05/aadhaar-ushering-commercialized-era-surveillance-india"&gt;Electronic Frontier Foundation&lt;/a&gt; on June 1, 2017.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;These instances demonstrate how intrusive India’s controversial  national biometric identity scheme, better known as Aadhaar has grown.  Aadhaar is a 12-digit unique identity number (UID) issued by the  government after verifying a person’s biometric and demographic  information. As of April 2017, the Unique Identification Authority of  India (&lt;a href="https://uidai.gov.in/"&gt;UIDAI&lt;/a&gt;) has issued &lt;a href="http://www.financialexpress.com/opinion/why-centre-will-have-to-devise-a-comprehensive-aadhaar-bill-and-not-a-money-bill-to-address-challenges/680820/"&gt;1.14 billion&lt;/a&gt; UIDs covering nearly 87% of the population making Aadhaar, the largest  biometric database in the world. The government asserts that enrollment  reduces fraud in welfare schemes and brings greater social inclusion.  Welfare schemes that provide access to basic services for marginalized  and vulnerable groups are essential. However, unlike countries where  similar schemes have been implemented, invasive biometric collection is  being imposed as a condition for basic entitlements in India. The  privacy and surveillance risks associated with the scheme have caused  much dissension in India.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Identity and Privacy in India&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Initiated as an identity authentication tool, the critical problem  with Aadhaar is that it is being pushed as a unique identifier to access  a range of services. The government &lt;a href="http://www.dnaindia.com/india/report-alive-to-earlier-orders-that-aadhaar-should-be-voluntary-sc-2418854"&gt;continues to maintain&lt;/a&gt; that  the scheme is voluntary, and yet it has galvanized enrollment by  linking Aadhaar to over 50 schemes. Aadhaar has become the de-facto  identity document accepted at private, banks, schools, and hospitals.  Since Aadhaar is linked to the delivery of essential services,  authentication errors or deactivation &lt;a href="https://scroll.in/topic/38792/identity-project"&gt;has serious consequences&lt;/a&gt; including exclusion and denial of statutory rights. But more  importantly, using a unique identifier across a range of schemes and  services enables seamless combination and comparison of databases. By  using Aadhaar, &lt;a href="https://scroll.in/article/833080/aadhaar-amid-the-hullabaloo-about-privacy-the-more-pressing-issue-of-exclusion-has-been-forgotten"&gt;the government&lt;/a&gt; can  match existing records such as driving license, ration card, financial  history to the primary identifier to create detailed profiles. Aadhaar  may not be the only mechanism, but essentially, it's a surveillance tool  that the Indian government can use to surreptitiously identify and  track citizens.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is worrying, particularly in context of the ambiguity regarding  privacy in India. The right to privacy for Indian citizens is not  enshrined in the Constitution. Although, the Supreme Court &lt;a href="https://thewire.in/7398/sorry-mr-attorney-general-we-do-actually-have-a-constitutional-right-to-privacy/"&gt;has located&lt;/a&gt; the right to privacy as implicit in the concept of “ordered liberty”  and held that it is necessary in order for citizens to effectively enjoy  all other fundamental rights. There is also no comprehensive national  framework that regulates the collection and use of personal  information. In 2012, Justice K.S. Puttaswamy&lt;a href="http://judis.nic.in/supremecourt/imgs1.aspx?filename=42841"&gt; challenged&lt;/a&gt; Aadhaar in the Supreme Court of India on the grounds that it violates  the right to privacy. The Court passed an interim order restricting  compulsory linking of Aadhaar for benefits delivery, and referred the  clarification on privacy as a right to a larger bench. More than a year  later, the constitutional bench &lt;a href="http://indianexpress.com/article/opinion/columns/supreme-test-4642608/"&gt;is yet to be&lt;/a&gt; constituted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The delay in sorting out the nature and scope of privacy as right in  India has allowed the government to continue linking Aadhaar to as many  schemes as possible, perhaps with the intention of ensuring the scheme  becomes too big to be rolled back. In 2016, the government enacted the '&lt;a href="https://uidai.gov.in/images/the_aadhaar_act_2016.pdf"&gt;Aadhaar Act&lt;/a&gt;' passing the legislation without any debate, discussion or even approval of both houses of Parliament. In April this year, &lt;a href="http://www.hindustantimes.com/business-news/now-aadhaar-a-must-to-file-income-tax-returns-and-apply-for-pan-card/story-71CBEXGGD8yd9iFjUn4oNI.html"&gt;Aadhaar was made compulsory&lt;/a&gt; for filing income tax or PAN number application and the decision is being challenges in Supreme Court. &lt;a href="http://www.dnaindia.com/india/report-arguments-on-so-called-privacy-is-bogus-ag-rohtagi-defends-making-aadhaar-mandatory-for-pan-card-in-sc-2425525"&gt;Defending the State &lt;/a&gt;, the  Attorney-General of India claimed that the arguments on so-called  privacy and bodily intrusion is bogus, and citizens cannot have an  absolute right over their body! The State’s articulation is chilling,  especially in light of the &lt;a href="https://qz.com/463279/indias-dna-profiling-bill-may-become-one-of-the-worlds-most-intrusive-laws/"&gt;Human DNA Profiling Bill&lt;/a&gt; seeking  the right to collect biological samples and DNA indices of citizens.  Such anti-rights arguments are worth note because biometric tracking of  citizens isn't just government policy - it is also becoming big  business.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Role of Private Companies&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Private companies supply hardware, software, programs, and the  biometric registration services for rolling out Aadhaar to India’s large  population. UIDAI’s Committee on Biometrics acknowledges that  biometrics data are national assets though American biometric technology  provider L-1 Identity Solutions, and consulting firms Accenture and  Ernst and Young can &lt;a href="https://www.bloombergquint.com/technology/2017/05/03/who-has-your-aadhaar-data"&gt;access and retain&lt;/a&gt; citizens' data. The Aadhaar Act introduces electronic  Know-Your-Customer (eKYC) that allows government agencies and private  companies to download data such as name, gender and date of birth from  the Aadhaar database at the time of authentication. Banks and telecom  companies using authentication process to download data and auto-fill  KYC forms and to profile users. Over the last few years, the number of  companies or applications built around profiling of citizens’ personally  sensitive data has grown exponentially.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A number of people linked with creating the UIDAI infrastructure have  founded iSPIRT, an organisation that is pushing for commercial uses of  Aadhaar. Private companies are using Aadhaar for authentication purposes  and background checks. Microsoft has &lt;a href="http://gadgets.ndtv.com/apps/news/skype-lite-for-android-launched-what-it-is-how-it-works-and-everything-else-you-need-to-know-1662147"&gt;announced&lt;/a&gt; SkypeLite integration with Aadhaar to verify users. Others, such as &lt;a href="https://www.trustid.in/"&gt;TrustId &lt;/a&gt;and &lt;a href="http://timesofindia.indiatimes.com/city/delhi/eko-partners-npci-to-allow-aadhaar-linked-money-transfers/articleshow/53046280.cms"&gt;Eko&lt;/a&gt; are  integrating rating systems into their authentication services and  tracking users through platforms they create. In essence such companies  are creating their own private database to track authenticated Aadhaar  users and they may sell this data to other companies. The growth of  companies that &lt;a href="https://scroll.in/article/823274/how-private-companies-are-using-aadhaar-to-deliver-better-services-but-theres-a-catch"&gt;share and combine databases&lt;/a&gt; to profile users is an indication of the value of personal data and its  centrality for both large and small companies in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Integrating and linking large biometrics collections to each other,  which are then linked with traditional data points that private  companies hold such as geolocation or phone number enables constant  surveillance to take over. So far, there has been no parliamentary  discussion on the role of private companies. UIDAI remains the ultimate  authority in deciding the nature, level and cost of access granted to  private companies. For example, there is nothing in Aadhaar Act that  prevents Facebook from entering into an agreement with the Indian  government to make Aadhaar mandatory to access WhatsApp or any of its  other services. Facebook could also pay data brokers and aggregators to  create customer profiles to add to its ever growing data points for  tracking and profiling its users.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Security Risks and Liability&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A series of data leakages have raised concerns about which private  entities are involved, and how they handle personal and sensitive data.  In February, UIDAI registered a complaint against three companies for  storing and using biometric data for multiple transactions. Aadhaar  numbers of over 130 million people and bank account details of about 100  million people&lt;a href="http://www.thehindubusinessline.com/info-tech/aadhaar-data-leak-exposes-cyber-security-flaws/article9677360.ece"&gt; have been publicly displayed&lt;/a&gt; through government portals owing to poor security practices. A &lt;a href="https://sabrangindia.in/sites/default/files/aadhaarfinancialinfo_02b_1.pdf?498"&gt;recent report&lt;/a&gt; from Centre for Internet and Society (CIS) showed that a &lt;a href="https://thewire.in/133916/taking-cognisance-of-the-deeply-flawed-system-that-is-aadhaar/"&gt;simple tweaking of URL query parameters&lt;/a&gt; of  the National Social Assistance Programme (NSAP) website could unmask  and display private information of a fifth of India's population.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Such data leaks pose a huge risk as compromised biometrics can never  be recovered. The Aadhaar Act establishes UIDAI as the primary custodian  of identity information, but &lt;a href="https://scroll.in/article/830589/under-the-right-to-information-law-aadhaar-data-breaches-will-remain-a-state-secret"&gt; is silent on the liability&lt;/a&gt; in  case of data breaches. The Act is also unclear about notice and  remedies for victims of identity theft and financial frauds and citizens  whose data has been compromised. UIDAI has continued to fix breaches  upon being notified, but maintains that storage in federated databases  ensures that no agency can track or profile individuals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After almost a decade of pushing a framework for mass collection of data, the Indian government has &lt;a href="http://www.dot.gov.in/sites/default/files/2017_05_26%20Circulation%20Letter%20for%20Security%20of%20Information.pdf"&gt;issued guidelines &lt;/a&gt; to  secure identity and sensitive personal data in India. The guidelines  could have come earlier, and given large data leaks in the past may also  be redundant. Nevertheless, it is reassuring to see practices for  keeping information safe and the idea of positive informed consent being  reinforced for government departments. To be clear, the guidelines are  meant for government departments and private companies using Aadhaar for  authentication, profiling and building databases fall outside its  scope. With political attitudes to corporations exploiting personal  information changing the world over, the stakes for establishing a  framework that limits private companies commercializing personal data  and tracking Indian citizens are as high as they have ever been.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/electronic-frontier-foundation-jyoti-panday-june-1-2017-aadhaar-ushering-in-a-commercialized-era-of-surveillance-in-india'&gt;http://editors.cis-india.org/internet-governance/news/electronic-frontier-foundation-jyoti-panday-june-1-2017-aadhaar-ushering-in-a-commercialized-era-of-surveillance-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-06-07T12:45:30Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/livemint-march-9-2016-shreeja-sen-aadhaar-govt-will-not-compromise-on-national-security">
