SlideShare a Scribd company logo
1 of 27
Privacy of Data in
Aadhaar Mandate:
An Analysis of the
Aadhaar (Targeted
Delivery of Financial
and Other Subsidies,
Benefits and
Services) Act, 2016
By:
Dr. Gagandeep Kaur, 3rd COLS
International Conference Data
Privacy: Road Ahead in Data
Protection on 1-2 September,
2017 at Dehradun.
Introduction
• The ‘Aadhaar Project’ is the
world’s largest national
identity project, launched by
the government of India in the
year 2016 with the enactment
of the Aadhaar (Targeted
Delivery of Financial and
Other Subsidies, Benefits and
Services) Act, 2016.
Objective
• This project seeks to collect biometric
and demographic data of residents
and store it in a centralised database
controlled by Unique Identification
Authority of India (UIDAI) under the
Ministry of Electronics and Information
Technology.
• The 12-Digit biometric Aadhaar Card
meant to be voluntary or optional has
become a compulsory mandate to
receive the benefits of welfare
schemes launched by the government
from time to time.
Personal Opinion
Janamkundali
• Sensitive personal information of
an individual in the hands of
centralised database symbolises
‘janamkundali’ of the concerned
person and if the ‘janamkundali’ is
being compromised the
consequences would be serious.
Similarly, if such database is not
secure then speaking about the
Privacy as a fundamental right is
only a myth.
Mini Biography of an Individual
School Admission/
College/Hospitals
Mobile Number
Bank Account/ PAN Card
Internet Connection
Recently Added: Death
Certificate
Why and How Janamkundali:
Analyze Benefits
LPG SUBSIDY
Pradhan
Mantri Jan
Dhan Yojana
(PMJDY)
Passport in 10
Days
Benefits
Digital Locker
Voter Card
Linking
Monthly
Pension/
Provident
Fund
Why and How Janamkundali
Opening of New
Account
“Jeevan Praman
for Pensioners”
and Digital
Parman for
pensioners
SEBI
Privacy: Captured with Consent:
Optional to Compulsory
Features of the Aadhaar (Targeted
Delivery of Financial and Other
Subsidies, Benefits and Services) Act,
2016: An Overview
1. Nature of the Aadhaar Act,
2016:
• This Act is divided into 8 Chapters and
consists of 59 sections. This Act has
received the assent of President on the
25th March 2016. This legislation is
“Social-Welfare Legislation” as it
appears from the Preamble of this Act.
Preamble:
• It states:
• “An Act to provide for, as a good governance,
efficient, transparent, and targeted delivery
of subsidies, benefits and services, the
expenditure for which is incurred from the
Consolidated Fund of India, to individuals
residing in India through assigning of unique
identity numbers to such individuals and for
matters connected therewith or incidental
thereto.”
2. Intra-Territorial and Extra-
Territorial Application
• According to Section 1 (2):
This Act extends to the whole of India except the State of
Jammu and Kashmir and save as otherwise provided in
this Act, it also applies to any offence or contravention
thereunder committed outside India by any person.
According to Section 44 (1) subjects to certain conditions,
the provisions of this Act also apply to any offence or
contravention committed outside India by any person,
irrespective of his nationality.
3. Aadhaar Number is not Evidence
of Citizenship or Domicile
• According to Section 9 of this Act the Aadhaar
number or the authentication thereof does not,
by itself, confer any right and proof of,
citizenship or domicile in respect of an Aadhaar
number holder.
• Any individual who is a resident in India and
satisfies the verification process laid down by the
Unique Identification Authority of India (UIDAI)
can apply for Aadhaar card irrespective of age
and gender.
4. Aadhaar Number is necessary for the
purpose of “Establishing Identity”
through the process of “Authentication”:
• According to Section 7 of the Act, the proof of Aadhaar
Number is necessary for receipt of certain subsidies,
benefits and services, etc.
• There is a subtle difference between two terms namely
‘identity verification’ and ‘authentication’. Identity
provides an answer to the question “who are you?” and
authentication is a challenge-response process that
provides a “proof of the claim of identity”/ or how you can
say who are you?”
