Digital India is a national program that aims to provide universal access to digital resources for citizens. Digital governance refers to using information and communication technology to carry out government functions and achieve governance goals in a more efficient manner. The government has launched several initiatives to promote digital governance, including MyGov for citizen feedback, Digital Locker for document storage, and programs to expand internet access and online services. However, challenges remain in ensuring privacy, overcoming technological barriers for disadvantaged groups, and maintaining trust in government systems.
Ciekawy dokument prezentujący wyniki kontroli NAO (National Audit Office) w Wielkiej Brytanii, która zajęła się tematyką wdrożeń SSC w sektorze publicznym.
Co ciekawe, pomimo tego, iż wdrożenia SSC nie dowiozły zakładanych efektów, to nie model sam jest tego przyczyną, a m.in. zbyt rozbuchane wydatki na zbyt mocno rozbudowane systemy IT. Poważne wnioski.
Ana Kostava is an associate at Dechert specializing in corporate, regulatory, technology, investment, and real estate law. She has experience advising on real estate finance and international arbitration. Kostava holds an LLM from Cambridge University and has previously worked with organizations like the WTO and ECHR on international law and human rights. At Dechert, her work involves transactions, disputes, and regulations across various industries in Georgia.
This document discusses e-governance in India. It defines e-governance as using technology like the internet and mobile phones to improve government efficiency and services to citizens, businesses, employees, and other government agencies. It outlines India's major e-governance initiatives like Digital Locker, Jeevan Pramaan, and PayGov. Benefits include reduced costs, increased speed and convenience. Limitations include budget constraints, low IT literacy in rural areas, and privacy issues. The scope and importance of further developing e-governance in India is also discussed.
The document provides an overview of the Aadhaar card in India. It discusses that the Unique Identification Authority of India (UIDAI) was established in 2009 by the Government of India to provide a unique identity number to all Indian residents. The presentation was given by several individuals and provided background on UIDAI such as its chairman Nandan Nilekani.
This document describes a minor project to create a secure travel identity system using Aadhaar. The system would integrate citizen identification, passport, license, and crime records to manage travel for citizens of India. It addresses issues with the existing system like multiple identity cards and duplication. The proposed system uses a unique Aadhaar ID and PIN for transactions and applications to eliminate duplicate records. Address and other changes can also be easily updated in the system. Law enforcement could identify citizens with travel restrictions through integration with airlines. The conclusion states that Aadhaar provides a highly secure unique identification for citizens to easily manage travel documents and identification.
This document describes a company that provides project management services for UIDAI and NPR enrolment projects. The company offers to handle all aspects of the project life cycle from planning to deployment to monitoring. They use innovative approaches like a centralized project management office (PMO) that monitors field operations in real-time and aims to have a "fulcrum-like impact" on operations. The company claims extensive experience in successfully executing two full life cycle UID projects and believes their ability to execute sets them apart from others in the industry.
Digital India is a national program that aims to provide universal access to digital resources for citizens. Digital governance refers to using information and communication technology to carry out government functions and achieve governance goals in a more efficient manner. The government has launched several initiatives to promote digital governance, including MyGov for citizen feedback, Digital Locker for document storage, and programs to expand internet access and online services. However, challenges remain in ensuring privacy, overcoming technological barriers for disadvantaged groups, and maintaining trust in government systems.
Ciekawy dokument prezentujący wyniki kontroli NAO (National Audit Office) w Wielkiej Brytanii, która zajęła się tematyką wdrożeń SSC w sektorze publicznym.
Co ciekawe, pomimo tego, iż wdrożenia SSC nie dowiozły zakładanych efektów, to nie model sam jest tego przyczyną, a m.in. zbyt rozbuchane wydatki na zbyt mocno rozbudowane systemy IT. Poważne wnioski.
Ana Kostava is an associate at Dechert specializing in corporate, regulatory, technology, investment, and real estate law. She has experience advising on real estate finance and international arbitration. Kostava holds an LLM from Cambridge University and has previously worked with organizations like the WTO and ECHR on international law and human rights. At Dechert, her work involves transactions, disputes, and regulations across various industries in Georgia.
This document discusses e-governance in India. It defines e-governance as using technology like the internet and mobile phones to improve government efficiency and services to citizens, businesses, employees, and other government agencies. It outlines India's major e-governance initiatives like Digital Locker, Jeevan Pramaan, and PayGov. Benefits include reduced costs, increased speed and convenience. Limitations include budget constraints, low IT literacy in rural areas, and privacy issues. The scope and importance of further developing e-governance in India is also discussed.
The document provides an overview of the Aadhaar card in India. It discusses that the Unique Identification Authority of India (UIDAI) was established in 2009 by the Government of India to provide a unique identity number to all Indian residents. The presentation was given by several individuals and provided background on UIDAI such as its chairman Nandan Nilekani.