    <title>Aadhaar: Govt will not compromise on national security </title>
    <link>http://editors.cis-india.org/internet-governance/news/livemint-march-9-2016-shreeja-sen-aadhaar-govt-will-not-compromise-on-national-security</link>
    <description>
        &lt;b&gt;The government is confident that the Aadhaar Bill will be passed.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Shreeja Sen was &lt;a class="external-link" href="http://www.livemint.com/Politics/dt7ODlffwvbWvKH93jfR3K/Aadhaar-Govt-will-not-compromise-on-national-security.html"&gt;published by Livemint&lt;/a&gt; on March 9, 2016. Pranesh Prakash gave inputs.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;In what could raise concerns of privacy activists questioning India’s unique identification project Aadhaar, the government on Tuesday said national security will not be compromised at all.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We will not compromise on national security; certainly we will not compromise. The Supreme Court has already highlighted certain areas for consideration. We are going ahead taking into consideration all the suggestions of the Supreme Court,” law minister D.V. Sadananda Gowda said at a press conference, when asked how the Aadhaar bill tabled in Parliament last week will balance the protection of core biometrics and national security concerns.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under the Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Bill, 2016, there are measures to protect core biometric information like fingerprints and iris scans of the unique identification number holders.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, Section 33 says for the purposes of national security, officials at the joint secretary level and above can access this information. The section has caused some worry to experts. In this &lt;b&gt;&lt;a href="http://www.livemint.com/Opinion/VSqpBps7Y5YrUhvS5mGgSO/Aadhaar-still-too-many-problems.html" target="_blank"&gt;&lt;span style="text-decoration: underline;"&gt;analysis&lt;/span&gt;&lt;/a&gt; &lt;/b&gt; , policy director of the Centre for Internet and Society Pranesh Prakash says that the national security clause is worrisome. Adding to their concerns, the bill does not define what national security means.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government is, however, confident that the bill will be passed. “Certainly it will be passed. The benefits that go from the exchequer to the beneficiaries will be taken care of by this bill,” Gowda said.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/livemint-march-9-2016-shreeja-sen-aadhaar-govt-will-not-compromise-on-national-security'&gt;http://editors.cis-india.org/internet-governance/news/livemint-march-9-2016-shreeja-sen-aadhaar-govt-will-not-compromise-on-national-security&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-03-22T15:51:13Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/bbc-news-soutik-biswas-may-4-2017-aadhaar-are-a-billion-identities-at-risk-on-indias-biometric-database">
    <title>Aadhaar: Are a billion identities at risk on India's biometric database</title>
    <link>http://editors.cis-india.org/internet-governance/news/bbc-news-soutik-biswas-may-4-2017-aadhaar-are-a-billion-identities-at-risk-on-indias-biometric-database</link>
    <description>
        &lt;b&gt;"My fingerprints and iris are mine and my own. The state cannot take away my body," a lawyer told India's Supreme Court last week.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Soutik Biswas was &lt;a class="external-link" href="http://www.bbc.com/news/world-asia-india-39769322"&gt;published by BBC News&lt;/a&gt; on May 4, 2017. Also see the blog post by Rawlson King published by &lt;a class="external-link" href="http://www.biometricupdate.com/201705/report-claims-millions-of-aadhaar-registration-and-bank-numbers-compromised"&gt;Biometric Update.com&lt;/a&gt; on May 5, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Shyam Divan was arguing a &lt;a class="story-body__link-external" href="https://barandbench.com/day-3-aadhaar-hearing-eminent-domain-confined-to-land-cannot-extend-it-to-human-body/"&gt;crucial petition &lt;/a&gt;challenging  a new law that makes it compulsory for people to submit a controversial  biometric-based personal identification number while filing income tax  returns.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Defending this law, the government's top law officer told  the court on Tuesday that an individual's "right to body is not an  absolute right".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"You can have right over your body but the state  can restrict trading in body organs, so the state can exercise control  over the body," Attorney General Mukul Rohatgi said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the heart  of the latest challenge are rising concerns over the security of this  mega biometric database and privacy of the number holders. (The  government says it needs to link the identity number to income tax  returns to improve compliance and prevent fraud.)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India's biometric database is the world's largest. Over the past  eight years, the government has collected fingerprints and iris scans  from &lt;a class="story-body__link-external" href="http://economictimes.indiatimes.com/news/politics-and-nation/1-12-billion-indians-have-aadhaar-numbers-by-now-heres-how-modi-government-plans-to-sign-up-the-rest/articleshow/57914441.cms"&gt;more than a billion&lt;/a&gt; residents - or nearly 90% of the population - and stored them in a high  security data centre. In return, each person has been provided with a  randomly generated, unique 12-digit identity number.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For a  country of 1.2 billion people with only 65 million passport-holders and  200 million with driving licenses, the portable identity number is a  boon to the millions who have long suffered for a lack of one.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;States have been using the number, also called Aadhaar (Foundation),  to transfer government pensions, scholarships, wages for a landmark  rural jobs-for-work scheme and benefits for cooking fuel to targeted  recipients, and distribute cheap food to the poor.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Over the  years, the number has taken a life of its own and begun exerting, what  many say, is an overweening and stifling control over people's lives.  For many like political scientist Pratap Bhanu Mehta, Aadhaar has  transmuted from a "tool of citizen empowerment to a &lt;a class="story-body__link-external" href="http://indianexpress.com/article/opinion/columns/privacy-after-aadhaar-money-bill-rajya-sabha-upa/"&gt;tool of state surveillance&lt;/a&gt; and citizen vulnerability".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;People will soon need the number to receive benefits from more than 500 of India's 1,200-odd welfare schemes. Even&lt;a class="story-body__link-external" href="https://scroll.in/article/823274/how-private-companies-are-using-aadhaar-to-deliver-better-services-but-theres-a-catch"&gt; banks and private firms&lt;/a&gt; have begun using it to authenticate consumers: a new telecom company  snapped up 100 million subscribers in quick time recently by verifying  the customer's identity through the number.&lt;/p&gt;
&lt;h2 class="story-body__crosshead" style="text-align: justify; "&gt;'Forcibly linked'&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;People  are using the number to even get their marriages registered. The  number, says Nikhil Pahwa, editor and publisher of Indian news site  MediaNama, is "being forcibly linked to mobile numbers, bank accounts,  tax filings, scholarships, pensions, rations, school admissions, health  records and much much more, which thus puts more personal information at  risk".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some of the fears are not without basis.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government has assured that the biometric data is &lt;a class="story-body__link-external" href="http://www.hindustantimes.com/india-news/aadhaar-is-safe-secure-and-robust-says-i-t-minister-ravi-shankar-prasad/story-k3Judj5xqGdHmHuraZggTN.html"&gt;"safe and secure in encrypted form"&lt;/a&gt;, and anybody found guilty of leaking data can be jailed and fined.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But there have already been a &lt;a class="story-body__link-external" href="http://www.medianama.com/2017/04/223-aadhaar-leaks-database/"&gt;number of leaks&lt;/a&gt; of details of students, pensioners and recipients of welfare benefits  involving a dozen government websites. Even former Indian cricket  captain &lt;a class="story-body__link-external" href="http://www.dailyo.in/variety/ms-dhoni-wife-sakshi-leaked-private-details-aadhaar-card/story/1/16421.html"&gt;MS Dhoni's personal information&lt;/a&gt; was mistakenly tweeted by an overzealous enrolment service provider.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Now a disturbing &lt;a class="story-body__link-external" href="http://cis-india.org/internet-governance/information-security-practices-of-aadhaar-or-lack-thereof-a-documentation-of-public-availability-of-aadhaar-numbers-with-sensitive-personal-financial-information-1"&gt;report&lt;/a&gt; by The Centre for Internet and Society claims that details of around  130-135 million Aadhaar numbers, and around 100 million bank numbers of  pensioners and rural jobs-for-work beneficiaries have been leaked online  by four key government schemes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;More than 230 million people  nationwide are accessing welfare benefits using their numbers, and  potentially, according to the report, "we could be looking at a data  leak closer to that number". And linking the number to different  databases - as the government is doing - is increasing the risk of data  theft and surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The chief law officer believes that the outrage over the leaks is "much ado about nothing".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Biometrics  were not leaked, only Aadhaar numbers were leaked. It is nothing  substantial. The idea is biometrics should not be leaked," Mukul Rohtagi  told the Supreme Court on Tuesday.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government itself has admitted that it has&lt;a class="story-body__link-external" href="http://indianexpress.com/article/india/aadhaar-card-uidai-cracks-down-on-1000-operators-in-three-months-for-malpractices-fir-against-20-4606006/"&gt; blacklisted or suspended some 34,000 service providers&lt;/a&gt; for helping create "fake" identification numbers or not following  proper processes. Two years ago, a man was arrested for getting an &lt;a class="story-body__link-external" href="http://indianexpress.com/article/trending/man-arrested-for-getting-aadhar-card-made-for-dog/"&gt;identification number for his pet dog&lt;/a&gt;.   The government itself has deactivated 8.5 million numbers for  incorrect data, dodgy biometrics and duplication. Last month, crop loss  compensation for more than 40,000 farmers was delayed because their  Aadhaar numbers were &lt;a class="story-body__link-external" href="http://timesofindia.indiatimes.com/city/bengaluru/banks-mess-up-aadhaar-entry-relief-delayed-to-40000-farmers/articleshow/58424252.cms?utm_source=toimobile&amp;amp;utm_medium=Twitter&amp;amp;utm_campaign=referral&amp;amp;from=mdr"&gt;"entered incorrectly by banks&lt;/a&gt;".&lt;/p&gt;