5. Unique Identification Authority of
India (UIDAI)
Chapter IV, Section 11-23
The Central Government establishes the Unique
Identification Authority of India to be responsible for the
processes of enrolment and authentication and perform
such other functions assigned to it under this Act. This
Authority is a body corporate having perpetual succession
and a common seal, with power, to acquire, hold and
dispose of property, both movable and immovable, and to
contract, and to sue or be sued. The head office of the
Authority is in New Delhi.
Other Provisions
• Offences: Chapter VII, Sections 34-46,
Section 47
• Relationship of the Aadhaar Act, 2016 and
the Information Technology Act, 2000:
• Under the Aadhaar Act, 2016 Chapter VI
entitled, “Protection of Information” deals
with safety mechanism.
• Does ‘Aadhaar Project’ violate
the Fundamental Right to
Privacy and Is it
‘Unconstitutional’: An Analysis
Variables under study
In order to reach a logical conclusion the variables under
study are:
• The type of information being collected from Citizens and
Residents
• The Adequate Security Measures to Protect Sensitive
Personal Information
• The Real risks posed by Hacking from Enemy Nations
The Nature of Information
Collected
1. Supported Proof of Identity (PoI) Documents having Name and
Photo
2. Supported Proof of Date of Birth (DoB) Documents
3. Supported Proof of Address (PoA) Documents having Name and
Address
4. Supported Proof of Residence (POR)
5. Documents containing Relationship details to Head of Family: PDS
Card, MNREGA Job Card, CGHS/State Government/ECHS/ESIC
Medical Card, Pension Card, Army Canteen Card, Passport, Birth
Certificate issued by Registrar of Birth.
Security Measures to Protect
Sensitive Personal Information
• “All the data is stored in encrypted form: “The data is
encrypted with the highest 2048 bit encryption, which
takes 1000s of years to crack and it is what the
government notifies it as a minimum security standard.”
PKI-2048 and AES-256, the “highest available public key
cryptography encryption” is being used, according to the
UIDAI. Hence, even if any computer or data is stolen,
without the code, it will not be decipherable.”
• Aarthi S. Anand , “India, the Aadhaar Nation: That Isn’t Legally Equipped to Handle
Its Adverse Effects”, Retrieved from< https://thewire.in/84925/aadhaar-privacy-
security-legal-framework/ 10 July 2017.
The Real risks posed by Hacking from
Enemy Nations and Dark Net
• Archana Dureja, a scientist in the Ministry of Electronics
and Information Technology, wrote on 25 March 2017:
• “There have been instances wherein personal identity or
information of residents, including Aadhaar number and
demographic information and other sensitive personal
data such as bank account details etc. collected by
various Ministries/Departments, has been reportedly
published online and is accessible through an easy
online search.
For the first time, the Modi government has officially
acknowledged that:
“personal identity of individuals, including Aadhaar number
and other sensitive information, has been leaked to the
public domain”.
• Yatish Yadav, “Government admits your Aadhaar data has been leaked”, Published:
31st March 2017 01:14 AM. Retrieved from:<
http://www.newindianexpress.com/nation/2017/mar/31/government-admits-your-
aadhaar-data-has-been-leaked-1588027.html
Conclusion
• In India the judgment of Justice K S
Puttaswamy (Retd.) and Anr. (Petitioners)
Versus Union of India and Ors.
(Respondents) SC 2017 delivered on 25
August, 2017 has made it a historic day.
Decision on Aadhaar is still pending.
• It would be declared Constitutional.
• If someone knows bank account number,
it will be wrong to assume that he/she will
be able to hack our Bank account.
Similarly if someone knows Aadhaar
number, it will be wrong to assume that
he/ she will be able to hack Aadhaar-
linked account unless secret numbers are
PIN, OTP, Passwords, Login Ids and
username are shared with.
Suggestions
1. Strong and adequate Privacy Policy
2. Awareness to Aadhar card holder
regarding precautions.
3. The legal framework on security and
privacy assurance, however, needs to be
more specific and requires significant
strengthening.
THANK YOU