This document describes a minor project to create a secure travel identity system using Aadhaar. The system would integrate citizen identification, passport, license, and crime records to manage travel for citizens of India. It addresses issues with the existing system like multiple identity cards and duplication. The proposed system uses a unique Aadhaar ID and PIN for transactions and applications to eliminate duplicate records. Address and other changes can also be easily updated in the system. Law enforcement could identify citizens with travel restrictions through integration with airlines. The conclusion states that Aadhaar provides a highly secure unique identification for citizens to easily manage travel documents and identification.
This document describes a company that provides project management services for UIDAI and NPR enrolment projects. The company offers to handle all aspects of the project life cycle from planning to deployment to monitoring. They use innovative approaches like a centralized project management office (PMO) that monitors field operations in real-time and aims to have a "fulcrum-like impact" on operations. The company claims extensive experience in successfully executing two full life cycle UID projects and believes their ability to execute sets them apart from others in the industry.
Highlighting the government’s focus on Skill Development to achieve economic & social development through the country’s huge active population (between 15-45 years), the presentation details the changing scenario of the skill development sector in India and the state of Gujarat.
This document describes a proposed Aadhar Secure Travel Identity system that would allow citizens in India to have a single unique identification number linked to their passport, driver's license, and criminal records. The system would integrate government departments like Aadhar, Crime Records, Passport Office, and Regional Transport Authority. It would allow citizens to easily apply for and manage documents without agents. Law enforcement could also use the system to track citizens and block travel if needed during an investigation. The document outlines the proposed system architecture, modules, and technical requirements.
The document discusses the Aadhaar system in India, which issues a 12-digit unique identity number to all residents based on their demographic and biometric data. It describes how Aadhaar aims to provide universal identification and enable efficient delivery of services by eliminating duplicate verification. The process of obtaining an Aadhaar card and the required documents are outlined. The numbering system, privacy measures, technology architecture and various services that use Aadhaar authentication like banking, pensions and welfare schemes are also summarized.
The document summarizes the Unique Identification Authority of India's (UIDAI) Aadhaar initiative. It discusses:
1) The principles of Aadhaar, which issues a 12-digit unique ID number to residents based on biometric authentication of fingerprints and iris scans.
2) The benefits of Aadhaar include eliminating duplicates, enabling service access, and reducing leakage in welfare programs.
3) Progress implementing Aadhaar in Andhra Pradesh, including signing an MOU, constituting committees, and plans to enroll 35 million residents in the state.
The document discusses India's Unique Identification (UID) project and the Unique Identification Authority of India (UIDAI). It describes the purpose of UIDAI as providing a unique identification number to all Indian residents. It outlines the enrollment and authentication processes and discusses the various agencies, technologies, and challenges involved in implementing the UID system on a large scale. Key risks discussed include issues relating to adoption, privacy/security of biometric data, and ensuring the system's long-term sustainability.
The Unique Identification Authority of India (UIDAI) was established in 2009 as a statutory body under separate legislation to issue unique identification numbers (UID) to all Indian residents. The UID will be a 12-digit number that uniquely identifies residents and can be verified cost-effectively. It will help improve delivery of social services and financial inclusion. The UIDAI aims to issue IDs to 1.2 billion residents of India and ensure privacy by only providing yes/no responses during authentication and not revealing any personal details. Nandan Nilekani is the chairman of UIDAI which has faced challenges in issuing IDs at an unprecedented scale and computational power needed for duplicate checks against over 1.2 billion records.
RFID technology allows for automatic identification of movable items using radio waves. BCDS is an Australian company that has implemented various RFID solutions including asset tracking, visitor tracking, animal tracking, healthcare solutions, and more. RFID systems consist of tags that can be attached to items and readers that can read tag data remotely without line of sight. RFID finds many uses including tracking animals, manufacturing/warehousing, defense applications, and document tracking. The presentation discusses these applications and how RFID is playing a role in smart technologies.
This PowerPoint presentation provides an overview of radio frequency identification (RFID) technology. It discusses how RFID works, the benefits of RFID, and some concerns around implementing RFID technology. The presentation concludes that while RFID is being adopted in many industries and locations, concerns around privacy and security still need to be addressed for successful widespread implementation. However, RFID has the potential to significantly improve efficiency and change how we manage things in both our personal and work lives.
This document discusses the diamond problem that can occur with multiple inheritance in C++. Specifically, it shows an example where a class "four" inherits from classes "two" and "three", which both inherit from class "one". This results in two copies of the base class "one" being present in objects of class "four", leading to ambiguity when trying to access attributes from the base class. The document presents two ways to resolve this issue: 1) manual selection using scope resolution to specify which attribute to access, and 2) making the inheritance of the base class "one" virtual in classes "two" and "three", which ensures only one copy of the base class exists in class "four" objects. The virtual
I have made this presentation to make people aware about the Direct Benefits transfer scheme by Enrolling for Aadhar card which will also used as Identity proof for various purposes.
Unique identification number uid project ...Bharat Sharma
The document discusses the Unique Identification (UID) project in India which aims to provide each resident a 12-digit unique identification number (Aadhaar) for identification and authentication purposes. It outlines the objectives of the UIDAI authority which is to issue unique IDs to eliminate duplicate identities. The timeline for issuing the first UID numbers is 12-18 months from 2009. Over 5 years the goal is to issue 600 million IDs through various registrar agencies.