&lt;h2 class="story-body__crosshead" style="text-align: justify; "&gt;'Mass surveillance'&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;There  are also concerns that the number can be used for profiling. Recently,  authorities asked participants at a function in a restive university  campus in southern India &lt;a class="story-body__link-external" href="http://www.newindianexpress.com/cities/hyderabad/2017/apr/26/osmania-university-centenary-aadhaar-must-for-entry-activists-not-amused-1597850.html"&gt;to provide their Aadhaar identity numbers&lt;/a&gt;.  "This is not only a matter of privacy. The all pervasiveness of the  Aadhaar number is a threat to freedom of expression, which is a  constitutional right," Srinivas Kodali, who investigated the latest  report on data leaks, told me.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Critics say the government is  steaming ahead with making the number compulsory for a range of  services, violating a Supreme Court order which said enrolment would be  voluntary. "The main danger of the number," says economist Jean Dreze,  "is that it opens the door to mass surveillance."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="story-body__link" href="http://www.bbc.co.uk/news/technology-23867191"&gt;Nandan Nilekani&lt;/a&gt;, the technology tycoon who set up the programme popularly known by its acronym &lt;a class="story-body__link-external" href="https://uidai.gov.in/"&gt;UIDAI&lt;/a&gt;, believes concerns about the safety of the biometric database are exaggerated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He says the identity number has cut wastage, removed fakes, curbed  corruption and made substantial savings for the government. He insists  that the programme is completely encrypted and secure. "It's like you  are creating a rule-based society," he told &lt;a class="story-body__link-external" href="https://www.ft.com/content/46dcb248-0fcb-11e7-a88c-50ba212dce4d"&gt;Financial Times&lt;/a&gt; recently, "it's the transition that is going on right now."&lt;/p&gt;
&lt;h2 class="story-body__crosshead" style="text-align: justify; "&gt;Abused&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;More  than 60 countries around the world take biometric data from its people,  says Mr Nilekani. But then there are nagging concerns worldwide about  these databases being abused by hackers and state intelligence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2016, personal details of some &lt;a class="story-body__link" href="http://www.bbc.co.uk/news/technology-35978216"&gt;50 million people in Turkey&lt;/a&gt; were reportedly leaked. (Turkey's population is estimated at 78 million.) In 2015, hackers &lt;a class="story-body__link" href="http://www.bbc.co.uk/news/technology-34346802"&gt;stole more than five million fingerprints &lt;/a&gt;after  breaching US government networks. In 2011, French experts discovered a  hack involving the theft of millions of people's data in Israel.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pratap  Bhanu Mehta has written that the lack of a "clear transparent consent  architecture, no transparent information architecture, no privacy  architecture worth the name [India doesn't have a privacy law], and  increasingly, no assurance about what exactly you do if the state  decides to mess with your identity" could easily make Aadhaar a "tool of  state suppression".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So a lot of lingering doubts remain. How  pervasive should an identity number be? What about the individual  freedom of citizens? How do you ensure the world's biggest biometric  database is secure in a country with no privacy laws and a deficient  criminal justice system?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In many ways, the debate about Aadhaar  is also a debate about the future of India. As lawyer Shyam Divan argued  forcefully in the top court, "people are reduced to vassals" when the  state controls your body to this extent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p&gt;&lt;figure class="full-width has-caption media-landscape"&gt; &lt;span class="image-and-copyright-container"&gt; &lt;/span&gt;&lt;/figure&gt;&lt;span class="image-and-copyright-container"&gt; &lt;span class="off-screen"&gt; &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/bbc-news-soutik-biswas-may-4-2017-aadhaar-are-a-billion-identities-at-risk-on-indias-biometric-database'&gt;http://editors.cis-india.org/internet-governance/news/bbc-news-soutik-biswas-may-4-2017-aadhaar-are-a-billion-identities-at-risk-on-indias-biometric-database&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-05-20T06:38:26Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/livemint-april-21-2017-komal-gupta-apurva-vishwanath-suranjana-roy-aadhaar-a-widening-net">
    <title>Aadhaar: A widening net</title>
    <link>http://editors.cis-india.org/internet-governance/news/livemint-april-21-2017-komal-gupta-apurva-vishwanath-suranjana-roy-aadhaar-a-widening-net</link>
    <description>
        &lt;b&gt;As India makes Aadhaar compulsory for a range of services, concerns about potential data breaches remain more than six years after the govt started building the world’s largest biometric identification system.&lt;/b&gt;
        &lt;p&gt;The article by Komal Gupta, Apurva Vishwanath and Suranjana Roy was &lt;a class="external-link" href="http://www.livemint.com/Politics/eTxrtAxzFq738LzFdx7yXK/Aadhaar-A-widening-net.html"&gt;published in Livemint&lt;/a&gt; on April 21, 2017. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: center; "&gt;&lt;img alt="The Aadhaar project, under which a 12-digit identification number is to be allotted to every Indian resident, was originally supposed to be a way of plugging leakages in the delivery of state benefits such as subsidized grains to the poor. Photo: Priyanka Parashar/Mint" class="img-responsive" height="378" src="http://www.livemint.com/rf/Image-621x414/LiveMint/Period2/2017/04/21/Photos/Processed/asia-cover.JPG" title="The Aadhaar project, under which a 12-digit identification number is to be allotted to every Indian resident, was originally supposed to be a way of plugging leakages in the delivery of state benefits such as subsidized grains to the poor. Photo: Priyanka Parashar/Mint" width="582" /&gt;&lt;/p&gt;
&lt;p&gt;On 29 March, a storm broke out on social media after private data  that former Indian cricket captain M.S. Dhoni had furnished to get  enrolled in India’s unique identity system, known as Aadhaar, were  leaked online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The popular cricketer’s wife, Sakshi, flagged the matter on Twitter,  tagging information technology (IT) minister Ravi Shankar Prasad. “Is  there any privacy left? Information of Aadhaar card, including  application, is made public property,” Sakshi fumed on the microblogging  site.&lt;/p&gt;
&lt;p&gt;The minister replied: “Sharing personal information is illegal. Serious action will be taken against this.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It turned out to be the fault of an overenthusiastic common services  centre in Dhoni’s home town of Ranchi licensed to enrol people in  Aadhaar. The centre was promptly blacklisted. “We have ordered further  inquiry on the matter and action will be taken against all those  involved in the leak,” said Ajay Bhushan Pandey, chief executive officer  of the Unique Identification Authority of India (UIDAI), which  administers Aadhaar.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The matter blew over soon enough, but it served to illustrate the lingering concerns about potential data breaches and privacy violations surrounding Aadhaar, which has become the world’s largest biometric identification database with 1.13 billion people enrolled in it in the past six years.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The project, under which a 12-digit identification number is to be allotted to every Indian resident, was originally supposed to be a way of plugging leakages in the delivery of state benefits such as subsidized grains to the poor.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It has now become mandatory for everything ranging from opening a bank account and getting a driver’s licence or a mobile phone connection to filing of income tax returns. Even government school students entitled to a free mid-day meal need an Aadhaar number.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="http://editors.cis-india.org/home-images/AadhaarMint.jpg" alt="Aadhaar " class="image-inline" title="Aadhaar " /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The use of Aadhaar has only expanded with the government going on an overdrive to promote cashless transactions and payment systems linked to the biometric ID system after banning old, high-value bank notes in November in a crackdown on unaccounted wealth hidden away from the taxman.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For instance, the Aadhaar-Enabled Payment System (AEPS) empowers a bank customer to use Aadhaar as her identity to access her Aadhaar-enabled bank account and perform basic banking transactions like cash deposit or withdrawal through a bank agent or business correspondent.&lt;br /&gt;&lt;br /&gt;The customer can carry out transactions by scanning her fingerprint at any micro ATM or biometric point-of-sale (POS) terminal, and entering the Aadhaar number linked to the bank account. A merchant-led model of AEPS, called Aadhaar Pay, has also been launched.&lt;br /&gt;&lt;br /&gt;Last week, Prime Minister Narendra Modi launched the BHIM-Aadhaar platform—a merchant interface linking the unique identification number to the Bharat Interface for Money (BHIM) mobile application. This will enable merchants to receive payments through fingerprint scans of customers.&lt;br /&gt;&lt;br /&gt;“Any citizen without access to smartphones, Internet, debit or credit cards will be able to transact digitally through the BHIM-Aadhaar platform,” a government statement said.&lt;br /&gt;&lt;br /&gt;Aadhaar’s growing importance in the economy has only served to deepen concerns about potential data breaches. And there are other concerns as well.&lt;br /&gt;&lt;br /&gt;For instance, the Aadhaar biometric authentication failure rate in the rural job guarantee scheme, which assures 100 days of work a year to one member of every rural household, is as high as 36% in the southern state of Telangana, according to data released by the state government.