More Related Content

What's hot

Right to freedom of religion.pptx
Right to freedom of religion.pptxRight to freedom of religion.pptx
Right to freedom of religion.pptxsuryaasuryaa2
 
Joint Family and Coparcenary
Joint Family and CoparcenaryJoint Family and Coparcenary
Joint Family and CoparcenaryJJ Inception
 
THE CONCEPT OF JUDICIAL REVIEW: A COMPARATIVE STUDY AMONG USA, UK, CANADA, AU...
THE CONCEPT OF JUDICIAL REVIEW: A COMPARATIVE STUDY AMONG USA, UK, CANADA, AU...THE CONCEPT OF JUDICIAL REVIEW: A COMPARATIVE STUDY AMONG USA, UK, CANADA, AU...
THE CONCEPT OF JUDICIAL REVIEW: A COMPARATIVE STUDY AMONG USA, UK, CANADA, AU...Shivani Sharma
 
Hussainara khatoon v. state of bihar, 1979
Hussainara khatoon v. state of bihar, 1979Hussainara khatoon v. state of bihar, 1979
Hussainara khatoon v. state of bihar, 1979Harsh Kumar
 
Judicial review
Judicial reviewJudicial review
Judicial reviewbhanu7161
 
Understanding Citizenship (Amendment) Act 2019, Assam Accord and National Reg...
Understanding Citizenship (Amendment) Act 2019, Assam Accord and National Reg...Understanding Citizenship (Amendment) Act 2019, Assam Accord and National Reg...
Understanding Citizenship (Amendment) Act 2019, Assam Accord and National Reg...DVSResearchFoundatio
 
Article 17 & 18 under Constitution of India
Article 17 & 18 under Constitution of IndiaArticle 17 & 18 under Constitution of India
Article 17 & 18 under Constitution of IndiaHitendra Hiremath
 
Salient features of the indian constitution
Salient features of the indian constitutionSalient features of the indian constitution
Salient features of the indian constitutionAnnumchaudhary
 
Citizenship act, 1955 India
Citizenship act, 1955 IndiaCitizenship act, 1955 India
Citizenship act, 1955 IndiaAMALDASKH
 
Right to privacy – a bird’s eyeview
Right to privacy – a bird’s eyeviewRight to privacy – a bird’s eyeview
Right to privacy – a bird’s eyeviewjoydev majumdar
 
Note on caa and nrc
Note on caa and nrcNote on caa and nrc
Note on caa and nrcShaun Menon
 
Offences against women in india
Offences against women in indiaOffences against women in india
Offences against women in indiaNilendra Kumar
 
The indian independence act 1947
The indian independence act 1947The indian independence act 1947
The indian independence act 1947Shriya Pusha
 
Uniform civil code law commision's observation
Uniform civil code law commision's observationUniform civil code law commision's observation
Uniform civil code law commision's observationSayantanSamui
 
CONSULTATION PAPER ON SEDITION-30.08.2018
CONSULTATION PAPER ON SEDITION-30.08.2018CONSULTATION PAPER ON SEDITION-30.08.2018
CONSULTATION PAPER ON SEDITION-30.08.2018GK Dutta
 
Article 12 concept of state
Article 12 concept of stateArticle 12 concept of state
Article 12 concept of stateBhargav Dangar
 
Citizenship rules in india
Citizenship rules in indiaCitizenship rules in india
Citizenship rules in indiaDiksha Sharma
 

What's hot (20)

Rights to equality
Rights to equalityRights to equality
Rights to equality
 
Right to freedom of religion.pptx
Right to freedom of religion.pptxRight to freedom of religion.pptx
Right to freedom of religion.pptx
 
Article 13
Article 13Article 13
Article 13
 
Joint Family and Coparcenary
Joint Family and CoparcenaryJoint Family and Coparcenary
Joint Family and Coparcenary
 
THE CONCEPT OF JUDICIAL REVIEW: A COMPARATIVE STUDY AMONG USA, UK, CANADA, AU...
THE CONCEPT OF JUDICIAL REVIEW: A COMPARATIVE STUDY AMONG USA, UK, CANADA, AU...THE CONCEPT OF JUDICIAL REVIEW: A COMPARATIVE STUDY AMONG USA, UK, CANADA, AU...
THE CONCEPT OF JUDICIAL REVIEW: A COMPARATIVE STUDY AMONG USA, UK, CANADA, AU...
 