The lawfulness of Sting Operations ranges across countries. It is a type of research journalism
that is advanced. There have been numerous decisions to establish the admissibility of sting
operations in India. It is not regulated by a specific law or regulation. The rotating ethics of sting
operations in civilian society has long been a controversy. Civil society has embraced its role in
fostering public order and imposing transparency in public life but has also been blamed for being
seemingly ethical and unethical and transgressing the individual's privacy and freedom and harming
his reputation and public image.
A sting operation is an operation intended to capture a criminal
committing a crime of deception. Usually, a sting operation involves an undercover body, such as
the police or the newspaper, which induces a suspect to commit a crime in order to manipulate them
in a red-handed way. They may pose a criminal themselves, thereby setting up a trap in terms of an
enticing bid, sometimes referred to as a honey trap; if the victim takes the bait, the trappers "sting"
it by means of arrest or publication.
This document discusses the history and development of open banking regulations in different regions including the EU, Mexico, Brazil, Australia, and calls for the EU to be ambitious and put consumers in control of their data, inspired by frameworks in other countries. It notes that PSD2 is established but that Open Finance could provide access to more financial sector data.
This document provides an overview of corruption in India, anti-corruption laws and compliance. It notes that India has had a long history of corruption scandals. It describes India as a growing economy but also notes historical factors that have contributed to corruption such as the British legacy, license raj, overregulation and lack of enforcement. The document outlines existing anti-corruption laws in India and laws that are forthcoming. It also discusses increasing enforcement actions against foreign companies doing business in India. Finally, it provides some compliance tips for managing corruption risks.
2015.07.02 GJZ TSOC event IoT and Big Data. And the Privacy Act. pptxGerrit-Jan Zwenne
This document discusses the challenges that IoT, datafication, and big data pose for privacy and data protection law. It first provides definitions and background on these concepts. IoT refers to ubiquitous connectivity of devices through sensors and code. Datafication is turning many aspects of life into computerized data. Big data uses large data sets for predictive analytics.
It then gives a short overview of key privacy principles like informing individuals about personal data use, obtaining consent, and limiting data collection and usage to specified purposes. However, with big data many innovative uses cannot be envisioned up front. Also, correlation found in big data does not necessarily prove causation. These issues challenge how privacy laws can be applied to new big data
The document outlines Japan's digital government strategy and initiatives. It discusses establishing an IT strategy vision of a "Society 5.0" and enacting basic acts on IT and data utilization. The strategy aims to transform government into a user-centric, trusted, and open platform through digitalization, transparency, participation, and innovation. Key elements include establishing common technology, cross-domain services, and coordinating projects across sectors like healthcare, agriculture and disaster management.
The document discusses the debate around monitoring and controlling internet use and mass surveillance programs. It notes arguments from politicians and experts on both sides of the issue, with some arguing for more surveillance powers to fight crime and terrorism, while others see mass surveillance as a threat to civil liberties and an ineffective means of preventing attacks. The document also examines oversight of surveillance programs and public opinion on privacy and government monitoring of communications data.
The document discusses the growing importance of the internet economy and digital technologies, and argues that the G20 should engage more directly with issues related to the digital economy. It notes that while G20 members have differing views on internet governance, they could focus on areas of agreement like facilitating e-commerce, developing digital skills, and using information and communication technologies to promote development. The document suggests that ICT for development would be a suitable starting point for the G20 to begin discussing the digital economy.
This document summarizes recent developments regarding enforcement of the Foreign Corrupt Practices Act (FCPA) through increased international cooperation and harmonization of anti-bribery laws. It discusses how enforcement has shifted from a unilateral US approach to a multilateral model through organizations like the OECD and UN. Recent prosecutions have involved cooperation across multiple jurisdictions, and norms against foreign bribery have strengthened through progressive adoption of laws and enforcement actions internationally. Continued enforcement competition and closing of loopholes may further discourage using bribery as a business model.
This document discusses managing corruption and bribery risks when doing business in India. It provides an introduction to corruption in India, outlines relevant anti-corruption laws, and notes trends in enforcement both within India and abroad. It also discusses practical tips for dealing with bribery demands, such as having a strong ethics and compliance program. Channels for seeking redress like the Right to Information Act and escalating issues internally or to agencies like the police or Central Bureau of Investigation are also mentioned.
The document discusses how countries can maximize economic growth through adoption of the Industrial Internet of Things (IIoT). It finds that IIoT could add $10.6 trillion to global GDP by 2030 under current conditions, and $14.2 trillion with additional investment and policy support. Countries' ability to "absorb" IIoT innovations, known as national absorptive capacity (NAC), will influence their economic gains. The document provides recommendations for countries to strengthen NAC and fully realize IIoT's growth potential.