&lt;br /&gt;&lt;br /&gt;“Aadhaar is supposed to be an enabler and it will happen only when it is made voluntary. Biometric authentications might fail due to poor data connectivity and transactions might not happen even though the Aadhaar number of the person is there; so, what’s the benefit,” asked Pranesh Prakash, policy director of the Centre for Internet and Society, a Bengaluru-based think tank.&lt;br /&gt;&lt;br /&gt;Aadhaar was the brainchild of the previous United Progressive Alliance (UPA) government, which lost power in the 2014 general election to the National Democratic Alliance (NDA). The first 10 Aadhaar numbers were handed over to residents of a small village called Tembhli in Maharashtra on 29 September 2010 in the presence of then prime minister Manmohan Singh, Congress party president Sonia Gandhi and Aadhaar’s chief architect Nandan Nilekani, a co-founder of software services giant Infosys Ltd.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After coming to power, the NDA systematically went about making Aadhaar the pivot of government welfare programmes. In March last year, Parliament passed the Aadhaar Bill to make the use of Aadhaar mandatory for availing of government subsidies despite resistance from opposition parties.&lt;br /&gt;&lt;br /&gt;Last month, finance minister Arun Jaitley said the 12-digit number would eventually become a single, monolithic proof of identity for every Indian, replacing every other identity card.&lt;br /&gt;&lt;br /&gt;To be sure, Aadhaar has helped the government better target beneficiaries of its welfare programmes, cutting out middlemen and corruption. For instance, the government claims to have saved about Rs50,000 crore in cooking gas subsidies by linking the Aadhaar number with bank accounts in which the subsidy is directly transferred.&lt;br /&gt;&lt;br /&gt;Yet, Aadhaar has its critics, who have challenged the project on grounds including potential compromise of national security, violation of the right to privacy and exclusion of people from welfare programmes. The Supreme Court has cautioned the government that no citizen can be denied access to welfare programmes for lack of an Aadhaar number.&lt;br /&gt;&lt;br /&gt;Before cricketer Dhoni’s data breach made the headlines, in February, UIDAI filed a complaint against Axis Bank Ltd, business correspondent Suvidhaa Infoserve and e-sign provider eMudhra, alleging they had attempted unauthorized authentication and impersonation by illegally storing Aadhaar biometrics. The breach was noticed after one individual performed 397 biometric transactions between 14 July 2016 and 19 February 2017. All three entities have been temporarily barred from offering Aadhaar-related services until UIDAI makes a final decision.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash of the Centre for Internet and Society said rules on the use of Aadhaar data are inadequate.&lt;br /&gt;&lt;br /&gt;“UIDAI is allowed to share the information of a person from its database on its website, after taking proper consent of that person. However, there is no law which states what should be done if any other party does that with the same individual. Such rules must be in place,” Prakash said.&lt;br /&gt;&lt;br /&gt;Four years after the Aadhaar project took off, a retired judge took the government to court. K. Puttaswamy, a former judge of the Karnataka high court, moved the Supreme Court in 2013, arguing that Aadhaar violated his fundamental right to privacy under the constitution. The case opened the gates for legal challenges to Aadhaar. Over the next few years till date, at least a dozen cases had questioned the legality of the project.&lt;br /&gt;&lt;br /&gt;Ramon Magsaysay award winner Aruna Roy brought a case on behalf of manual workers whose faint finger prints, she said, often go undetected. Currently, only 44 million out of the 101 million beneficiaries of India’s rural job entitlement are paid through Aadhaar.&lt;br /&gt;&lt;br /&gt;To be sure, India’s Constitution does not contain a black and white reference to a “fundamental right to privacy”, that the government cannot violate. The list of rights says “no person shall be deprived of his life or personal liberty except according to a procedure established by law”—often interpreted by courts as an all-encompassing right including right to live with dignity, right to speedy justice and even a right to clean air.&lt;br /&gt;&lt;br /&gt;Nilekani, the man behind Aadhaar, has cautioned that privacy is a broader issue involving how people retain their privacy in day-to-day life. “Privacy is an all-encompassing issue because of the rapid rate of digitization the world is seeing. Your smartphone has sensors, GPS and is generating more and more information about everything; voice-activated devices could also be recording your conversations. There’s a profusion of CCTV cameras at malls, restaurants, ATMs recording your movements,” Nilekani said in a recent interview with The Economic Times.&lt;br /&gt;&lt;br /&gt;But this is where a problem arises. Although there is concurrence on the need for a privacy law, there is a great reluctance on the part of the government to come out with one.&lt;br /&gt;&lt;br /&gt;“We don’t have a comprehensive privacy law; all our databases are unlinked. The government is trying to link the databases using Aadhaar for all schemes but a separate privacy law must be there for protecting any piece of information, whether or not linked to Aadhaar,” said Rahul Matthan, a partner at law firm Trilegal and a Mint columnist.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Matthan said first a privacy law must be put in place and then there has to be a discussion on what all it must include.&lt;br /&gt;&lt;br /&gt;The government on its part pointed out that India’s apex court itself has been indecisive on a right to privacy.&lt;br /&gt;&lt;br /&gt;“The larger question on privacy needs to be settled by the court. Till then, one cannot comment on secondary concerns,” attorney general Mukul Rohatgi said in an interview.&lt;br /&gt;&lt;br /&gt;In 2015, the Supreme Court decided that a bench of at least seven judges will rule on the privacy issue, while clarifying that the government cannot make Aadhaar a mandatory proof of identity for its welfare schemes. Twenty months after the judicial order, the larger bench is yet to be formed by the apex court. The passing of the Aadhaar Act in Parliament to provide statutory backing to Aadhaar also indicates a departure from the Indian government’s position of not taking a legislative stand while an issue is under the apex court’s consideration.&lt;br /&gt;&lt;br /&gt;For example, one of the reasons the Indian government has shown restraint in repealing a colonial law that criminalizes homosexuality is because the apex court is seized of the issue.&lt;br /&gt;&lt;br /&gt;In the absence of legislation and pending an authoritative ruling by the top court, whether 1.3 billion Indians are entitled to their privacy remains a grey area. Meanwhile, the government is seemingly in the final stretch of its Aadhaar enrolment drive.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/livemint-april-21-2017-komal-gupta-apurva-vishwanath-suranjana-roy-aadhaar-a-widening-net'&gt;http://editors.cis-india.org/internet-governance/news/livemint-april-21-2017-komal-gupta-apurva-vishwanath-suranjana-roy-aadhaar-a-widening-net&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Biometrics</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-04-22T05:06:23Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/economic-times-august-10-2016-neha-alawadhi-gulveen-aulakh-aadhaar-enabled-smartphones-will-ease-money-transfer">
    <title>Aadhaar-enabled smartphones will ease money transfer</title>
    <link>http://editors.cis-india.org/internet-governance/news/economic-times-august-10-2016-neha-alawadhi-gulveen-aulakh-aadhaar-enabled-smartphones-will-ease-money-transfer</link>
    <description>
        &lt;b&gt;With its plans to make smartphones Aadhaar-enabled, the government hopes to provide users a means to do self-authentication and let businesses and banks verify the identity of their clients through their smartphones, a move that could potentially lead the way to a cashless society. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Neha Alawadhi and Gulveen Aulakh was &lt;a class="external-link" href="http://economictimes.indiatimes.com/industry/banking/finance/banking/aadhaar-enabled-smartphones-will-ease-money-transfer/articleshow/53625690.cms"&gt;published in the Economic Times&lt;/a&gt; on August 10, 2016. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;"Iris and fingerprint sensors are now becoming a standard feature in smartphones anyway, and this requirement will only take a minor tweak to the operating system. Once enabled, people will be able to use phones to do self-authentication and KYC (know your customer)," Nandan Nikelani, former chairman of the Unique Identification Authority of India, told ET, welcoming the government's plan to make smartphones Aadhaar-enabled.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ET was the first to report that on July 27 a meeting between UIDAI,  which administers Aadhaar, and senior executives of smartphone-makers  discussed ways to allow smartphone handsets let citizens authenticate  their fingerprints and iris on the phone to get services. The most  immediate use for the Aadhaar-enabled smartphones is the Unified Payment  Interface (UPI), the new payment system that allows money transfer  between any two parties using mobile phones and a virtual payment  address.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The two-factor authentication in UPI is now being done with mobile phone as one factor, and MPIN as the second factor. But once you have Aadhaar authentication on the phone, then the second factor can be biometric authentication through Aadhaar," said Nilekani. Over time, the idea is to open Aadhaar authentication to third party apps, said another person familiar with the ongoing discussions, who did not wish to be named.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In effect, biometric and iris scan authentication could become one of the permissions a user grants to different third party apps, such as access to camera, contacts, phone book and so on. Handset makers have raised concerns about some security issues on using iris scan for Aadhar authentication. Also, companies such as Apple that have very closed ecosystems, would not be easy to get on board, several people told ET.&lt;br /&gt;&lt;br /&gt; "The primary challenge lies in safe storing of the iris scan between the time it is captured by the camera and then sent to UIDAI server seeking authentication," said an industry insider, who is aware of the discussions, requesting anonymity. The proposal for smartphone makers includes a "hardware secure zone" where biometric data will be encrypted and sent out. It will not leave the electronic secure zone without encryption, and every phone doing Aadhaar authentication will be registered in the UID system.&lt;br /&gt;&lt;br /&gt;"Unfortunately, from the biometric sensor the data goes to the hardware secure zone via the operating system. Therefore, the biometric data can be intercepted by the operating system before it is sent to the hardware secure zone," said Sunil Abraham, executive director at Bengaluru-based research organisation, the Centre for Internet and Society.&lt;br /&gt;&lt;br /&gt; "The reluctance to make changes at the vendor level are mainly coming from a desire for control of biometric data for strategic and commercial purposes. Privacy and security are bogus reasons," Nilekani said, adding that both ends - the handset and the Aadhaar database -- will use the highest level of encryption.&lt;br /&gt;&lt;br /&gt; Samsung India, which in May launched the Galaxy Tab Iris, a device that uses Aadhaar authentication, said it has taken care that its user's biometric data does not fall into the wrong hands. "We ensure that biometric data is encrypted as per UIDAI specifications in device itself for Galaxy Tab Iris," Sukesh Jain, vice president, Samsung India Electronics, told ET in an email response.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/economic-times-august-10-2016-neha-alawadhi-gulveen-aulakh-aadhaar-enabled-smartphones-will-ease-money-transfer'&gt;http://editors.cis-india.org/internet-governance/news/economic-times-august-10-2016-neha-alawadhi-gulveen-aulakh-aadhaar-enabled-smartphones-will-ease-money-transfer&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-08-10T13:33:54Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/business-standard-rohith-jyothish-may-5-2017-aadhaar-the-largest-biometric-database-globally-but-it-is-leaky-by-design">