Hussainara khatoon v. state of bihar, 1979
Hussainara khatoon v. state of bihar, 1979Hussainara khatoon v. state of bihar, 1979
Hussainara khatoon v. state of bihar, 1979
 
Article 19
Article 19Article 19
Article 19
 
Judicial review
Judicial reviewJudicial review
Judicial review
 
Understanding Citizenship (Amendment) Act 2019, Assam Accord and National Reg...
Understanding Citizenship (Amendment) Act 2019, Assam Accord and National Reg...Understanding Citizenship (Amendment) Act 2019, Assam Accord and National Reg...
Understanding Citizenship (Amendment) Act 2019, Assam Accord and National Reg...
 
Article 17 & 18 under Constitution of India
Article 17 & 18 under Constitution of IndiaArticle 17 & 18 under Constitution of India
Article 17 & 18 under Constitution of India
 
Salient features of the indian constitution
Salient features of the indian constitutionSalient features of the indian constitution
Salient features of the indian constitution
 
Citizenship act, 1955 India
Citizenship act, 1955 IndiaCitizenship act, 1955 India
Citizenship act, 1955 India
 
Right to privacy – a bird’s eyeview
Right to privacy – a bird’s eyeviewRight to privacy – a bird’s eyeview
Right to privacy – a bird’s eyeview
 
Note on caa and nrc
Note on caa and nrcNote on caa and nrc
Note on caa and nrc
 
Offences against women in india
Offences against women in indiaOffences against women in india
Offences against women in india
 
The indian independence act 1947
The indian independence act 1947The indian independence act 1947
The indian independence act 1947
 
Uniform civil code law commision's observation
Uniform civil code law commision's observationUniform civil code law commision's observation
Uniform civil code law commision's observation
 
CONSULTATION PAPER ON SEDITION-30.08.2018
CONSULTATION PAPER ON SEDITION-30.08.2018CONSULTATION PAPER ON SEDITION-30.08.2018
CONSULTATION PAPER ON SEDITION-30.08.2018
 
Article 12 concept of state
Article 12 concept of stateArticle 12 concept of state
Article 12 concept of state
 
Citizenship rules in india
Citizenship rules in indiaCitizenship rules in india
Citizenship rules in india
 

Similar to The Aadhaar Act, 2016

Aadhaar Project A Critical Analysis
Aadhaar Project  A Critical AnalysisAadhaar Project  A Critical Analysis
Aadhaar Project A Critical AnalysisSandra Valenzuela
 
Right to Privacy and the Aadhaar Act, 2016
Right to Privacy and the Aadhaar Act, 2016Right to Privacy and the Aadhaar Act, 2016
Right to Privacy and the Aadhaar Act, 2016Shantanu Basu
 
Aadhaar Salient Features
Aadhaar Salient FeaturesAadhaar Salient Features
Aadhaar Salient FeaturesVishal Kumar
 
Aadhaar_Salient Features
Aadhaar_Salient FeaturesAadhaar_Salient Features
Aadhaar_Salient FeaturesVishal Kumar
 
The Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and...
The Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and...The Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and...
The Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and...People's Archive of Rural India
 
Aadhar (targeted delivery of_financial_and_other_subsidies_benefits_and_servi...
Aadhar (targeted delivery of_financial_and_other_subsidies_benefits_and_servi...Aadhar (targeted delivery of_financial_and_other_subsidies_benefits_and_servi...
Aadhar (targeted delivery of_financial_and_other_subsidies_benefits_and_servi...Col Mukteshwar Prasad
 