The new Criminal Procedure (Identification) Bill 2022 proposes to allow police and prison authorities to collect, store and analyze sensitive biological and physical data of convicted persons, arrestees, and detainees. This includes retina scans, iris scans, fingerprints, and DNA. It aims to modernize identification techniques. However, critics argue it violates privacy, empowers authorities excessively, and could be misused on protesters. It also proposes sharing this data with other agencies for 75 years. Opposition parties have termed the bill "unconstitutional" and an "attack on privacy". Some states like Karnataka and Tamil Nadu have passed similar laws but with the President's approval.
Highlighting the government’s focus on Skill Development to achieve economic & social development through the country’s huge active population (between 15-45 years), the presentation details the changing scenario of the skill development sector in India and the state of Gujarat.
This document describes a proposed Aadhar Secure Travel Identity system that would allow citizens in India to have a single unique identification number linked to their passport, driver's license, and criminal records. The system would integrate government departments like Aadhar, Crime Records, Passport Office, and Regional Transport Authority. It would allow citizens to easily apply for and manage documents without agents. Law enforcement could also use the system to track citizens and block travel if needed during an investigation. The document outlines the proposed system architecture, modules, and technical requirements.
The document discusses the Aadhaar system in India, which issues a 12-digit unique identity number to all residents based on their demographic and biometric data. It describes how Aadhaar aims to provide universal identification and enable efficient delivery of services by eliminating duplicate verification. The process of obtaining an Aadhaar card and the required documents are outlined. The numbering system, privacy measures, technology architecture and various services that use Aadhaar authentication like banking, pensions and welfare schemes are also summarized.
The document summarizes the Unique Identification Authority of India's (UIDAI) Aadhaar initiative. It discusses:
1) The principles of Aadhaar, which issues a 12-digit unique ID number to residents based on biometric authentication of fingerprints and iris scans.
2) The benefits of Aadhaar include eliminating duplicates, enabling service access, and reducing leakage in welfare programs.
3) Progress implementing Aadhaar in Andhra Pradesh, including signing an MOU, constituting committees, and plans to enroll 35 million residents in the state.
The document discusses India's Unique Identification (UID) project and the Unique Identification Authority of India (UIDAI). It describes the purpose of UIDAI as providing a unique identification number to all Indian residents. It outlines the enrollment and authentication processes and discusses the various agencies, technologies, and challenges involved in implementing the UID system on a large scale. Key risks discussed include issues relating to adoption, privacy/security of biometric data, and ensuring the system's long-term sustainability.
The Unique Identification Authority of India (UIDAI) was established in 2009 as a statutory body under separate legislation to issue unique identification numbers (UID) to all Indian residents. The UID will be a 12-digit number that uniquely identifies residents and can be verified cost-effectively. It will help improve delivery of social services and financial inclusion. The UIDAI aims to issue IDs to 1.2 billion residents of India and ensure privacy by only providing yes/no responses during authentication and not revealing any personal details. Nandan Nilekani is the chairman of UIDAI which has faced challenges in issuing IDs at an unprecedented scale and computational power needed for duplicate checks against over 1.2 billion records.
RFID technology allows for automatic identification of movable items using radio waves. BCDS is an Australian company that has implemented various RFID solutions including asset tracking, visitor tracking, animal tracking, healthcare solutions, and more. RFID systems consist of tags that can be attached to items and readers that can read tag data remotely without line of sight. RFID finds many uses including tracking animals, manufacturing/warehousing, defense applications, and document tracking. The presentation discusses these applications and how RFID is playing a role in smart technologies.
This PowerPoint presentation provides an overview of radio frequency identification (RFID) technology. It discusses how RFID works, the benefits of RFID, and some concerns around implementing RFID technology. The presentation concludes that while RFID is being adopted in many industries and locations, concerns around privacy and security still need to be addressed for successful widespread implementation. However, RFID has the potential to significantly improve efficiency and change how we manage things in both our personal and work lives.
This document discusses the diamond problem that can occur with multiple inheritance in C++. Specifically, it shows an example where a class "four" inherits from classes "two" and "three", which both inherit from class "one". This results in two copies of the base class "one" being present in objects of class "four", leading to ambiguity when trying to access attributes from the base class. The document presents two ways to resolve this issue: 1) manual selection using scope resolution to specify which attribute to access, and 2) making the inheritance of the base class "one" virtual in classes "two" and "three", which ensures only one copy of the base class exists in class "four" objects. The virtual
I have made this presentation to make people aware about the Direct Benefits transfer scheme by Enrolling for Aadhar card which will also used as Identity proof for various purposes.
Unique identification number uid project ...Bharat Sharma
The document discusses the Unique Identification (UID) project in India which aims to provide each resident a 12-digit unique identification number (Aadhaar) for identification and authentication purposes. It outlines the objectives of the UIDAI authority which is to issue unique IDs to eliminate duplicate identities. The timeline for issuing the first UID numbers is 12-18 months from 2009. Over 5 years the goal is to issue 600 million IDs through various registrar agencies.
The lawfulness of Sting Operations ranges across countries. It is a type of research journalism
that is advanced. There have been numerous decisions to establish the admissibility of sting
operations in India. It is not regulated by a specific law or regulation. The rotating ethics of sting
operations in civilian society has long been a controversy. Civil society has embraced its role in
fostering public order and imposing transparency in public life but has also been blamed for being
seemingly ethical and unethical and transgressing the individual's privacy and freedom and harming
his reputation and public image.
