SlideShare a Scribd company logo
Privacy of Data in
Aadhaar Mandate:
An Analysis of the
Aadhaar (Targeted
Delivery of Financial
and Other Subsidies,
Benefits and
Services) Act, 2016
By:
Dr. Gagandeep Kaur, 3rd COLS
International Conference Data
Privacy: Road Ahead in Data
Protection on 1-2 September,
2017 at Dehradun.
Introduction
• The ‘Aadhaar Project’ is the
world’s largest national
identity project, launched by
the government of India in the
year 2016 with the enactment
of the Aadhaar (Targeted
Delivery of Financial and
Other Subsidies, Benefits and
Services) Act, 2016.
Objective
• This project seeks to collect biometric
and demographic data of residents
and store it in a centralised database
controlled by Unique Identification
Authority of India (UIDAI) under the
Ministry of Electronics and Information
Technology.
• The 12-Digit biometric Aadhaar Card
meant to be voluntary or optional has
become a compulsory mandate to
receive the benefits of welfare
schemes launched by the government
from time to time.
Personal Opinion
Janamkundali
• Sensitive personal information of
an individual in the hands of
centralised database symbolises
‘janamkundali’ of the concerned
person and if the ‘janamkundali’ is
being compromised the
consequences would be serious.
Similarly, if such database is not
secure then speaking about the
Privacy as a fundamental right is
only a myth.
Mini Biography of an Individual
School Admission/
College/Hospitals
Mobile Number
Bank Account/ PAN Card
Internet Connection
Recently Added: Death
Certificate
Why and How Janamkundali:
Analyze Benefits
LPG SUBSIDY
Pradhan
Mantri Jan
Dhan Yojana
(PMJDY)
Passport in 10
Days
Benefits
Digital Locker
Voter Card
Linking
Monthly
Pension/
Provident
Fund
Why and How Janamkundali
Opening of New
Account
“Jeevan Praman
for Pensioners”
and Digital
Parman for
pensioners
SEBI
Privacy: Captured with Consent:
Optional to Compulsory
Features of the Aadhaar (Targeted
Delivery of Financial and Other
Subsidies, Benefits and Services) Act,
2016: An Overview
1. Nature of the Aadhaar Act,
2016:
• This Act is divided into 8 Chapters and
consists of 59 sections. This Act has
received the assent of President on the
25th March 2016. This legislation is
“Social-Welfare Legislation” as it
appears from the Preamble of this Act.
Preamble:
• It states:
• “An Act to provide for, as a good governance,
efficient, transparent, and targeted delivery
of subsidies, benefits and services, the
expenditure for which is incurred from the
Consolidated Fund of India, to individuals
residing in India through assigning of unique
identity numbers to such individuals and for
matters connected therewith or incidental
thereto.”
2. Intra-Territorial and Extra-
Territorial Application
• According to Section 1 (2):
This Act extends to the whole of India except the State of
Jammu and Kashmir and save as otherwise provided in
this Act, it also applies to any offence or contravention
thereunder committed outside India by any person.
According to Section 44 (1) subjects to certain conditions,
the provisions of this Act also apply to any offence or
contravention committed outside India by any person,
irrespective of his nationality.
3. Aadhaar Number is not Evidence
of Citizenship or Domicile
• According to Section 9 of this Act the Aadhaar
number or the authentication thereof does not,
by itself, confer any right and proof of,
citizenship or domicile in respect of an Aadhaar
number holder.
• Any individual who is a resident in India and
satisfies the verification process laid down by the
Unique Identification Authority of India (UIDAI)
can apply for Aadhaar card irrespective of age
and gender.
4. Aadhaar Number is necessary for the
purpose of “Establishing Identity”
through the process of “Authentication”:
• According to Section 7 of the Act, the proof of Aadhaar
Number is necessary for receipt of certain subsidies,
benefits and services, etc.
• There is a subtle difference between two terms namely
‘identity verification’ and ‘authentication’. Identity
provides an answer to the question “who are you?” and
authentication is a challenge-response process that
provides a “proof of the claim of identity”/ or how you can
say who are you?”