    <title>Aadhaar's the largest biometric database globally but it is leaky by design </title>
    <link>http://editors.cis-india.org/internet-governance/news/business-standard-rohith-jyothish-may-5-2017-aadhaar-the-largest-biometric-database-globally-but-it-is-leaky-by-design</link>
    <description>
        &lt;b&gt;It the largest biometric database in the world and it is fraught with security issues.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Rohith Jyothish was &lt;a class="external-link" href="http://www.business-standard.com/article/economy-policy/aadhaar-database-is-leaky-by-design-but-it-keeps-on-growing-117050500298_1.html"&gt;published in the Business Standard&lt;/a&gt; on May 5, 2017. &lt;span class="p-content"&gt;&lt;i&gt;This article by Rohith Jyothish originally appeared on &lt;a href="https://globalvoices.org/2017/05/02/the-worlds-largest-biometric-database-is-leaking-indian-citizens-data-but-keeps-on-growing/" target="_blank"&gt;Global Voices&lt;/a&gt; on May 2, 2017&lt;/i&gt;&lt;/span&gt;&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Over the last few months, the Indian twittersphere has been awash with  citizens concerned about government websites leaking millions of  individual &lt;a href="http://www.livemint.com/Politics/bM6xWCw8rt6Si4seV43C2H/Govt-departments-breach-Aadhaar-Act-leak-details-of-benefic.html"&gt;digital ID numbers&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On May 1, the Centre for Internet and Society, a multi-disciplinary think tank in Bangalore, &lt;a href="https://thewire.in/130948/aadhaar-card-details-leaked/"&gt;released&lt;/a&gt; a report indicating that faulty information &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Security" target="_blank"&gt;security &lt;/a&gt;practices  have exposed as many as 135 million ID numbers, leaked from four  government databases. The data leaks originated in the process of  implementing online dashboards that were likely meant for general  transparency and easy administration by the government agencies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Developed by the Union government of India in 2009, the plan called for  the creation a Unique Identification Authority of India (&lt;a href="https://uidai.gov.in/"&gt;UIDAI&lt;/a&gt;) that would issue Unique Identity numbers (UIDs) to all residents of India. Under this scheme, now known as Aadhaar, the &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Uid" target="_blank"&gt;UID &lt;/a&gt;number  ties together several pieces of a person's demographic and biometric  information, including their photograph, ten fingerprints and an image  of their iris. This information is all stored in a centralized database.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The scheme has so far &lt;a href="http://www.hindustantimes.com/india-news/over-1-billion-indians-enrol-for-aadhaar-how-the-govt-plans-to-sign-up-the-rest/story-3deSdoRkOMjuBjs5pEiFmJ.html"&gt;enrolled 1.13 billion Indians&lt;/a&gt; and residents of India, making it the largest biometric database in the world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This has become a point of pride for government agencies involved in  the program. Information Technology Minister Ravishankar Prasad  (@rsprasad) tweeted:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="http://editors.cis-india.org/home-images/copy2_of_Tweet.jpg" alt="Tweet" class="image-inline" title="Tweet" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Expanding programmes&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Aadhaar" target="_blank"&gt;Aadhaar &lt;/a&gt;was  built to be used as an identity authentication mechanism that could  have multiple services being built on top of it. The scheme was run  under an executive order from its inception in 2009 until the &lt;a href="https://en.wikipedia.org/wiki/Aadhaar_%28Targeted_Delivery_of_Financial_and_other_Subsidies,_benefits_and_services%29_Act,_2016"&gt;Aadhaar Act&lt;/a&gt; was passed in 2016. The strategies employed by its supporters generated substantial controversy, and it since has been &lt;a href="http://www.firstpost.com/india/aadhaar-bill-petition-govt-opposes-congress-leader-jairam-rameshs-plea-in-supreme-court-3280688.html"&gt;challenged in the Supreme Court&lt;/a&gt; on budgetary grounds. But thus far, it remains in place.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Uidai" target="_blank"&gt;UIDAI &lt;/a&gt;has maintained that the scheme is voluntary. Yet the central government has&lt;a href="https://scroll.in/article/747366/student-battles-for-right-to-obtain-voter-card-without-having-to-enrol-for-aadhaar"&gt; pushed state governments&lt;/a&gt; to include &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Uid" target="_blank"&gt;UID &lt;/a&gt;for a wide range of essential government services meant to be available to the public.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Independent &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=News" target="_blank"&gt;news &lt;/a&gt;portal &lt;a href="https://scroll.in/"&gt;Scroll&lt;/a&gt; regularly covers issues related to UID’s linkages with various welfare programs through its &lt;a href="https://scroll.in/topic/38792/identity-project"&gt;Identity Project&lt;/a&gt;. In recent years, Scroll has identified multiple examples of public services being denied to individuals who did not have a &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Uid" target="_blank"&gt;UID.&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In &lt;a href="https://scroll.in/article/709399/why-poor-people-in-delhi-are-desperate-to-get-their-babies-uniquely-identified"&gt;Delhi&lt;/a&gt; in 2015, food rations were denied to those without UID numbers. In April 2016 in the &lt;a href="https://scroll.in/article/805909/in-rajasthan-there-is-unrest-at-the-ration-shop-because-of-error-ridden-aadhaar"&gt;Ajmer&lt;/a&gt; district of Rajasthan, UID-enabled food subsidies repeatedly recorded authentication failures.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Six months after &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Aadhaar" target="_blank"&gt;Aadhaar &lt;/a&gt;was introduced in Rajasthan, state officials report that &lt;a href="https://scroll.in/article/809661/six-months-after-rajasthan-introduced-aadhaar-at-ration-shops-only-45-beneficiaries-accessed-food"&gt;10-15% of beneficiaries&lt;/a&gt; who normally received food grains from the government (under the National Food &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Security" target="_blank"&gt;Security &lt;/a&gt;Act)  have been denied some or all of their rations because the system could  not authenticate their UIDs. A local farm laborer told Scroll that his  rations had been drastically reduced since the arrival of &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Aadhaar" target="_blank"&gt;Aadhaar.&lt;/a&gt; “In some cases, when we put our fingers, the machine reads out 5 kg, 10  kg, or 15 kg as our entitlement. But we are entitled to 35 kg as per  the government norms.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Advocates are quick to note that there is no adequate avenue to remedy  in these situations, leaving citizens with little recourse or ability to  seek that these errors be corrected.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In spite of &lt;a href="https://github.com/rethinkaadhaar/docs/tree/master/Court%20Orders"&gt;multiple court orders&lt;/a&gt; making &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Uid" target="_blank"&gt;UID &lt;/a&gt;voluntary and limited to selected schemes, the government continues to expand its scope.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;Delicate infrastructure and its misuse&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;According to economist Jean Drèze, the new authentication system requires a lot of &lt;a href="https://thewire.in/64756/jharkhand-aadhaar-pds-nfsa/"&gt;fragile technologies&lt;/a&gt; to work at the same time, such as a point of sale machine, internet  connectivity, biometrics, remote servers and mobile networks. He also  maintains that the primary cause of corruption in disbursement of food  subsidies is related to the quantity of rations distributed or &lt;a href="http://ideasforindia.in/article.aspx?article_id=1625"&gt;quantity fraud&lt;/a&gt;, which &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Uid" target="_blank"&gt;UID &lt;/a&gt;doesn't address.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another economist who has worked extensively on these issues, Reetika  Khera points out that the exclusion of large number of people from  welfare schemes has not been because of lack of an identity, but rather  due to “&lt;a href="http://ideasforindia.in/article.aspx?article_id=250#sthash.S9GVQUE2.dpbs"&gt;measly budgets and exclusion errors.&lt;/a&gt;“&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;Contention with the court&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;The &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Supreme+Court" target="_blank"&gt;Supreme Court &lt;/a&gt;issued two &lt;a href="https://scroll.in/article/709399/why-poor-people-in-delhi-are-desperate-to-get-their-babies-uniquely-identified"&gt;orders&lt;/a&gt; in September 2013 and March 2014 which stated that “no person shall be  deprived of any service for want of Aadhaar number in case he/she is  otherwise eligible/entitled.” On August 11, 2015, the court &lt;a href="https://scroll.in/article/748127/by-limiting-aadhaar-supreme-court-may-have-given-government-a-way-to-expand-its-reach"&gt;issued yet another order&lt;/a&gt; which limited the use of UID to food, kerosene and cooking gas subsidies. On October 15, it further expanded it to &lt;a href="https://scroll.in/article/763256/fact-check-will-restricting-aadhaar-now-affect-crores-of-welfare-recipients"&gt;four more schemes&lt;/a&gt;: the &lt;a href="https://en.wikipedia.org/wiki/National_Rural_Employment_Guarantee_Act,_2005"&gt;National Rural Employment Guarantee Scheme&lt;/a&gt;, &lt;a href="https://en.wikipedia.org/wiki/Pradhan_Mantri_Jan_Dhan_Yojana"&gt;Pradhan Mantri Jan Dhan Yojana&lt;/a&gt; (a scheme for financial inclusion), and policies related to pension and  provident funds, after the government argued that it would be difficult  to roll back &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Uid" target="_blank"&gt;UID &lt;/a&gt;now that it is the most used national identity system and is linked to service delivery in several major welfare schemes.