A sting operation is an operation intended to capture a criminal
committing a crime of deception. Usually, a sting operation involves an undercover body, such as
the police or the newspaper, which induces a suspect to commit a crime in order to manipulate them
in a red-handed way. They may pose a criminal themselves, thereby setting up a trap in terms of an
enticing bid, sometimes referred to as a honey trap; if the victim takes the bait, the trappers "sting"
it by means of arrest or publication.
This document discusses the history and development of open banking regulations in different regions including the EU, Mexico, Brazil, Australia, and calls for the EU to be ambitious and put consumers in control of their data, inspired by frameworks in other countries. It notes that PSD2 is established but that Open Finance could provide access to more financial sector data.
This document provides an overview of corruption in India, anti-corruption laws and compliance. It notes that India has had a long history of corruption scandals. It describes India as a growing economy but also notes historical factors that have contributed to corruption such as the British legacy, license raj, overregulation and lack of enforcement. The document outlines existing anti-corruption laws in India and laws that are forthcoming. It also discusses increasing enforcement actions against foreign companies doing business in India. Finally, it provides some compliance tips for managing corruption risks.
2015.07.02 GJZ TSOC event IoT and Big Data. And the Privacy Act. pptxGerrit-Jan Zwenne
This document discusses the challenges that IoT, datafication, and big data pose for privacy and data protection law. It first provides definitions and background on these concepts. IoT refers to ubiquitous connectivity of devices through sensors and code. Datafication is turning many aspects of life into computerized data. Big data uses large data sets for predictive analytics.
It then gives a short overview of key privacy principles like informing individuals about personal data use, obtaining consent, and limiting data collection and usage to specified purposes. However, with big data many innovative uses cannot be envisioned up front. Also, correlation found in big data does not necessarily prove causation. These issues challenge how privacy laws can be applied to new big data
The document outlines Japan's digital government strategy and initiatives. It discusses establishing an IT strategy vision of a "Society 5.0" and enacting basic acts on IT and data utilization. The strategy aims to transform government into a user-centric, trusted, and open platform through digitalization, transparency, participation, and innovation. Key elements include establishing common technology, cross-domain services, and coordinating projects across sectors like healthcare, agriculture and disaster management.
The document discusses the debate around monitoring and controlling internet use and mass surveillance programs. It notes arguments from politicians and experts on both sides of the issue, with some arguing for more surveillance powers to fight crime and terrorism, while others see mass surveillance as a threat to civil liberties and an ineffective means of preventing attacks. The document also examines oversight of surveillance programs and public opinion on privacy and government monitoring of communications data.
The document discusses the growing importance of the internet economy and digital technologies, and argues that the G20 should engage more directly with issues related to the digital economy. It notes that while G20 members have differing views on internet governance, they could focus on areas of agreement like facilitating e-commerce, developing digital skills, and using information and communication technologies to promote development. The document suggests that ICT for development would be a suitable starting point for the G20 to begin discussing the digital economy.
This document summarizes recent developments regarding enforcement of the Foreign Corrupt Practices Act (FCPA) through increased international cooperation and harmonization of anti-bribery laws. It discusses how enforcement has shifted from a unilateral US approach to a multilateral model through organizations like the OECD and UN. Recent prosecutions have involved cooperation across multiple jurisdictions, and norms against foreign bribery have strengthened through progressive adoption of laws and enforcement actions internationally. Continued enforcement competition and closing of loopholes may further discourage using bribery as a business model.
This document discusses managing corruption and bribery risks when doing business in India. It provides an introduction to corruption in India, outlines relevant anti-corruption laws, and notes trends in enforcement both within India and abroad. It also discusses practical tips for dealing with bribery demands, such as having a strong ethics and compliance program. Channels for seeking redress like the Right to Information Act and escalating issues internally or to agencies like the police or Central Bureau of Investigation are also mentioned.
The document discusses how countries can maximize economic growth through adoption of the Industrial Internet of Things (IIoT). It finds that IIoT could add $10.6 trillion to global GDP by 2030 under current conditions, and $14.2 trillion with additional investment and policy support. Countries' ability to "absorb" IIoT innovations, known as national absorptive capacity (NAC), will influence their economic gains. The document provides recommendations for countries to strengthen NAC and fully realize IIoT's growth potential.
The new Criminal Procedure (Identification) Bill 2022 proposes to allow police and prison authorities to collect, store and analyze sensitive biological and physical data of convicted persons, arrestees, and detainees. This includes retina scans, iris scans, fingerprints, and DNA. It aims to modernize identification techniques. However, critics argue it violates privacy, empowers authorities excessively, and could be misused on protesters. It also proposes sharing this data with other agencies for 75 years. Opposition parties have termed the bill "unconstitutional" and an "attack on privacy". Some states like Karnataka and Tamil Nadu have passed similar laws but with the President's approval.