5. Unique Identification Authority of
India (UIDAI)
Chapter IV, Section 11-23
The Central Government establishes the Unique
Identification Authority of India to be responsible for the
processes of enrolment and authentication and perform
such other functions assigned to it under this Act. This
Authority is a body corporate having perpetual succession
and a common seal, with power, to acquire, hold and
dispose of property, both movable and immovable, and to
contract, and to sue or be sued. The head office of the
Authority is in New Delhi.
Other Provisions
• Offences: Chapter VII, Sections 34-46,
Section 47
• Relationship of the Aadhaar Act, 2016 and
the Information Technology Act, 2000:
• Under the Aadhaar Act, 2016 Chapter VI
entitled, “Protection of Information” deals
with safety mechanism.
• Does ‘Aadhaar Project’ violate
the Fundamental Right to
Privacy and Is it
‘Unconstitutional’: An Analysis
Variables under study
In order to reach a logical conclusion the variables under
study are:
• The type of information being collected from Citizens and
Residents
• The Adequate Security Measures to Protect Sensitive
Personal Information
• The Real risks posed by Hacking from Enemy Nations
The Nature of Information
Collected
1. Supported Proof of Identity (PoI) Documents having Name and
Photo
2. Supported Proof of Date of Birth (DoB) Documents
3. Supported Proof of Address (PoA) Documents having Name and
Address
4. Supported Proof of Residence (POR)
5. Documents containing Relationship details to Head of Family: PDS
Card, MNREGA Job Card, CGHS/State Government/ECHS/ESIC
Medical Card, Pension Card, Army Canteen Card, Passport, Birth
Certificate issued by Registrar of Birth.
Security Measures to Protect
Sensitive Personal Information
• “All the data is stored in encrypted form: “The data is
encrypted with the highest 2048 bit encryption, which
takes 1000s of years to crack and it is what the
government notifies it as a minimum security standard.”
PKI-2048 and AES-256, the “highest available public key
cryptography encryption” is being used, according to the
UIDAI. Hence, even if any computer or data is stolen,
without the code, it will not be decipherable.”
• Aarthi S. Anand , “India, the Aadhaar Nation: That Isn’t Legally Equipped to Handle
Its Adverse Effects”, Retrieved from< https://thewire.in/84925/aadhaar-privacy-
security-legal-framework/ 10 July 2017.
The Real risks posed by Hacking from
Enemy Nations and Dark Net
• Archana Dureja, a scientist in the Ministry of Electronics
and Information Technology, wrote on 25 March 2017:
• “There have been instances wherein personal identity or
information of residents, including Aadhaar number and
demographic information and other sensitive personal
data such as bank account details etc. collected by
various Ministries/Departments, has been reportedly
published online and is accessible through an easy
online search.
For the first time, the Modi government has officially
acknowledged that:
“personal identity of individuals, including Aadhaar number
and other sensitive information, has been leaked to the
public domain”.
• Yatish Yadav, “Government admits your Aadhaar data has been leaked”, Published:
31st March 2017 01:14 AM. Retrieved from:<
http://www.newindianexpress.com/nation/2017/mar/31/government-admits-your-
aadhaar-data-has-been-leaked-1588027.html
Conclusion
• In India the judgment of Justice K S
Puttaswamy (Retd.) and Anr. (Petitioners)
Versus Union of India and Ors.
(Respondents) SC 2017 delivered on 25
August, 2017 has made it a historic day.
Decision on Aadhaar is still pending.
• It would be declared Constitutional.
• If someone knows bank account number,
it will be wrong to assume that he/she will
be able to hack our Bank account.
Similarly if someone knows Aadhaar
number, it will be wrong to assume that
he/ she will be able to hack Aadhaar-
linked account unless secret numbers are
PIN, OTP, Passwords, Login Ids and
username are shared with.
Suggestions
1. Strong and adequate Privacy Policy
2. Awareness to Aadhar card holder
regarding precautions.
3. The legal framework on security and
privacy assurance, however, needs to be
more specific and requires significant
strengthening.
THANK YOU