Institutional mechanism of national identification card bangladesh experience
Institutional mechanism of national identification card bangladesh experienceInstitutional mechanism of national identification card bangladesh experience
Institutional mechanism of national identification card bangladesh experienceAlexander Decker
 
Right to information :SSB Lec/Gp Dis 38
Right to information :SSB Lec/Gp Dis 38Right to information :SSB Lec/Gp Dis 38
Right to information :SSB Lec/Gp Dis 38Col Mukteshwar Prasad
 
Digital Personal Data Protection Bill 2023 PPT.pptx
Digital Personal Data Protection Bill 2023 PPT.pptxDigital Personal Data Protection Bill 2023 PPT.pptx
Digital Personal Data Protection Bill 2023 PPT.pptxRohanTyagi57
 
Right to information act
Right to information actRight to information act
Right to information actvartika kanojia
 
Personal Data Protection Bill 2018
Personal Data Protection Bill 2018Personal Data Protection Bill 2018
Personal Data Protection Bill 2018Nanda Mohan Shenoy
 
Future of Aadhaar is "a secure and robust system ensuring complete security a...
Future of Aadhaar is "a secure and robust system ensuring complete security a...Future of Aadhaar is "a secure and robust system ensuring complete security a...
Future of Aadhaar is "a secure and robust system ensuring complete security a...National Management Olympiad
 
Constitution EL phase 2-1.pptx
Constitution EL phase 2-1.pptxConstitution EL phase 2-1.pptx
Constitution EL phase 2-1.pptxRajHingar
 
practical risks in aadhaar project and measures to overcome them
practical risks in aadhaar project and measures to overcome thempractical risks in aadhaar project and measures to overcome them
practical risks in aadhaar project and measures to overcome themsaipriyadonthula
 
India's Data Protection Law 2018- Future Road Ahead
India's Data Protection Law 2018- Future Road AheadIndia's Data Protection Law 2018- Future Road Ahead
India's Data Protection Law 2018- Future Road AheadEquiCorp Associates
 
Unique Identification Number database simulation project report
Unique Identification Number database simulation project reportUnique Identification Number database simulation project report
Unique Identification Number database simulation project reportRachit Mishra
 
Unique identification number uid project ...
Unique identification number uid project                                     ...Unique identification number uid project                                     ...
Unique identification number uid project ...Bharat Sharma
 
RIGHT TO INFORMATION ACT 2005.pptx
RIGHT TO INFORMATION ACT 2005.pptxRIGHT TO INFORMATION ACT 2005.pptx
RIGHT TO INFORMATION ACT 2005.pptxMukeshPradhan41
 

Similar to The Aadhaar Act, 2016 (20)

Aadhaar Project A Critical Analysis
Aadhaar Project  A Critical AnalysisAadhaar Project  A Critical Analysis
Aadhaar Project A Critical Analysis
 
Right to Privacy and the Aadhaar Act, 2016
Right to Privacy and the Aadhaar Act, 2016Right to Privacy and the Aadhaar Act, 2016
Right to Privacy and the Aadhaar Act, 2016
 
Aadhaar Salient Features
Aadhaar Salient FeaturesAadhaar Salient Features
Aadhaar Salient Features
 
Aadhaar_Salient Features
Aadhaar_Salient FeaturesAadhaar_Salient Features
Aadhaar_Salient Features
 
The Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and...
The Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and...The Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and...
The Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and...
 
Aadhar (targeted delivery of_financial_and_other_subsidies_benefits_and_servi...
Aadhar (targeted delivery of_financial_and_other_subsidies_benefits_and_servi...Aadhar (targeted delivery of_financial_and_other_subsidies_benefits_and_servi...
Aadhar (targeted delivery of_financial_and_other_subsidies_benefits_and_servi...
 