DEXIBIT is considering expanding into China's market. While China presents opportunities for growth, there are also challenges to consider. China has a large population and economy that is still growing, but it highly regulates foreign investment and has issues with weak intellectual property protection. DEXIBIT will need to build strong local relationships through agents, consider how to address intellectual property risks, and pay attention to new cybersecurity laws that could increase regulatory barriers. Thoroughly researching the market, competitors, and addressing strategic challenges will be important before entering China.
This document summarizes the impact of key European regulations on data science in finance, including opportunities and challenges. It discusses regulations around privacy (GDPR), financial stability (MIFID II), climate change (BOE SS3/19), and artificial intelligence (EC White Paper). These regulations influence the development of explainable, unbiased, and causally accurate AI models. They also create commercial opportunities to leverage regulations through technology. Examples are provided around applying explainable AI to credit risk and reducing regulatory burden through AI.
The document discusses the Right to Information Act 2005 and the Official Secrets Act 1923 in India. It provides background on the need for the RTI Act, including promoting transparency and accountability. It outlines important sections of the RTI Act regarding access to information, designation of information officers, appeals process and penalties. It also discusses the Central Information Commission and landmark cases related to RTI. The document then provides history and aspects covered under the Official Secrets Act 1923, including espionage and secret information. It notes tensions between the RTI Act and OSA, as well as committees recommending changes to the latter. Finally, it outlines some cases where the OSA was invoked against journalists.
we are here to help you in the duration of your preparation
feel free to contact us for any query regarding your exam
contact us at : 9454721860, 0522-4241011
or log on to our website : www.iasnext.com
Bangladesh can learn strategy of fdi from chinaM S Siddiqui
There is no reason why Bangladesh will continue keep these sector restricted for public investment with overseas loan against high interest rate. The relevant government departments are proven to be most corrupt and inefficient. The cost of construction is reportedly highest in the world as revealed by different study and comparison with other countries. These sectors may be opened for FDI following the policy of China.
The document discusses prevailing corruption in India and potential remedies. It begins by presenting some alarming statistics about the percentage of Indian citizens who paid bribes according to Transparency International surveys. It then outlines the goal, objectives, and definitions of corruption presented by the speaker. Several types of corruption are defined, including systematic, individual, grand, and petty corruption. Major corruption scams in India like the 2G spectrum scam and Commonwealth Games scam are discussed. Causes of corruption include factors like ineffective legal systems and lack of values in society. Impacts include loss of national wealth and hindrance of development. Potential remedies proposed include strong anti-corruption laws, social audits, and electoral reforms.
This report analyzes investment opportunities and considerations in China's mobile phone industry. Foreign direct investment in China has increased significantly in recent years as China's economy and consumer market continue to grow rapidly. However, China's political and legal factors present challenges for foreign companies seeking to enter the market. Strict regulations govern market entry and licensing in the telecommunications sector. Additionally, cultural differences must be acknowledged and respected to gain acceptance. Any foreign investor will need to carefully adhere to both Chinese laws and cultural norms to find success in this important market.
Unique ID Authority of India, Design and Cloud ConnectionSuhas Kelkar
UID project in India is a showcase example of Cloud based services. And that too at a massive scale. It is both ambitious and elegant in it's approach for solving identity issues.
Similar to UID, branded, "Aadhaar" - The deceit of the UIDAI Database (20)
लालू यादव की जीवनी LALU PRASAD YADAV BIOGRAPHYVoterMood
Discover the life and times of Lalu Prasad Yadav with a comprehensive biography in Hindi. Learn about his early days, rise in politics, controversies, and contribution.
Federal Authorities Urge Vigilance Amid Bird Flu Outbreak | The Lifesciences ...The Lifesciences Magazine
Federal authorities have advised the public to remain vigilant but calm in response to the ongoing bird flu outbreak of highly pathogenic avian influenza, commonly known as bird flu.
Recent years have seen a disturbing rise in violence, discrimination, and intolerance against Christian communities in various Islamic countries. This multifaceted challenge, deeply rooted in historical, social, and political animosities, demands urgent attention. Despite the escalating persecution, substantial support from the Western world remains lacking.
ग्रेटर मुंबई के नगर आयुक्त को एक खुले पत्र में याचिका दायर कर 540 से अधिक मुंबईकरों ने सभी अवैध और अस्थिर होर्डिंग्स, साइनबोर्ड और इलेक्ट्रिक साइनेज को तत्काल हटाने और 13 मई, 2024 की शाम को घाटकोपर में अवैध होर्डिंग के गिरने की विनाशकारी घटना के बाद अपराधियों के खिलाफ सख्त कार्रवाई की मांग की है, जिसमें 17 लोगों की जान चली गई और कई निर्दोष लोग गंभीर रूप से घायल हो गए।
Slide deck with charts from our Digital News Report 2024, the most comprehensive exploration of news consumption habits around the world, based on survey data from more than 95,000 respondents across 47 countries.