More Related Content

PPT
Burden of proof ppt
PPTX
PPTX
Article 13
PDF
Anticipatory bail
PPTX
Lecture 4: Relevancy of Admissions & Confessions
PPTX
Section 13 Transfer for benefit of Unborn perosn.
Burden of proof ppt
Article 13
Anticipatory bail
Lecture 4: Relevancy of Admissions & Confessions
Section 13 Transfer for benefit of Unborn perosn.

What's hot (20)

PPTX
Death penalty in india
PPTX
Rights and duties of the mortgagor and mortgagee sheetal
PPTX
PDF
Joint Family and Coparcenary
PPTX
The hindu adoption and maintenance act, 1956
PPTX
Bharatiya Nagarik Suraksha Sanhita power.pptx
PPTX
Maternitybenefitact1961
PPTX
S. Jagannath V. Union of India.pptx
PPTX
Privacy right under it act, 2000 and under other law
PPTX
Article 32,226
PPTX
Coparcenary in Hindu Law
PPTX
public corporation.pptx
PPTX
Rights of under-trial Prisoners in India
PDF
LLB LAW NOTES ON PUBLIC INTERNATIONAL LAW
PPTX
Treaties And Its Nuts and Bolts
PPTX
Kidnapping
PDF
Tort dischagre of tort
PPTX
Hindu law
PPT
Code of Civil Procedure
PPT
IT Act 2000
Death penalty in india
Rights and duties of the mortgagor and mortgagee sheetal
Joint Family and Coparcenary
The hindu adoption and maintenance act, 1956
Bharatiya Nagarik Suraksha Sanhita power.pptx
Maternitybenefitact1961
S. Jagannath V. Union of India.pptx
Privacy right under it act, 2000 and under other law
Article 32,226
Coparcenary in Hindu Law
public corporation.pptx
Rights of under-trial Prisoners in India
LLB LAW NOTES ON PUBLIC INTERNATIONAL LAW
Treaties And Its Nuts and Bolts
Kidnapping
Tort dischagre of tort
Hindu law
Code of Civil Procedure
IT Act 2000
Ad

Similar to The Aadhaar Act, 2016 (20)

PDF
Position-on-Implications-of-Aadhaar-in-India.pdf
PPTX
Aadhaar- National Identity proof
PDF
Future of Aadhaar is "a secure and robust system ensuring complete security a...
PDF
Aadhaar Salient Features
PDF
Aadhaar_Salient Features
PPTX
India’s National Biometrics ID - Presented by Mr. Deepak Maheshwari
PPTX
Aadhaar_Act.phhhhhggghjgggggfffffgffggggptx
PPTX
Aadhaar scheme success or failure
PDF
Aadhaar Project A Critical Analysis
PDF
Dissent On Aadhaar Big Data Meets Big Brother Reetika Khera
PDF
Aadhaar: Providing proof of identity to millions
DOCX
Right to Privacy and the Aadhaar Act, 2016
PPT
R S Sharma
PPTX
Aadhaar (Identity) Innovation ideas
PPT
Aadhaar - How to get an Aadhaar card - UID India
PPTX
Uidai project (AADHAAR)
DOCX
A Dilemma of Aadhaar
PPTX
Aadhaar- complete guide to get your card
PDF
Aadhar (targeted delivery of_financial_and_other_subsidies_benefits_and_servi...
Position-on-Implications-of-Aadhaar-in-India.pdf
Aadhaar- National Identity proof
Future of Aadhaar is "a secure and robust system ensuring complete security a...
Aadhaar Salient Features
Aadhaar_Salient Features
India’s National Biometrics ID - Presented by Mr. Deepak Maheshwari
Aadhaar_Act.phhhhhggghjgggggfffffgffggggptx
Aadhaar scheme success or failure
Aadhaar Project A Critical Analysis
Dissent On Aadhaar Big Data Meets Big Brother Reetika Khera
Aadhaar: Providing proof of identity to millions
Right to Privacy and the Aadhaar Act, 2016
R S Sharma
Aadhaar (Identity) Innovation ideas
Aadhaar - How to get an Aadhaar card - UID India
Uidai project (AADHAAR)
A Dilemma of Aadhaar
Aadhaar- complete guide to get your card
Aadhar (targeted delivery of_financial_and_other_subsidies_benefits_and_servi...
Ad

Recently uploaded (20)

