skip to main content
10.1145/3209415.3209487acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicegovConference Proceedingsconference-collections
research-article

Convergence or Conflict?: Digital Identities vs. Citizenship Rights: Case Study of Unique Identification Number, Aadhaar, in India

Published:04 April 2018Publication History

ABSTRACT

Use of biometric information to access communication devices or information has become the new standard against identity theft and cybersecurity. Integration of financial data with biometric information is enthusiastically offered as an innovative solution in improving public service delivery and individual identity protection. Among the numerous initiatives undertaken by public and private agencies across the world, the Aadhaar, a unique identification number initiative in India, stands out. It seeks to link demographic, biometric, financial and real-time behavioral information to a 12-digit number unique to every individual in a 1.3 billion population country by the Government of India, thus, creating an end-to-end digital identity for each citizen. This integrated database benefits verification, and curbs corruption in policy service delivery. However, government ownership and control of such extensive digital information about citizens has also raised concerns about potential internal and external data breaches, and whether such level of information with the government is even essential or constitutional, opening up a technical, legal, and constitutional debate. This case study highlights the trajectory and development of the Aadhaar initiative, the security and state-citizenship rights conflicts, and the recent Supreme Court of India judgment upholding a citizens' rights of privacy and protection. The implications of this technological and judicial debate could as a precursor to policymakers and practitioners for the potential threats and conflicts that can emerge when digitization, data integration, and biometric authentication are perceived as a panacea for every governance problem.