Cie 2 cyber law
Cie 2  cyber lawCie 2  cyber law
Cie 2 cyber law
 
Institutional mechanism of national identification card bangladesh experience
Institutional mechanism of national identification card bangladesh experienceInstitutional mechanism of national identification card bangladesh experience
Institutional mechanism of national identification card bangladesh experience
 
Right to information :SSB Lec/Gp Dis 38
Right to information :SSB Lec/Gp Dis 38Right to information :SSB Lec/Gp Dis 38
Right to information :SSB Lec/Gp Dis 38
 
Digital Personal Data Protection Bill 2023 PPT.pptx
Digital Personal Data Protection Bill 2023 PPT.pptxDigital Personal Data Protection Bill 2023 PPT.pptx
Digital Personal Data Protection Bill 2023 PPT.pptx
 
Right to information act
Right to information actRight to information act
Right to information act
 
uid
uiduid
uid
 
Personal Data Protection Bill 2018
Personal Data Protection Bill 2018Personal Data Protection Bill 2018
Personal Data Protection Bill 2018
 
Future of Aadhaar is "a secure and robust system ensuring complete security a...
Future of Aadhaar is "a secure and robust system ensuring complete security a...Future of Aadhaar is "a secure and robust system ensuring complete security a...
Future of Aadhaar is "a secure and robust system ensuring complete security a...
 
Constitution EL phase 2-1.pptx
Constitution EL phase 2-1.pptxConstitution EL phase 2-1.pptx
Constitution EL phase 2-1.pptx
 
practical risks in aadhaar project and measures to overcome them
practical risks in aadhaar project and measures to overcome thempractical risks in aadhaar project and measures to overcome them
practical risks in aadhaar project and measures to overcome them
 
India's Data Protection Law 2018- Future Road Ahead
India's Data Protection Law 2018- Future Road AheadIndia's Data Protection Law 2018- Future Road Ahead
India's Data Protection Law 2018- Future Road Ahead
 
Unique Identification Number database simulation project report
Unique Identification Number database simulation project reportUnique Identification Number database simulation project report
Unique Identification Number database simulation project report
 
Unique identification number uid project ...
Unique identification number uid project                                     ...Unique identification number uid project                                     ...
Unique identification number uid project ...
 
RIGHT TO INFORMATION ACT 2005.pptx
RIGHT TO INFORMATION ACT 2005.pptxRIGHT TO INFORMATION ACT 2005.pptx
RIGHT TO INFORMATION ACT 2005.pptx
 

Recently uploaded

VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTSVIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTSDr. Oliver Massmann
 
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书FS LS
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceMichael Cicero
 
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书Fs Las
 
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书SD DS
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesHome Tax Saver
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A HistoryJohn Hustaix
 
An Introduction guidance of the European Union Law 2020_EU Seminar 4.pptx
An Introduction guidance of the European Union Law 2020_EU Seminar 4.pptxAn Introduction guidance of the European Union Law 2020_EU Seminar 4.pptx
An Introduction guidance of the European Union Law 2020_EU Seminar 4.pptxKUHANARASARATNAM1
 
Test Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxTest Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxsrikarna235
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书Sir Lt
 
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书SD DS
 
如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书Fir L
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...shubhuc963
 
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书SD DS
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一st Las
 
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书Fs Las
 
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书SD DS
 
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书SD DS
 
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书SD DS
 
如何办理威斯康星大学密尔沃基分校毕业证学位证书
 如何办理威斯康星大学密尔沃基分校毕业证学位证书 如何办理威斯康星大学密尔沃基分校毕业证学位证书
如何办理威斯康星大学密尔沃基分校毕业证学位证书Fir sss
 

Recently uploaded (20)

VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTSVIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
 
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
 
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
 
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax Rates
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A History
 
An Introduction guidance of the European Union Law 2020_EU Seminar 4.pptx
An Introduction guidance of the European Union Law 2020_EU Seminar 4.pptxAn Introduction guidance of the European Union Law 2020_EU Seminar 4.pptx
An Introduction guidance of the European Union Law 2020_EU Seminar 4.pptx
 
Test Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxTest Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptx
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
 
如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...
 