PPTX
DepEd 4A Gender Issues and Promoting Gender Equality.pptx
PDF
Palghar-SGupta-ScreesnShots-12Aug25.pdf The image of the voter list with phot...
PDF
The Transformative Journey of Healthcare_ Progress and Challenges Ahead by Ga...
PPTX
2.....FORMULATION OF THE RESEARCH PROBLEM.pptx
PDF
2022CH12581 - Civil Rights vs Morzak, Harrison, Chrisman et al. (Cook County,...
PPTX
Constitutional Law 2 Final Report.ppt bill of rights in under the constitution
PDF
Companies Act (1).pdf in details anlysis
PDF
devolution-handbook (1).pdf the growh of devolution from 2010
PDF
AHRP LB - OJK’s New Rules Updating Electronic Shareholders Meetings Introduci...
PDF
NRL_Legal Regulation of Forests and Wildlife.pdf
PDF
The AI & LegalTech Surge Reshaping the Indian Legal Landscape
PPTX
Philippine Politics and Governance - Lesson 10 - The Executive Branch
PPTX
lecture 5.pptx on family law notes well detailed
PPTX
UDHR & OTHER INTERNATIONAL CONVENTIONS.pptx
PDF
APPELLANT'S AMENDED BRIEF – DPW ENTERPRISES LLC & MOUNTAIN PRIME 2018 LLC v. ...
PDF
250811-FINAL-Bihar_Voter_Deletion_Analysis_Presentation.pdf
PPTX
Basic key concepts of law by Shivam Dhawal
PPTX
PPT in Consti 2 Report (Week1).pptx under the contituiton
PPTX
Financial Rehabilitation and Insolvency Act
DepEd 4A Gender Issues and Promoting Gender Equality.pptx
Palghar-SGupta-ScreesnShots-12Aug25.pdf The image of the voter list with phot...
The Transformative Journey of Healthcare_ Progress and Challenges Ahead by Ga...
2.....FORMULATION OF THE RESEARCH PROBLEM.pptx
2022CH12581 - Civil Rights vs Morzak, Harrison, Chrisman et al. (Cook County,...
Constitutional Law 2 Final Report.ppt bill of rights in under the constitution
Companies Act (1).pdf in details anlysis
devolution-handbook (1).pdf the growh of devolution from 2010
AHRP LB - OJK’s New Rules Updating Electronic Shareholders Meetings Introduci...
NRL_Legal Regulation of Forests and Wildlife.pdf
The AI & LegalTech Surge Reshaping the Indian Legal Landscape
Philippine Politics and Governance - Lesson 10 - The Executive Branch
lecture 5.pptx on family law notes well detailed
UDHR & OTHER INTERNATIONAL CONVENTIONS.pptx
APPELLANT'S AMENDED BRIEF – DPW ENTERPRISES LLC & MOUNTAIN PRIME 2018 LLC v. ...
250811-FINAL-Bihar_Voter_Deletion_Analysis_Presentation.pdf
Basic key concepts of law by Shivam Dhawal
PPT in Consti 2 Report (Week1).pptx under the contituiton
Financial Rehabilitation and Insolvency Act