References

  1. Aadhaar - Unique Identification: https://portal.uidai.gov.in/uidwebportal/ dashboard.do. Accessed: 2017--09-19.Google ScholarGoogle Scholar
  2. Aadhaar Data breach: UIDAI finds multiple transactions done with the same fingerprint: 2017. http://www.firstpost.com/tech/news-analysis/aadhaar-data-breach-uidai-finds-multiple-transactions-done-with-the-same-fingerprint-3698325.html. Accessed: 2017--09-20.Google ScholarGoogle Scholar
  3. Aadhaar Number vs the Social Security Number: 2015. https://cis-india.org/internet-governance/blog/aadhaar-vs-social-security-number. Accessed: 2017--09-20.Google ScholarGoogle Scholar
  4. Agrawal, S., Banerjee, S. and Sharma, S. 2016. Privacy and Security of Aadhaar: A Computer Science Perspective. (2016).Google ScholarGoogle Scholar
  5. BS Web Team 2017. Aadhaar data leak in Jharkhand raises doubts, again: Here are the details. Business Standard India.Google ScholarGoogle Scholar
  6. Bureau, E.E. 2017. Aadhaar law will clear Constitution test, need to secure data: Arun Jaitley. The Indian Express.Google ScholarGoogle Scholar
  7. Drèze, J. 2016. The Aadhaar coup. The Hindu.Google ScholarGoogle Scholar
  8. Dubey, N. 2017. Aadhaar card becoming a must for all your needs: Here are 10 things you need to know. The Financial Express.Google ScholarGoogle Scholar
  9. Enrolment Agencies: 2016. https://uidai.gov.in/enrolment-update/ecosystem-partners/enrolment-agencies.html. Accessed: 2017--09-20.Google ScholarGoogle Scholar
  10. Frenkel, S. 2017. Global Ransomware Attack: What We Know and Don't Know. The New York Times.Google ScholarGoogle Scholar
  11. Glover, R.W. 2011. Radically Rethinking Citizenship: Disaggregation, Agonistic Pluralism and the Politics of Immigration in the United States. Political Studies. 59, 2 (Jun. 2011), 209--229.Google ScholarGoogle ScholarCross RefCross Ref
  12. Home Depot Data Breach Costs Top $179 Million After Latest Settlement: 2017. http://fortune.com/2017/03/09/home-depot-data-breach-banks/. Accessed: 2017--09-20.Google ScholarGoogle Scholar
  13. India's biometric database is a dystopian nightmare: https://news.vice.com/story/indias-biometric-database-is-a-massive-achievement-and-a-dystopian-nightmare. Accessed: 2017--09-19.Google ScholarGoogle Scholar
  14. Is Jharkhand's ambitious Aadhaar linkage derailing MGNREGA? http://www.downtoearth.org.in/news/welfare-interrupted-58472. Accessed: 2017--09-19.Google ScholarGoogle Scholar
  15. Khera, R. 2017. The Different Ways in Which Aadhaar Infringes on Privacy. The Wire.Google ScholarGoogle Scholar
  16. Kolachalam, N. 2017. The Privacy Battle Over the World's Largest Biometric Database. The Atlantic.Google ScholarGoogle Scholar
  17. Kumar, C. 2017. RTI activist says Aadhaar contract gave foreign firms access to unencrypted data - Times of India. The Times of India.Google ScholarGoogle Scholar
  18. Live Law Network 2017. 'Privacy Can Be Made A Fundamental Right Only Through A Constitutional Amendment': Senior Advocate Aryama Sundaram Tells Nine-Judge Bench {Read Written Submission}. Live Law.Google ScholarGoogle Scholar
  19. Malhotra, S. 2017. If MS Dhoni's personal Aadhaar data can be leaked, how safe is yours? Hindustan Times.Google ScholarGoogle Scholar
  20. McCoy, K. 2017. Target to pay $18.5M for 2013 data breach that affected 41 million consumers. USA TODAY.Google ScholarGoogle Scholar
  21. Perlroth, N. 2017. More Evidence Points to North Korea in Ransomware Attack. The New York Times.Google ScholarGoogle Scholar
  22. PTI 2015. Right to Privacy not a fundamental right, cannot be invoked to scrap Aadhar: Centre tells Supreme Court. The Economic Times.Google ScholarGoogle Scholar
  23. Jessica Davis. 2017. Ransomware accounted for 72% of healthcare malware attacks in 2016. Healthcare IT News. Retrieved September 20, 2017 from http://www.healthcareitnews.com/news/ransomware-accounted-72-healthcare-malware-attacks-2016Google ScholarGoogle Scholar
  24. Rapoport, M. and Andriotis, A. 2017. Equifax Lost Social Security Numbers But Still Works for the Social Security Administration. Wall Street Journal.Google ScholarGoogle Scholar
  25. Singh, R.K. 2017. UP STF busts UPI-based online fraud, bank employee held. Hindustan Times.Google ScholarGoogle Scholar
  26. TA, J. 2017. IIT Kharagpur graduate hacked Aadhaar data through Digital India app: Police. The Indian Express.Google ScholarGoogle Scholar
  27. Tele-caller dupes trader of Rs 50,000 - Times of India: http://timesofindia.indiatimes.com/city/lucknow/tele-caller-dupes-trader-of-rs-50000/articleshow/60287325.cms. Accessed: 2017--09-19.Google ScholarGoogle Scholar
  28. The Supreme Court's Right to Privacy Judgment -- I: Foundations By Gautam Bhatia: 2017. http://www.livelaw.in/supreme-courts-right-privacy-judgment-foundations/. Accessed: 2017--09-20.Google ScholarGoogle Scholar
  29. TNN 2017. SC asks Centre to link all mobile numbers to Aadhaar within one year - Times of India. The Times of India.Google ScholarGoogle Scholar
  30. UP Gang Found Complex Way To Make Fake Aadhaar Cards, Say Police: 2017. http://www.ndtv.com/india-news/up-gang-that-hacked-aadhaar-security-protocols-made-fake-cards-busted-1748471. Accessed: 2017--09-19.Google ScholarGoogle Scholar
  31. Whitley, E.A. 2005. The Identity Project: An Assessment of the UK Identity Cards Bill and its implications. Department of Information Systems, London School of Economics and Political Science.Google ScholarGoogle Scholar
  32. Why are we still using Social Security numbers as ID? 2017. http://money.cnn.com/2017/09/13/technology/social-security-number-identification/index.html. Accessed: 2017--09-20.Google ScholarGoogle Scholar
  33. Woman shopkeeper duped of Rs 95k by 'Paytm' executive - Times of India: http://timesofindia.indiatimes.com/city/noida/woman-shopkeeper-duped-of-rs-95k-by-paytm-executive/articleshow/60383776.cms. Accessed: 2017--09-19.Google ScholarGoogle Scholar
  34. Yadav, Y. 2017. Government admits your Aadhaar data has been leaked. The New Indian Express.Google ScholarGoogle Scholar
  35. 2016. Duplicate, Leak, Deity. Limn.Google ScholarGoogle Scholar

Index Terms

  1. Convergence or Conflict?: Digital Identities vs. Citizenship Rights: Case Study of Unique Identification Number, Aadhaar, in India

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        ICEGOV '18: Proceedings of the 11th International Conference on Theory and Practice of Electronic Governance
        April 2018
        739 pages
        ISBN:9781450354219
        DOI:10.1145/3209415

        Copyright © 2018 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 4 April 2018

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed limited

        Acceptance Rates

        ICEGOV '18 Paper Acceptance Rate104of184submissions,57%Overall Acceptance Rate350of865submissions,40%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader