ABSTRACT
Use of biometric information to access communication devices or information has become the new standard against identity theft and cybersecurity. Integration of financial data with biometric information is enthusiastically offered as an innovative solution in improving public service delivery and individual identity protection. Among the numerous initiatives undertaken by public and private agencies across the world, the Aadhaar, a unique identification number initiative in India, stands out. It seeks to link demographic, biometric, financial and real-time behavioral information to a 12-digit number unique to every individual in a 1.3 billion population country by the Government of India, thus, creating an end-to-end digital identity for each citizen. This integrated database benefits verification, and curbs corruption in policy service delivery. However, government ownership and control of such extensive digital information about citizens has also raised concerns about potential internal and external data breaches, and whether such level of information with the government is even essential or constitutional, opening up a technical, legal, and constitutional debate. This case study highlights the trajectory and development of the Aadhaar initiative, the security and state-citizenship rights conflicts, and the recent Supreme Court of India judgment upholding a citizens' rights of privacy and protection. The implications of this technological and judicial debate could as a precursor to policymakers and practitioners for the potential threats and conflicts that can emerge when digitization, data integration, and biometric authentication are perceived as a panacea for every governance problem.
- Aadhaar - Unique Identification: https://portal.uidai.gov.in/uidwebportal/ dashboard.do. Accessed: 2017--09-19.Google Scholar
- Aadhaar Data breach: UIDAI finds multiple transactions done with the same fingerprint: 2017. http://www.firstpost.com/tech/news-analysis/aadhaar-data-breach-uidai-finds-multiple-transactions-done-with-the-same-fingerprint-3698325.html. Accessed: 2017--09-20.Google Scholar
- Aadhaar Number vs the Social Security Number: 2015. https://cis-india.org/internet-governance/blog/aadhaar-vs-social-security-number. Accessed: 2017--09-20.Google Scholar
- Agrawal, S., Banerjee, S. and Sharma, S. 2016. Privacy and Security of Aadhaar: A Computer Science Perspective. (2016).Google Scholar
- BS Web Team 2017. Aadhaar data leak in Jharkhand raises doubts, again: Here are the details. Business Standard India.Google Scholar
- Bureau, E.E. 2017. Aadhaar law will clear Constitution test, need to secure data: Arun Jaitley. The Indian Express.Google Scholar
- Drèze, J. 2016. The Aadhaar coup. The Hindu.Google Scholar
- Dubey, N. 2017. Aadhaar card becoming a must for all your needs: Here are 10 things you need to know. The Financial Express.Google Scholar
- Enrolment Agencies: 2016. https://uidai.gov.in/enrolment-update/ecosystem-partners/enrolment-agencies.html. Accessed: 2017--09-20.Google Scholar
- Frenkel, S. 2017. Global Ransomware Attack: What We Know and Don't Know. The New York Times.Google Scholar
- Glover, R.W. 2011. Radically Rethinking Citizenship: Disaggregation, Agonistic Pluralism and the Politics of Immigration in the United States. Political Studies. 59, 2 (Jun. 2011), 209--229.Google ScholarCross Ref
- Home Depot Data Breach Costs Top $179 Million After Latest Settlement: 2017. http://fortune.com/2017/03/09/home-depot-data-breach-banks/. Accessed: 2017--09-20.Google Scholar
- India's biometric database is a dystopian nightmare: https://news.vice.com/story/indias-biometric-database-is-a-massive-achievement-and-a-dystopian-nightmare. Accessed: 2017--09-19.Google Scholar
- Is Jharkhand's ambitious Aadhaar linkage derailing MGNREGA? http://www.downtoearth.org.in/news/welfare-interrupted-58472. Accessed: 2017--09-19.Google Scholar
- Khera, R. 2017. The Different Ways in Which Aadhaar Infringes on Privacy. The Wire.Google Scholar
- Kolachalam, N. 2017. The Privacy Battle Over the World's Largest Biometric Database. The Atlantic.Google Scholar
- Kumar, C. 2017. RTI activist says Aadhaar contract gave foreign firms access to unencrypted data - Times of India. The Times of India.Google Scholar
- Live Law Network 2017. 'Privacy Can Be Made A Fundamental Right Only Through A Constitutional Amendment': Senior Advocate Aryama Sundaram Tells Nine-Judge Bench {Read Written Submission}. Live Law.Google Scholar
- Malhotra, S. 2017. If MS Dhoni's personal Aadhaar data can be leaked, how safe is yours? Hindustan Times.Google Scholar
- McCoy, K. 2017. Target to pay $18.5M for 2013 data breach that affected 41 million consumers. USA TODAY.Google Scholar
- Perlroth, N. 2017. More Evidence Points to North Korea in Ransomware Attack. The New York Times.Google Scholar
- PTI 2015. Right to Privacy not a fundamental right, cannot be invoked to scrap Aadhar: Centre tells Supreme Court. The Economic Times.Google Scholar
- Jessica Davis. 2017. Ransomware accounted for 72% of healthcare malware attacks in 2016. Healthcare IT News. Retrieved September 20, 2017 from http://www.healthcareitnews.com/news/ransomware-accounted-72-healthcare-malware-attacks-2016Google Scholar
- Rapoport, M. and Andriotis, A. 2017. Equifax Lost Social Security Numbers But Still Works for the Social Security Administration. Wall Street Journal.Google Scholar
- Singh, R.K. 2017. UP STF busts UPI-based online fraud, bank employee held. Hindustan Times.Google Scholar
- TA, J. 2017. IIT Kharagpur graduate hacked Aadhaar data through Digital India app: Police. The Indian Express.Google Scholar
- Tele-caller dupes trader of Rs 50,000 - Times of India: http://timesofindia.indiatimes.com/city/lucknow/tele-caller-dupes-trader-of-rs-50000/articleshow/60287325.cms. Accessed: 2017--09-19.Google Scholar
- The Supreme Court's Right to Privacy Judgment -- I: Foundations By Gautam Bhatia: 2017. http://www.livelaw.in/supreme-courts-right-privacy-judgment-foundations/. Accessed: 2017--09-20.Google Scholar
- TNN 2017. SC asks Centre to link all mobile numbers to Aadhaar within one year - Times of India. The Times of India.Google Scholar
- UP Gang Found Complex Way To Make Fake Aadhaar Cards, Say Police: 2017. http://www.ndtv.com/india-news/up-gang-that-hacked-aadhaar-security-protocols-made-fake-cards-busted-1748471. Accessed: 2017--09-19.Google Scholar
- Whitley, E.A. 2005. The Identity Project: An Assessment of the UK Identity Cards Bill and its implications. Department of Information Systems, London School of Economics and Political Science.Google Scholar
- Why are we still using Social Security numbers as ID? 2017. http://money.cnn.com/2017/09/13/technology/social-security-number-identification/index.html. Accessed: 2017--09-20.Google Scholar
- Woman shopkeeper duped of Rs 95k by 'Paytm' executive - Times of India: http://timesofindia.indiatimes.com/city/noida/woman-shopkeeper-duped-of-rs-95k-by-paytm-executive/articleshow/60383776.cms. Accessed: 2017--09-19.Google Scholar
- Yadav, Y. 2017. Government admits your Aadhaar data has been leaked. The New Indian Express.Google Scholar
- 2016. Duplicate, Leak, Deity. Limn.Google Scholar
Index Terms
- Convergence or Conflict?: Digital Identities vs. Citizenship Rights: Case Study of Unique Identification Number, Aadhaar, in India
Recommendations
Individual Empowerment through Digital Governance: Proposing an Assessment Framework for India
ICEGOV '17: Proceedings of the Special Collection on eGovernment Innovations in IndiaAdoption of information and communication technologies (ICT) in governance contexts is considered empowering for governments and citizens. Digital Governance aims at transforming internal processes, structures and working practices leading to greater ...
Digital Governance and Individuals' Empowerment: a Conceptual Framework and Some Preliminary Results
ICEGOV '17: Proceedings of the 10th International Conference on Theory and Practice of Electronic GovernanceAdoption of information and communication technologies (ICT) in governance contexts is considered empowering for governments and the citizens. Digital governance aims at transforming internal processes, structures and working practices leading to ...
Promoting social participation through digital governance: identifying barriers in the brazilian public administration
dg.o '18: Proceedings of the 19th Annual International Conference on Digital Government Research: Governance in the Data AgePublic organizations are expanding their use of the democratic potential of information and communication technologies to promote the engagement of civil society in their organizational processes. Therefore, it is possible to perceive the transformation ...
Comments