केरल उच्च न्यायालय ने 11 जून, 2024 को मंडला पूजा में भाग लेने की अनुमति मांगने वाली 10 वर्षीय लड़की की रिट याचिका को खारिज कर दिया, जिसमें सर्वोच्च न्यायालय की एक बड़ी पीठ के समक्ष इस मुद्दे की लंबित प्रकृति पर जोर दिया गया। यह आदेश न्यायमूर्ति अनिल के. नरेंद्रन और न्यायमूर्ति हरिशंकर वी. मेनन की खंडपीठ द्वारा पारित किया गया
15062024_First India Newspaper Jaipur.pdfFIRST INDIA
Find Latest India News and Breaking News these days from India on Politics, Business, Entertainment, Technology, Sports, Lifestyle and Coronavirus News in India and the world over that you can't miss. For real time update Visit our social media handle. Read First India NewsPaper in your morning replace. Visit First India.
CLICK:- https://firstindia.co.in/
#First_India_NewsPaper
projet de traité négocié à Istanbul (anglais).pdfEdouardHusson
Ceci est le projet de traité qui avait été négocié entre Russes et Ukrainiens à Istanbul en mars 2022, avant que les Etats-Unis et la Grande-Bretagne ne détournent Kiev de signer.
#WenguiGuo#WashingtonFarm Guo Wengui Wolf son ambition exposed to open a far...rittaajmal71
Since fleeing to the United States in 2014, Guo Wengui has founded a number of projects in the United States, such as GTV Media Group, GTV private equity, farm loan project, G Club Operations Co., LTD., and Himalaya Exchange.
Youngest c m in India- Pema Khandu BiographyVoterMood
Pema Khandu, born on August 21, 1979, is an Indian politician and the Chief Minister of Arunachal Pradesh. He is the son of former Chief Minister of Arunachal Pradesh, Dorjee Khandu. Pema Khandu assumed office as the Chief Minister in July 2016, making him one of the youngest Chief Ministers in India at that time.
16062024_First India Newspaper Jaipur.pdfFIRST INDIA
Find Latest India News and Breaking News these days from India on Politics, Business, Entertainment, Technology, Sports, Lifestyle and Coronavirus News in India and the world over that you can't miss. For real time update Visit our social media handle. Read First India NewsPaper in your morning replace. Visit First India.
CLICK:- https://firstindia.co.in/
#First_India_NewsPaper
13062024_First India Newspaper Jaipur.pdfFIRST INDIA
Find Latest India News and Breaking News these days from India on Politics, Business, Entertainment, Technology, Sports, Lifestyle and Coronavirus News in India and the world over that you can't miss. For real time update Visit our social media handle. Read First India NewsPaper in your morning replace. Visit First India.
CLICK:- https://firstindia.co.in/
#First_India_NewsPaper
12062024_First India Newspaper Jaipur.pdfFIRST INDIA
Find Latest India News and Breaking News these days from India on Politics, Business, Entertainment, Technology, Sports, Lifestyle and Coronavirus News in India and the world over that you can't miss. For real time update Visit our social media handle. Read First India NewsPaper in your morning replace. Visit First India.
CLICK:- https://firstindia.co.in/
#First_India_NewsPaper
UID, branded, "Aadhaar" - The deceit of the UIDAI Database
1. UID – what is it?
The Official Version
Sunday. June 20, 2010 Citizens Action Forum
2. It links every person to a unique biometric identity of
ten finger prints & iris scans.
Sunday. June 20, 2010Citizens Action Forum
3. ●Kargil Committee Report, 2000
●GOM “Reforming the National Security System”
Report, 2001- MNIC: Multi-purpose National
Identity Card
●2003 NDA amends Citizenship Act – Onus on
people to enroll
●2009 UPA renames MNIC as UID: shift from a
security angle to a developmental angle
Sunday. June 20, 2010Citizens Action Forum
4. ●UID project would serve a variety of purposes:
“better targeting of government’s development
schemes, regulatory purposes (including taxation
and licensing), security purposes, banking and
financial sector activities, etc
●UID will be “progressively extended to various
government programmes and regulatory agencies,
as well as private sector agencies in the banking,
financial services, mobile telephony and other
such areas.”
Sunday. June 20, 2010Citizens Action Forum
5. ●UID would make it possible to open a bank
account in India with no supporting documents,
thus expanding financial inclusion
●UID would make it easier to obtain a mobile
telephone connection than at present
●UID would ensure that the public food distribution
system (PDS) in India would cease to be wasteful
Sunday. June 20, 2010Citizens Action Forum
6. ●UID would eliminate corruption from the National
Rural Employment Guarantee scheme (NREGS)
●UID would help ensure and monitor attendance of
teachers in schools
●Overall, the UID project is presented as a
“technology-based solution” that would change the
face of governance in India
Sunday. June 20, 2010Citizens Action Forum
7. ●UID is a number, in a central database of every
person in India, linked to his / her biometric
uniqueness, & maintained by the UIDAI
●It does not confer citizenship
●It is not an ID Card
●Govt & private parties could use it for issuing ID
cards, on payment of fees to UIDAI
Sunday. June 20, 2010Citizens Action Forum
8. ●The role that the Authority envisions is to issue a
unique identification number (UID) that can be
verified and authenticated in an online, cost-
effective manner, and that is robust enough to
eliminate duplicate and fake identities.