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;‘Leaky’ by design&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Following the repeated arguments by the state that &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Uid" target="_blank"&gt;UID &lt;/a&gt;makes it possible to weed out ‘ghost beneficiaries’ and ‘de-duplicate’ multiple IDs, revelations of &lt;a href="https://scroll.in/article/820536/if-lord-hanuman-can-get-an-aadhaar-number-why-cant-a-pakistani-spy"&gt;fake ‘UID cards’&lt;/a&gt; began to circulate. These &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Uid" target="_blank"&gt;UID &lt;/a&gt;cards were reportedly issued under the names of pets, historical figures, one alleged spy and even gods.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="http://editors.cis-india.org/home-images/Tweet1.jpg" alt="Tweet 1" class="image-inline" title="Tweet 1" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="http://editors.cis-india.org/home-images/Tweet2.jpg" alt="Tweet 2" class="image-inline" title="Tweet 2" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span class="p-content"&gt;More recently, the Indian twittersphere has been vocal in pointing to government websites &lt;a href="https://scroll.in/latest/835386/jharkhand-details-of-lakhs-of-aadhaar-cardholders-was-published-on-state-website"&gt;leaking&lt;/a&gt; sensitive information from the &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Uid" target="_blank"&gt;UID &lt;/a&gt;database. In February, &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Security" target="_blank"&gt;security &lt;/a&gt;researcher Srinivas Kodali exposed a parallel database containing &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Uid" target="_blank"&gt;UID &lt;/a&gt;numbers and other details of 5-600,000 children. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span class="p-content"&gt;&lt;img src="http://editors.cis-india.org/home-images/Tweet3.jpg" alt="Tweet 3" class="image-inline" title="Tweet 3" /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span class="p-content"&gt;In another case, &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Uid" target="_blank"&gt;UID &lt;/a&gt;numbers of scholarship-holders sat on a state government website for over a year. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span class="p-content"&gt;&lt;img src="http://editors.cis-india.org/home-images/Tweet4.jpg" alt="Tweet 4" class="image-inline" title="Tweet 4" /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span class="p-content"&gt;&lt;span class="p-content"&gt;On March 22, 2017, tech worker @St_Hill exposed  the severity of the problem by showing spreadsheets of personal data  that appear with just a single Google search. &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This was immediately taken down. But new ones continue to appear with other simple Google searches.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under the hashtag &lt;a href="http://www.medianama.com/2017/04/223-aadhaar-leaks-database/?utm_content=buffere7636&amp;amp;utm_medium=social&amp;amp;utm_source=twitter.com&amp;amp;utm_campaign=buffer"&gt;#AadhaarLeaks&lt;/a&gt;,  Twitter users have reported numerous such cases on various government  websites. The leaks gained popular attention on social media when former  Indian men’s cricket team captain &lt;a href="https://scroll.in/article/826089/it-isnt-just-dhoni-uidai-received-1390-complaints-about-aadhaar-agents-but-took-no-legal-action"&gt;MS Dhoni’s UID&lt;/a&gt; appeared in a tweet sent by a &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Uid" target="_blank"&gt;UID &lt;/a&gt;enrollment operator.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;The government response&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;The &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Uidai" target="_blank"&gt;UIDAI &lt;/a&gt;responded to the uproar with a campaign entitled &lt;a href="https://twitter.com/search?f=tweets&amp;amp;vertical=default&amp;amp;q=%23AadhaarStars&amp;amp;src=tyah"&gt;#AadhaarStars&lt;/a&gt;, in which parents of young children were encouraged to post 30-second videos of what &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Uid" target="_blank"&gt;UID &lt;/a&gt;meant to them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This was rejected by angry twitterati through the hashtag &lt;a href="https://twitter.com/search?f=tweets&amp;amp;q=%23AadhaarFail&amp;amp;src=typd"&gt;#AadhaarFail&lt;/a&gt; which now offers a compendium of tweets about UID-based authentication failures.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the last couple of months, after the privacy and security-related concerns became louder, the &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Uidai" target="_blank"&gt;UIDAI &lt;/a&gt;has &lt;a href="https://www.thequint.com/technology/2017/02/03/uidai-shuts-down-50-sites-and-apps-for-offering-aadhaar-services-illegally"&gt;shut down&lt;/a&gt; enrollment operators, websites and payment applications for misuse of biometrics data. The central government has even &lt;a href="http://www.moneycontrol.com/video/current-affairs/centre-cautions-states-against-leakaadhaar-dataportals_8831261.html"&gt;warned&lt;/a&gt; state departments against leaking &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Uid" target="_blank"&gt;UID &lt;/a&gt;data on their portals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As the uncertainty looms, privacy researcher Amber Sinha and aforementioned &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Security" target="_blank"&gt;security &lt;/a&gt;researcher Srinivas Kodali estimated the size of #AadhaarLeaks.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/business-standard-rohith-jyothish-may-5-2017-aadhaar-the-largest-biometric-database-globally-but-it-is-leaky-by-design'&gt;http://editors.cis-india.org/internet-governance/news/business-standard-rohith-jyothish-may-5-2017-aadhaar-the-largest-biometric-database-globally-but-it-is-leaky-by-design&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-05-12T15:35:00Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/business-standard-sanjay-kumar-singh-aadhaar-security-here-is-how-your-private-information-can-be-protected">
    <title>Aadhaar security: Here's how your private information can be protected</title>
    <link>http://editors.cis-india.org/internet-governance/news/business-standard-sanjay-kumar-singh-aadhaar-security-here-is-how-your-private-information-can-be-protected</link>
    <description>
        &lt;b&gt;Lock Aadhaar, and notify UIDAI if you get a one-time-password for a transaction you did not initiate&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Sanjay Kumar Singh was published in the &lt;a class="external-link" href="http://www.business-standard.com/article/current-affairs/aadhaar-security-here-s-how-your-private-information-can-be-protected-117051000611_1.html"&gt;Business Standard&lt;/a&gt; on May 11, 2017. Udbhav Tiwari was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span class="p-content"&gt;The linking of Aadhaar — the 12-digit unique  identification number for Indian residents — across various benefits is  going through a roller-coaster ride. On one hand, the government, keen  to make it mandatory, is linking it with filing of income-tax returns  and benefits. But, on the other, many are uncomfortable with it because  of privacy issues and leakages that have been reported recently. The  Supreme Court, on Tuesday, referred another fresh plea challenging the  Aadhaar Act and its mandatory use in government schemes to a larger  Constitution bench. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span class="p-content"&gt;There has been several reports that say that Aadhaar numbers and other  personal data are being leaked. Bengaluru-based Centre for Internet and  Society (CIS) has published a report (titled Information security  practices of Aadhaar, or lack thereof) where it lists four government  departments that have posted Aadhaar numbers and other personal  information of people. According to the report, an estimated 130-135  million Aadhaar numbers and 100 million bank account numbers were posted  on the four portals that the CIS researchers checked. Normally such  data should be kept on the government’s intranet, where only authorised  people can access it. However, a few government departments have  uploaded this data on their websites. In many cases, the data was in  excel format, making it all the more easy for people to download and  misuse it. The worst part: If your data is stolen, you cannot file even a  First Information Report with the police. Only the nodal body, the  Unique Identification Authority of India (UIDAI), can file a police  complaint.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Your data can be misused:&lt;/b&gt; Experts say that leakage  of Aadhaar numbers and other personal information into the public domain  violates peoples’ privacy. “Your name, phone number, address, bank  account number and Aadhaar number are personal information. Only you  have the right to decide whether to release such information to others.  Such data shouldn’t be complied in excel sheets in large numbers and be  freely accessible on the internet to everyone," says Udbhav Tiwari,  policy officer at the Centre for Internet and Society, Bengaluru.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Tele-marketers  and advertisers will have access to the personal information of all  those people. More serious problems such as identity theft can occur.  Says Smitha Krishna Prasad, project manager, Centre for Communication  Governance at National Law University, Delhi: “The more sensitive  information a person has about you, the easier it becomes to impersonate  you when that person is speaking to, say, a bank." The impersonator  could open a bank account or even take a loan in your name.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Suppose  a hacker gets your email ID. “He will use the ‘password reset or forgot  password’ feature to change your password and get access to your  account. This feature poses questions based on personal info about you.  Any such data collected about you comes useful here. Such hackers mine a  lot of data about potential victims from all possible sources," says  Shomiron Das Gupta of NetMonastery, a threat management provider. In the  email, he could find info about your bank account, credit card account,  etc, and cause financial losses to you.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Serious risks can  also arise if someone manages to breach the biometric authentication or  one-time password (OTP) required for using the Aadhaar system. “It is  possible to copy an individual’s fingerprints, and replicate them using  very commonly available resins. It is also possible for hackers to  capture the data being communicated between a telephone tower and a  mobile phone, especially if it is poorly encrypted. This will allow the  hacker to see the OTP. Admittedly, this does require expertise and a  targeted effort vis-a-vis an individual," says Tiwari. Now that the  Aadhaar numbers of so many people have been divulged, someone could  utilise their identities to steal their government-granted benefits, or  obtain a SIM card, which could then be misused. Raman Jit Singh Chima,  policy director, Access Now, says at many places where the Aadhaar  number is required today, no biometric authentication is done. So just  the number can be used to impersonate you.