The Aadhaar Act, 2016

  • 1. Privacy of Data in Aadhaar Mandate: An Analysis of the Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Act, 2016 By: Dr. Gagandeep Kaur, 3rd COLS International Conference Data Privacy: Road Ahead in Data Protection on 1-2 September, 2017 at Dehradun.
  • 2. Introduction • The ‘Aadhaar Project’ is the world’s largest national identity project, launched by the government of India in the year 2016 with the enactment of the Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Act, 2016.
  • 3. Objective • This project seeks to collect biometric and demographic data of residents and store it in a centralised database controlled by Unique Identification Authority of India (UIDAI) under the Ministry of Electronics and Information Technology. • The 12-Digit biometric Aadhaar Card meant to be voluntary or optional has become a compulsory mandate to receive the benefits of welfare schemes launched by the government from time to time.
  • 4. Personal Opinion Janamkundali • Sensitive personal information of an individual in the hands of centralised database symbolises ‘janamkundali’ of the concerned person and if the ‘janamkundali’ is being compromised the consequences would be serious. Similarly, if such database is not secure then speaking about the Privacy as a fundamental right is only a myth.
  • 5. Mini Biography of an Individual School Admission/ College/Hospitals Mobile Number Bank Account/ PAN Card Internet Connection Recently Added: Death Certificate
  • 6. Why and How Janamkundali: Analyze Benefits LPG SUBSIDY Pradhan Mantri Jan Dhan Yojana (PMJDY) Passport in 10 Days
  • 8. Why and How Janamkundali Opening of New Account “Jeevan Praman for Pensioners” and Digital Parman for pensioners SEBI
  • 9. Privacy: Captured with Consent: Optional to Compulsory
  • 10. Features of the Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Act, 2016: An Overview
  • 11. 1. Nature of the Aadhaar Act, 2016: • This Act is divided into 8 Chapters and consists of 59 sections. This Act has received the assent of President on the 25th March 2016. This legislation is “Social-Welfare Legislation” as it appears from the Preamble of this Act.
  • 12. Preamble: • It states: • “An Act to provide for, as a good governance, efficient, transparent, and targeted delivery of subsidies, benefits and services, the expenditure for which is incurred from the Consolidated Fund of India, to individuals residing in India through assigning of unique identity numbers to such individuals and for matters connected therewith or incidental thereto.”
  • 13. 2. Intra-Territorial and Extra- Territorial Application • According to Section 1 (2): This Act extends to the whole of India except the State of Jammu and Kashmir and save as otherwise provided in this Act, it also applies to any offence or contravention thereunder committed outside India by any person. According to Section 44 (1) subjects to certain conditions, the provisions of this Act also apply to any offence or contravention committed outside India by any person, irrespective of his nationality.
  • 14. 3. Aadhaar Number is not Evidence of Citizenship or Domicile • According to Section 9 of this Act the Aadhaar number or the authentication thereof does not, by itself, confer any right and proof of, citizenship or domicile in respect of an Aadhaar number holder. • Any individual who is a resident in India and satisfies the verification process laid down by the Unique Identification Authority of India (UIDAI) can apply for Aadhaar card irrespective of age and gender.
  • 15. 4. Aadhaar Number is necessary for the purpose of “Establishing Identity” through the process of “Authentication”: • According to Section 7 of the Act, the proof of Aadhaar Number is necessary for receipt of certain subsidies, benefits and services, etc. • There is a subtle difference between two terms namely ‘identity verification’ and ‘authentication’. Identity provides an answer to the question “who are you?” and authentication is a challenge-response process that provides a “proof of the claim of identity”/ or how you can say who are you?”
  • 16. 5. Unique Identification Authority of India (UIDAI) Chapter IV, Section 11-23 The Central Government establishes the Unique Identification Authority of India to be responsible for the processes of enrolment and authentication and perform such other functions assigned to it under this Act. This Authority is a body corporate having perpetual succession and a common seal, with power, to acquire, hold and dispose of property, both movable and immovable, and to contract, and to sue or be sued. The head office of the Authority is in New Delhi.
  • 17. Other Provisions • Offences: Chapter VII, Sections 34-46, Section 47 • Relationship of the Aadhaar Act, 2016 and the Information Technology Act, 2000: • Under the Aadhaar Act, 2016 Chapter VI entitled, “Protection of Information” deals with safety mechanism.
  • 18. • Does ‘Aadhaar Project’ violate the Fundamental Right to Privacy and Is it ‘Unconstitutional’: An Analysis
  • 19. Variables under study In order to reach a logical conclusion the variables under study are: • The type of information being collected from Citizens and Residents • The Adequate Security Measures to Protect Sensitive Personal Information • The Real risks posed by Hacking from Enemy Nations
  • 20. The Nature of Information Collected 1. Supported Proof of Identity (PoI) Documents having Name and Photo 2. Supported Proof of Date of Birth (DoB) Documents 3. Supported Proof of Address (PoA) Documents having Name and Address 4. Supported Proof of Residence (POR) 5. Documents containing Relationship details to Head of Family: PDS Card, MNREGA Job Card, CGHS/State Government/ECHS/ESIC Medical Card, Pension Card, Army Canteen Card, Passport, Birth Certificate issued by Registrar of Birth.
  • 21. Security Measures to Protect Sensitive Personal Information • “All the data is stored in encrypted form: “The data is encrypted with the highest 2048 bit encryption, which takes 1000s of years to crack and it is what the government notifies it as a minimum security standard.” PKI-2048 and AES-256, the “highest available public key cryptography encryption” is being used, according to the UIDAI. Hence, even if any computer or data is stolen, without the code, it will not be decipherable.” • Aarthi S. Anand , “India, the Aadhaar Nation: That Isn’t Legally Equipped to Handle Its Adverse Effects”, Retrieved from< https://thewire.in/84925/aadhaar-privacy- security-legal-framework/ 10 July 2017.
  • 22. The Real risks posed by Hacking from Enemy Nations and Dark Net • Archana Dureja, a scientist in the Ministry of Electronics and Information Technology, wrote on 25 March 2017: • “There have been instances wherein personal identity or information of residents, including Aadhaar number and demographic information and other sensitive personal data such as bank account details etc. collected by various Ministries/Departments, has been reportedly published online and is accessible through an easy online search.
  • 23. For the first time, the Modi government has officially acknowledged that: “personal identity of individuals, including Aadhaar number and other sensitive information, has been leaked to the public domain”. • Yatish Yadav, “Government admits your Aadhaar data has been leaked”, Published: 31st March 2017 01:14 AM. Retrieved from:< http://www.newindianexpress.com/nation/2017/mar/31/government-admits-your- aadhaar-data-has-been-leaked-1588027.html
  • 24. Conclusion • In India the judgment of Justice K S Puttaswamy (Retd.) and Anr. (Petitioners) Versus Union of India and Ors. (Respondents) SC 2017 delivered on 25 August, 2017 has made it a historic day. Decision on Aadhaar is still pending. • It would be declared Constitutional.
  • 25. • If someone knows bank account number, it will be wrong to assume that he/she will be able to hack our Bank account. Similarly if someone knows Aadhaar number, it will be wrong to assume that he/ she will be able to hack Aadhaar- linked account unless secret numbers are PIN, OTP, Passwords, Login Ids and username are shared with.
  • 26. Suggestions 1. Strong and adequate Privacy Policy 2. Awareness to Aadhar card holder regarding precautions. 3. The legal framework on security and privacy assurance, however, needs to be more specific and requires significant strengthening.