Sunday. June 20, 2010Citizens Action Forum
9. ●There is no cost estimate
●There is no Detailed Project Report
●There is no Feasibility Study
●Vague statements indicating a few thousands of
Crores of Rupees are put out, now and then
Sunday. June 20, 2010Citizens Action Forum
10. ●UK’s ID Card cost was estimated by the UK Govt
to be £ 900 Million
●LSE Study estimated the cost as between £ 10.6
to £ 19.20 Billion
Sunday. June 20, 2010Citizens Action Forum
11. ●One estimate put the figure at Rs. 1.5 Lakh Crores
●Current budget is Rs. 1950 Crores plus Rs. 3590
Crores for Census, which would be used for
enumeration of households and collecting data for
UID
●PM has asked for the cost to be reviewed
Sunday. June 20, 2010Citizens Action Forum
12. ●UIDAI is an “attached office” of the Planning
Commission
●Parliament has not discussed the setting of
UIDAI or implementing UID
●Hence, UIDAI & UID have no legal sanction
●UIDAI is drafting a law to give UIDAI statutory
legitimacy
Sunday. June 20, 2010Citizens Action Forum
13. ●Bank accounts & financial inclusion
●Phone connections
●Prevent waste in PDS
●Eliminate corruption in NREGS
●Monitor attendance of teachers in schools
None of these would be achieved
Sunday. June 20, 2010Citizens Action Forum
14. ●UIDAI has never said that the origin & real
purpose of UID is for security
●Why has UIDAI NOT ever mentioned this aspect
and why has no one ever asked UIDAI about this?
Sunday. June 20, 2010Citizens Action Forum
15. ●USA – Real ID Act 2005 – Status: In cold storage,
no State has approved it.
●UK – National ID Act 2005 - Scrapped
●Australia – “Australia Cards”1986 for immigration
& taxation – Withdrawn
●Canada, New Zealand, Philippines - withdrawn
Sunday. June 20, 2010Citizens Action Forum
16. ●Parliamentary Standing Committee report noted:
“It is clear that this is a very significant policy issue
that could have wide implications for privacy,
security, and fiscal accountability. Indeed, it has
been suggested that it could affect fundamental
values underlying Canadian society. A broad
public review is therefore essential. The general
public must be made more aware of all aspects of
the issue, and we must hear what ordinary citizens
have to say”
Sunday. June 20, 2010Citizens Action Forum
17. UK Experience & Decision - 1
●National ID Act was passed in 2005 by the
Blair Govt – Purpose: Control illegal
immigrations – Biometrics in passports
●LSE study : “In its present form the
scheme is expensive, would not achieve
its objectives & would itself be a target for
terrorists”
●Brown issued tenders to MNCs, including
Microsoft, Intel, Oracle, Cisco and IBM in
Sunday. June 20, 2010Citizens Action Forum
18. UK Experience & Decision - 2
●Cameron wrote to these companies that
they would be participating in the tender at
their risk, since if the Conservative Party
came to power, they would cancel the
contracts
●The National ID was a major issue in the
UK elections in May, this year
●The first act of the new UK Govt was to
scrap the National ID scheme
Sunday. June 20, 2010Citizens Action Forum
19. UK Experience & Decision -
●In scrapping the National ID card scheme,
Theresa May, Home Secretary said,
○“This [ID card] represents the worst of
government
○It is intrusive bullying
○It is an assault on individual liberty
○We are the servants of the people, not their
masters
○The Govt will destroy all data held on the National
Identity Register
○The post of Identity Commissioner will be
Sunday. June 20, 2010Citizens Action Forum
20. How could UID be abused?
- 1
To understand this look at some UID lies
Sunday. June 20, 2010 Citizens Action Forum
21. ●It is voluntary, but service providers could
ask for it
●It would be “demand driven”
●Cloud computing would be used
●“Pay per use” would be the UID business
model
●Underplaying the “security” uses, but linking
UID database to NATGRID and allowing
security agencies – RAW, IB, CBI and police
to use it
Sunday. June 20, 2010 Citizens Action Forum
22. How could / why would, UID be
abused - 2
Sunday. June 20, 2010Citizens Action Forum
●One in thirteen MPs have criminal records. MLAs are
no better
●Corruption is rampant
●Police routinely torture people
●All these would use the data to target people and
take vengeance
●UID gives unbridled power into the hands of petty
bureaucrats
●The power to deny is inherent in this power to give
and would be abused
●Rather than preventing corruption, it would aid
corrupt politicians & officials
23. What do you think you
should / could do?
Watch & wait or act to stop?
Sunday. June 20, 2010 Citizens Action Forum
24. What you could do
●Spread the word regarding the truth about UID
●Join networks that are creating awareness
among people on UID
●Participate in all campaigns against it
●Write to MPs, MLAs, CMs, Governors, Political
Party bosses
●Write to the newspapers
●Join in taking the UID issue to courts
Sunday. June 20, 2010 Citizens Action Forum