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Lock your biometrics:&lt;/b&gt; If your Aadhaar number and  other personal information have been leaked, here are a few steps you  can take to safeguard yourself. One, be wary of any calls you receive  asking for additional details, which may not have been leaked already.  Be equally wary if you receive a call wherein someone rattles off your  personal data and asks you to verify it. The caller could pretend to be  calling from your bank. It is best not to reveal or confirm any  information over the phone at all. Two, you have the option to lock your  biometric data online. Even if someone manages to steal your  fingerprint, he will not be able to use it if you have locked your  biometric data (see table). Also, if you get an OTP on your phone for an  Aadhaar utilisation that you did not initiate, notify the UIDAI, and  thus ensure that no transaction is carried out using your Aadhaar  account.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Need for a privacy law: &lt;/b&gt;To  prevent data leaks in the future, the government needs to sensitise  state government officials who work with Aadhaar data about the need to  protect the its privacy. More importantly, India needs a comprehensive  data protection law. At present, there is limited provision in the  Information Technology Act of 2008 under which you can file a civil case  against a corporate that has leaked your personal information. “The  person affected by data leakage has to show that he has suffered  wrongful loss, or somebody else has enjoyed a wrongful gain, and then  claim compensation," says Prasad.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After the Radia tapes  incident, the government had said it would pass a comprehensive privacy  law. “This law would lead to the creation of a data protection authority  with enforcement powers, which would be able to penalise both companies  and government bodies violating privacy principles. Despite the process  beginning in 2012-13, and multiple drafts being leaked into the public  domain, there has not been much progress on this count," says Chima. He  adds that when the privacy law becomes a reality, any part of the  Aadhaar Act that is contrary to it should also be amended.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;How to lock your biometric data online&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Go  to the UIDAI web site: https://uidai.gov.inGo to Aadhaar services, then  Lock/Unlock Biometrics Enter Aadhaar number Enter security code that  appears below the Aadhaar numberYou will receive an OTP on your  registered mobile number. Enter it Click ‘Verify’Click box against  ‘Enable biometric lock’Click on Submit buttonSame procedure can be  repeated to disable biometric lock.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/business-standard-sanjay-kumar-singh-aadhaar-security-here-is-how-your-private-information-can-be-protected'&gt;http://editors.cis-india.org/internet-governance/news/business-standard-sanjay-kumar-singh-aadhaar-security-here-is-how-your-private-information-can-be-protected&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-05-19T10:05:25Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/dna-may-2-2017-report-aadhaar-numbers-of-135-mn-may-have-leaked-claims-cis-report">
    <title>Aadhaar numbers of 135 mn may have leaked, claims CIS report</title>
    <link>http://editors.cis-india.org/internet-governance/news/dna-may-2-2017-report-aadhaar-numbers-of-135-mn-may-have-leaked-claims-cis-report</link>
    <description>
        &lt;b&gt;Aadhaar numbers and personal information of as many as 135 million Indians could have been leaked from four government portals due to lack of IT security practices, the Centre for Internet and Society has claimed. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published by &lt;a class="external-link" href="http://www.dnaindia.com/india/report-aadhaar-numbers-of-135-mn-may-have-leaked-claims-cis-report-2425384"&gt;DNA&lt;/a&gt; on May 2, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;"Based on the numbers available on the websites looked at, estimated  number of Aadhaar numbers leaked through these four portals could be  around 130-135 million," the report by CIS said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further, as many as 100 million bank account numbers could have been "leaked" from the four portals, it added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The portals where the purported leaks happened were those of  National Social Assistance Programme, National Rural Employment  Guarantee Scheme, as well as two websites of the Andhra Pradesh  government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Over 23 crore beneficiaries have been brought under Aadhaar  programme for DBT (Direct Benefit Transfer), and if a significant number  of schemes have mishandled data in a similar way, we could be looking  at a data leak closer to that number," it cautioned.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The disclosure came as part of a CIS report titled 'Information  Security Practices of Aadhaar (or lack thereof): A Documentation of  Public Availability of Aadhaar Numbers with Sensitive Personal Financial  Information'.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When contaced, a senior official of the Unique Identification  Authority of India (UIDAI) said that there was no breach in its own  database. The UIDAI issues Aadhaar to citizens.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The CIS report claimed that the absence of "proper controls" in  populating the databases could have disastrous results as it may divulge  sensitive information about individuals, including details about  address, photographs and financial data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The lack of consistency of data masking and de- identification  standard is an issue of great concern...the masking of Aadhaar numbers  does not follow a consistent pattern," the report added.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/dna-may-2-2017-report-aadhaar-numbers-of-135-mn-may-have-leaked-claims-cis-report'&gt;http://editors.cis-india.org/internet-governance/news/dna-may-2-2017-report-aadhaar-numbers-of-135-mn-may-have-leaked-claims-cis-report&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-05-20T11:10:37Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/pti-news-may-2-2017-aadhaar-numbers-of-135mn-may-have-leaked-claims-cis-report">
    <title>Aadhaar numbers of 135 mn may have leaked, claims CIS report</title>
    <link>http://editors.cis-india.org/internet-governance/news/pti-news-may-2-2017-aadhaar-numbers-of-135mn-may-have-leaked-claims-cis-report</link>
    <description>
        &lt;b&gt;Aadhaar numbers and personal information of as many as 135 million Indians could have been leaked from four government portals due to lack of IT security practices, the Centre for Internet and Society has claimed.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The news was published by the &lt;a class="external-link" href="http://www.ptinews.com/news/8665876_Aadhaar-numbers-of-135-mn-may-have-leaked--claims-CIS-report.html"&gt;Press Trust of India &lt;/a&gt;on May 2, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;"Based on the numbers available on the websites looked at, estimated number of Aadhaar numbers leaked through these four portals could be around 130-135 million," the report by CIS said.&lt;br /&gt;&lt;br /&gt; Further, as many as 100 million bank account numbers could have been "leaked" from the four portals, it added.&lt;br /&gt;&lt;br /&gt;The portals where the purported leaks happened were those of National Social Assistance Programme, National Rural Employment Guarantee Scheme, as well as two websites of the Andhra Pradesh government.&lt;br /&gt;&lt;br /&gt;"Over 23 crore beneficiaries have been brought under Aadhaar programme for DBT (Direct Benefit Transfer), and if a significant number of schemes have mishandled data in a similar way, we could be looking at a data leak closer to that number," it cautioned.&lt;br /&gt;&lt;br /&gt;The disclosure came as part of a CIS report titled 'Information Security Practices of Aadhaar (or lack thereof): A Documentation of Public Availability of Aadhaar Numbers with Sensitive Personal Financial Information'.&lt;br /&gt;&lt;br /&gt;When contaced, a senior official of the Unique Identification Authority of India (UIDAI) said that there was no breach in its own database. The UIDAI issues Aadhaar to citizens.&lt;br /&gt;&lt;br /&gt;The CIS report claimed that the absence of "proper controls" in populating the databases could have disastrous results as it may divulge sensitive information about individuals, including details about address, photographs and financial data.&lt;br /&gt;&lt;br /&gt;"The lack of consistency of data masking and de- identification standard is an issue of great concern...the masking of Aadhaar numbers does not follow a consistent pattern," the report added.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/pti-news-may-2-2017-aadhaar-numbers-of-135mn-may-have-leaked-claims-cis-report'&gt;http://editors.cis-india.org/internet-governance/news/pti-news-may-2-2017-aadhaar-numbers-of-135mn-may-have-leaked-claims-cis-report&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-05-20T10:42:59Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/times-of-india-may-5-2017-aadhaar-numbers-of-135-mn-may-have-leaked-claims-cis-report">
    <title>Aadhaar numbers of 135 mn may have leaked, claims CIS report</title>
    <link>http://editors.cis-india.org/internet-governance/news/times-of-india-may-5-2017-aadhaar-numbers-of-135-mn-may-have-leaked-claims-cis-report</link>
    <description>