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
 
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
 
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
 
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
 
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
 
如何办理威斯康星大学密尔沃基分校毕业证学位证书
 如何办理威斯康星大学密尔沃基分校毕业证学位证书 如何办理威斯康星大学密尔沃基分校毕业证学位证书
如何办理威斯康星大学密尔沃基分校毕业证学位证书
 

The Aadhaar Act, 2016

  • 1. Privacy of Data in Aadhaar Mandate: An Analysis of the Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Act, 2016 By: Dr. Gagandeep Kaur, 3rd COLS International Conference Data Privacy: Road Ahead in Data Protection on 1-2 September, 2017 at Dehradun.
  • 2. Introduction • The ‘Aadhaar Project’ is the world’s largest national identity project, launched by the government of India in the year 2016 with the enactment of the Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Act, 2016.
  • 3. Objective • This project seeks to collect biometric and demographic data of residents and store it in a centralised database controlled by Unique Identification Authority of India (UIDAI) under the Ministry of Electronics and Information Technology. • The 12-Digit biometric Aadhaar Card meant to be voluntary or optional has become a compulsory mandate to receive the benefits of welfare schemes launched by the government from time to time.
  • 4. Personal Opinion Janamkundali • Sensitive personal information of an individual in the hands of centralised database symbolises ‘janamkundali’ of the concerned person and if the ‘janamkundali’ is being compromised the consequences would be serious. Similarly, if such database is not secure then speaking about the Privacy as a fundamental right is only a myth.
  • 5. Mini Biography of an Individual School Admission/ College/Hospitals Mobile Number Bank Account/ PAN Card Internet Connection Recently Added: Death Certificate
  • 6. Why and How Janamkundali: Analyze Benefits LPG SUBSIDY Pradhan Mantri Jan Dhan Yojana (PMJDY) Passport in 10 Days
  • 8. Why and How Janamkundali Opening of New Account “Jeevan Praman for Pensioners” and Digital Parman for pensioners SEBI
  • 9. Privacy: Captured with Consent: Optional to Compulsory
  • 10. Features of the Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Act, 2016: An Overview
  • 11. 1. Nature of the Aadhaar Act, 2016: • This Act is divided into 8 Chapters and consists of 59 sections. This Act has received the assent of President on the 25th March 2016. This legislation is “Social-Welfare Legislation” as it appears from the Preamble of this Act.
  • 12. Preamble: • It states: • “An Act to provide for, as a good governance, efficient, transparent, and targeted delivery of subsidies, benefits and services, the expenditure for which is incurred from the Consolidated Fund of India, to individuals residing in India through assigning of unique identity numbers to such individuals and for matters connected therewith or incidental thereto.”
  • 13. 2. Intra-Territorial and Extra- Territorial Application • According to Section 1 (2): This Act extends to the whole of India except the State of Jammu and Kashmir and save as otherwise provided in this Act, it also applies to any offence or contravention thereunder committed outside India by any person. According to Section 44 (1) subjects to certain conditions, the provisions of this Act also apply to any offence or contravention committed outside India by any person, irrespective of his nationality.
  • 14. 3. Aadhaar Number is not Evidence of Citizenship or Domicile • According to Section 9 of this Act the Aadhaar number or the authentication thereof does not, by itself, confer any right and proof of, citizenship or domicile in respect of an Aadhaar number holder. • Any individual who is a resident in India and satisfies the verification process laid down by the Unique Identification Authority of India (UIDAI) can apply for Aadhaar card irrespective of age and gender.
  • 15. 4. Aadhaar Number is necessary for the purpose of “Establishing Identity” through the process of “Authentication”: • According to Section 7 of the Act, the proof of Aadhaar Number is necessary for receipt of certain subsidies, benefits and services, etc. • There is a subtle difference between two terms namely ‘identity verification’ and ‘authentication’. Identity provides an answer to the question “who are you?” and authentication is a challenge-response process that provides a “proof of the claim of identity”/ or how you can say who are you?”
  • 16. 5. Unique Identification Authority of India (UIDAI) Chapter IV, Section 11-23 The Central Government establishes the Unique Identification Authority of India to be responsible for the processes of enrolment and authentication and perform such other functions assigned to it under this Act. This Authority is a body corporate having perpetual succession and a common seal, with power, to acquire, hold and dispose of property, both movable and immovable, and to contract, and to sue or be sued. The head office of the Authority is in New Delhi.
  • 17. Other Provisions • Offences: Chapter VII, Sections 34-46, Section 47 • Relationship of the Aadhaar Act, 2016 and the Information Technology Act, 2000: • Under the Aadhaar Act, 2016 Chapter VI entitled, “Protection of Information” deals with safety mechanism.
  • 18. • Does ‘Aadhaar Project’ violate the Fundamental Right to Privacy and Is it ‘Unconstitutional’: An Analysis
  • 19. Variables under study In order to reach a logical conclusion the variables under study are: • The type of information being collected from Citizens and Residents • The Adequate Security Measures to Protect Sensitive Personal Information • The Real risks posed by Hacking from Enemy Nations
  • 20. The Nature of Information Collected 1. Supported Proof of Identity (PoI) Documents having Name and Photo 2. Supported Proof of Date of Birth (DoB) Documents 3. Supported Proof of Address (PoA) Documents having Name and Address 4. Supported Proof of Residence (POR) 5. Documents containing Relationship details to Head of Family: PDS Card, MNREGA Job Card, CGHS/State Government/ECHS/ESIC Medical Card, Pension Card, Army Canteen Card, Passport, Birth Certificate issued by Registrar of Birth.
  • 21. Security Measures to Protect Sensitive Personal Information • “All the data is stored in encrypted form: “The data is encrypted with the highest 2048 bit encryption, which takes 1000s of years to crack and it is what the government notifies it as a minimum security standard.” PKI-2048 and AES-256, the “highest available public key cryptography encryption” is being used, according to the UIDAI. Hence, even if any computer or data is stolen, without the code, it will not be decipherable.” • Aarthi S. Anand , “India, the Aadhaar Nation: That Isn’t Legally Equipped to Handle Its Adverse Effects”, Retrieved from< https://thewire.in/84925/aadhaar-privacy- security-legal-framework/ 10 July 2017.
  • 22. The Real risks posed by Hacking from Enemy Nations and Dark Net • Archana Dureja, a scientist in the Ministry of Electronics and Information Technology, wrote on 25 March 2017: • “There have been instances wherein personal identity or information of residents, including Aadhaar number and demographic information and other sensitive personal data such as bank account details etc. collected by various Ministries/Departments, has been reportedly published online and is accessible through an easy online search.
  • 23. For the first time, the Modi government has officially acknowledged that: “personal identity of individuals, including Aadhaar number and other sensitive information, has been leaked to the public domain”. • Yatish Yadav, “Government admits your Aadhaar data has been leaked”, Published: 31st March 2017 01:14 AM. Retrieved from:< http://www.newindianexpress.com/nation/2017/mar/31/government-admits-your- aadhaar-data-has-been-leaked-1588027.html
  • 24. Conclusion • In India the judgment of Justice K S Puttaswamy (Retd.) and Anr. (Petitioners) Versus Union of India and Ors. (Respondents) SC 2017 delivered on 25 August, 2017 has made it a historic day. Decision on Aadhaar is still pending. • It would be declared Constitutional.
  • 25. • If someone knows bank account number, it will be wrong to assume that he/she will be able to hack our Bank account. Similarly if someone knows Aadhaar number, it will be wrong to assume that he/ she will be able to hack Aadhaar- linked account unless secret numbers are PIN, OTP, Passwords, Login Ids and username are shared with.
  • 26. Suggestions 1. Strong and adequate Privacy Policy 2. Awareness to Aadhar card holder regarding precautions. 3. The legal framework on security and privacy assurance, however, needs to be more specific and requires significant strengthening.