        &lt;b&gt;Aadhaar numbers and personal information of as many as 135 million Indians could have been leaked from four government portals due to lack of IT security practices, the Centre for Internet and Society has claimed.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://timesofindia.indiatimes.com/business/india-business/aadhaar-numbers-of-135-mn-may-have-leaked-claims-cis-report/articleshow/58529002.cms"&gt;published in the Times of India&lt;/a&gt; on May 2, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;"Based on the numbers available on the websites looked at, estimated  number of Aadhaar numbers leaked through these four portals could be  around 130-135 million," the report by &lt;a class="key_underline" href="http://timesofindia.indiatimes.com/topic/CIS"&gt;CIS&lt;/a&gt; said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further, as many as 100 million bank account numbers could have been "leaked" from the four portals, it added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The portals where the purported leaks happened were those of National  Social Assistance Programme, National Rural Employment Guarantee  Scheme, as well as two websites of the Andhra Pradesh government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Over 23 crore beneficiaries have been brought under Aadhaar  programme for DBT (Direct Benefit Transfer), and if a significant number  of schemes have mishandled data in a similar way, we could be looking  at a data leak closer to that number," it cautioned.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The disclosure came as part of a CIS report titled 'Information  Security Practices of Aadhaar (or lack thereof): A Documentation of &lt;a class="key_underline" href="http://timesofindia.indiatimes.com/topic/Public-Availability-of-Aadhaar-Numbers"&gt;Public Availability of Aadhaar Numbers&lt;/a&gt; with Sensitive Personal Financial Information'.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When contaced, a senior official of the &lt;a class="key_underline" href="http://timesofindia.indiatimes.com/topic/Unique-Identification-Authority-of-India"&gt;Unique Identification Authority of India&lt;/a&gt; (UIDAI) said that there was no breach in its own database. The UIDAI issues Aadhaar to citizens.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The CIS report claimed that the absence of "proper controls" in  populating the databases could have disastrous results as it may divulge  sensitive information about individuals, including details about  address, photographs and financial data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The lack of consistency of data masking and de- identification  standard is an issue of great concern...the masking of Aadhaar numbers  does not follow a consistent pattern," the report added. SR &lt;a class="key_underline" href="http://timesofindia.indiatimes.com/topic/MBI"&gt;MBI&lt;/a&gt; MR&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/times-of-india-may-5-2017-aadhaar-numbers-of-135-mn-may-have-leaked-claims-cis-report'&gt;http://editors.cis-india.org/internet-governance/news/times-of-india-may-5-2017-aadhaar-numbers-of-135-mn-may-have-leaked-claims-cis-report&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-05-12T15:40:28Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/business-standard-sahil-makkar-march-12-2016-aadhaar-is-actually-surveillance-tech-sunil-abraham">
    <title>Aadhaar is actually surveillance tech: Sunil Abraham</title>
    <link>http://editors.cis-india.org/internet-governance/news/business-standard-sahil-makkar-march-12-2016-aadhaar-is-actually-surveillance-tech-sunil-abraham</link>
    <description>
        &lt;b&gt;On March 12, the Lok Sabha passed the Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Bill, 2016, paving the way for giving legal status to Aadhaar, a 12-digit unique identification number generated after collecting biometric and other details of an Indian resident.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Sahil Makkar on behalf of Business Standard interviewed Sunil Abraham. The &lt;a class="external-link" href="http://www.business-standard.com/article/opinion/aadhaar-is-actually-surveillance-tech-sunil-abraham-116031200790_1.html"&gt;article was published &lt;/a&gt;on March 12, 2016.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The government intends to use Aadhaar to roll out more subsidy schemes and allay privacy concerns. However, activists are not convinced. &lt;strong&gt;Sunil Abraham&lt;/strong&gt;, executive director of Bengaluru based-research organisation The Centre for Internet &amp;amp; Society, tells &lt;em&gt;Sahil Makkar&lt;/em&gt; that the concept of Aadhaar is principally flawed and it doesn't substantially help in plugging leakages in government schemes. Edited excerpts:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;What is your position on Aadhaar and the UIDAI Bill?&lt;br /&gt;&lt;br /&gt;&lt;/strong&gt; What technology has broken cannot be fixed by the law. Aadhaar is a broken technology; it is surveillance technology disguised as developmental intervention that identifies people without their consent and authenticates transactions on their behalf. The architecture is a disaster from the security perspective and there is no recourse in law for citizens whose rights have been infringed. The other objection should be to the subtitle of the Bill that mentions "services": it is unclear whether Aadhaar is to be provided to the residents or the citizens. A bulk of the government services is meant for citizens.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;What are the repercussions of this "broken technology"?&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt; Consent happens without conscious cooperation during the authentication process of getting access to a subsidy or a service. Also, the person providing the service is holding a biometric reader and he may say the device is not working and hence, refuse the subsidy. Yet the database will reflect that the subsidy has been availed of because authentication has already been completed. So you have to accept what the person is saying because only that person and the UIDAI have access to the information. Aadhaar makes the citizen transparent to the state but makes the state completely opaque and unaccountable to its citizens.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Will the beneficiary not receive a message about the transaction?&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt; That will only happen when the banks are involved. At the subsidised ration shop the beneficiary will get nothing. The world over security professionals don't trust biometric-based authentication, relying rather on other revocable authentication factors. It is irrevocable if the biometric details are compromised. Instead, writable smart cards could be used to record details of government officers on the cards of beneficiaries and make both the state and the resident transparent to each other.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Hasn't the National Population Register under the Ministry of Home Affairs been advocating the use of smart cards?&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt; In this case biometrics should be used only to link the individual to the smart card. Biometric information should be stored on smart cards and under no circumstances should there be a central repository of biometrics at one place. Maintaining a central database is akin to getting the keys of every house in Delhi and storing them at a central police station. The chances of getting a central database compromised depend on the nature of information stored in it. For the sake of security one can't create a honey pot to be attacked by many. The internet is secure because it doesn't have a central database. The other difference is that faking biometrics is much easier than faking smart cards.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;So your principle opposition is to the setting up of a central repository of biometrics?&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt; I am also opposed to the use of biometrics for identification and authentication; this is nothing but surveillance. It is very easy to capture iris data of any individual with the use of next generation cameras. Imagine a situation when the police is secretly capturing the iris data of protesters and then identifying them through their biometric records.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;But if the security agencies are able to identify those who create law and order problems, what is the hitch?&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt; It is exactly the same argument that Apple is giving while refusing back-door entry to intelligence and investigating agencies. Once you build surveillance capacity for good governance, it may be misused by a repressive government, a rogue corporation or by criminals. Fear of this type of surveillance will deter people from holding any protest.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Doesn't the Aadhaar or the UIDAI conform to safety and security provisions in the IT Act?&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt; The standards in our IT Act are woefully inadequate in comparison to European regulators and courts. If it adhered to the highest standards, the European privacy commissioner and data protection authorities would have given India adequacy status. The second problem is that the current IT Act doesn't apply to the government. If the government holds your data, it is under no obligation to protect your rights.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;You have been part of the Justice A P Shah Committee on privacy. How important is it to have a separate privacy law in the present context?&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt; It is not only important for the purpose of safeguarding human rights, but also to protect the competitiveness of our BPO, ITeS and KPO sectors. We need a data protection law that is compliant with European Data Protection Regulation.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;How will such a law help a common man whose data have been compromised?&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt; It will provide clarity to an individual about where he or she stands with regard to privacy. It is strange that the government took diametrically opposite stands in two cases related to privacy in the Supreme Court. When some activists demanded that the UIDAI be scrapped, the government argued before the court that there was no Constitutional right to privacy. When the police asked for the biometric records from the UIDAI, the same government argued there was a right to privacy and that it couldn't divulge the details to the police. The government is not speaking in the same voice; even courts are not speaking in the same voice, because there have been conflicting judgements. So the proposed law will provide clarity on privacy and people will be able to seek compensation under it.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;At the same time it cannot be denied that Aadhaar can plug leakages and save hundreds and thousands of rupees for the exchequer....&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt; Aadhaar is only answering two questions: Is this particular biometric unique (enrolment) and does it match the template in the database? If you bring a Bangladeshi into the system, it will answer both the questions in the affirmative. The Aadhaar only eliminates the possibility of one person receiving the benefits twice. At the same time it is very easy to put a ghost beneficiary back into the system. If Aadhaar has to work, we need a publicly visible auditable trail of subsidy moving from Delhi to the villages. That will eliminate corruption in the supply chain.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Isn't it difficult for a large number of ghost beneficiaries to get into the system?&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt; There is no way to check whether a genuine or a ghost beneficiary has been removed from the list. It is not a foolproof system because no one is vouching for anybody. In the current system it is difficult to find out who created this ghost beneficiary. Nobody loses a job for creating a ghost; in fact, here everyone has an incentive.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;If there are problems with the UIDAI system, why is the government upbeat about it?&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt; As techno-utopians our government wants technology to answer everything and solve all our problems. If anything goes wrong, it can easily be blamed on technology.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/business-standard-sahil-makkar-march-12-2016-aadhaar-is-actually-surveillance-tech-sunil-abraham'&gt;http://editors.cis-india.org/internet-governance/news/business-standard-sahil-makkar-march-12-2016-aadhaar-is-actually-surveillance-tech-sunil-abraham&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-03-16T17:07:39Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
