Vous êtes sur la page 1sur 23
UNIQUE IDENTIFICATION NUMBER Implications and Challenges 11/05/15 ISIM 1

UNIQUE IDENTIFICATION NUMBER

Implications and Challenges

Presentation Agenda Presentation Agenda  UID – What, Why & How  Features  General Challenges
Presentation Agenda Presentation Agenda  UID – What, Why & How  Features  General Challenges

Presentation Agenda

Presentation

Agenda

UID – What, Why & How Features General Challenges General implications and implications on cyber world UID and IT Act 2000 Concerns Conclusion

it it means WHAT ? ? PURPOSE  A unique identification number (UID) to all
it it means WHAT ? ? PURPOSE  A unique identification number (UID) to all

WHAT itit means

WHAT

means ??

PURPOSE

A unique identification number (UID) to all Indian residents that is

robust enough to eliminate duplicate and fake identities

can be verified and authenticated in an easy, cost effective way

it it needs? WHY Any identity Any identity problems?? problems?? inability to prove identity is
it it needs? WHY Any identity Any identity problems?? problems?? inability to prove identity is

WHY itit needs?

WHY

needs?

Any identity

Any

identity

problems?? problems??

inability to prove identity is one of the biggest problem which cause the following

preventing the poor from accessing benefits and subsidies.

Undue benefits to wrong persons

Public as well as private sector agencies struggling to fix identity before providing individuals with services.

Individual are compelled to undergo a full cycle of identity verification for each and every cases

it it needs? WHY Any benefits Any benefits out out of of identifying ? ?
it it needs? WHY Any benefits Any benefits out out of of identifying ? ?

WHY itit needs?

WHY

needs?

Any benefits

Any

benefits out

out of

of

identifying

identifying ??

transformational in eliminating fraud and duplicate identities

need to prove identity only once will bring down transaction costs for the poor

transform the delivery of social welfare programs by reaching it in right hands

will Who make it it ? ? The Unique Identification Authority of India (UIDAI), attached
will Who make it it ? ? The Unique Identification Authority of India (UIDAI), attached

Who will

Who

will make

make itit ??

The Unique Identification Authority of India (UIDAI), attached to the Planning Commission.

(web site : http://uidai.gov.in/ )

it it works? How  Resident approach enrolling agency with supporting documents .( Photo and
it it works? How  Resident approach enrolling agency with supporting documents .( Photo and

How itit works?

How

works?

Resident approach enrolling agency with supporting documents .( Photo and biometrics captured)

The enrolling agency to the registrar who will pass this on to the UID database.

The system will engage in a de- duplication exercise.

If the individual is not already in the database, a UID number will be issued otherwise rejected.

How authentication How authentication works? works?  online authentication.  In this, the biometric of the
How authentication How authentication works? works?  online authentication.  In this, the biometric of the

How authentication

How

authentication

works?

works?

online authentication.

In this, the biometric of the person will be matched online with the biometric in the system(a one is to one match will be run).

Only authentication, no extra data about the residents.

Features of Features of the the UIDAI UIDAI model model  The UID number will only
Features of Features of the the UIDAI UIDAI model model  The UID number will only

Features of

Features

of the

the UIDAI

UIDAI

model

model

The UID number will only provide identity

The UID will prove identity, not citizenship

A pro-poor approach

Enrolment of residents with proper verification

A partnership model

The UIDAI will emphasize a flexible model for Registrars

Features of Features of the the UIDAI UIDAI model model • Enrolment will not be mandated
Features of Features of the the UIDAI UIDAI model model • Enrolment will not be mandated

Features of

Features

of the

the UIDAI

UIDAI

model

model

Enrolment will not be mandated The UIDAI will issue a number, not a card The number will not contain intelligence The Authority will only collect basic information on the resident Process to ensure no duplicates Online authentication The UIDAI will not share resident data Technology will undergird the UIDAI system

General Challenges General Challenges • Addressing challenges of scale ... • Enrollment process – enrol the
General Challenges General Challenges • Addressing challenges of scale ... • Enrollment process – enrol the

General Challenges

General

Challenges

Addressing challenges of scale ... Enrollment process

enrol the poor and hard to reach groups Tracking enrolments across the country

Capturing biometrics Children's biometrics Recording deaths in the UID system Authentication Technology architecture Legal framework Data security and fraud Project risk

11/05/15 ISIM

11

Implications Implications • For residents: ◦ The UID will become the single source of identity verification.
Implications Implications • For residents: ◦ The UID will become the single source of identity verification.

Implications

Implications

For residents:

The UID will become the single source of identity verification.

It will transform all of them into "Netizens" with a "Digital ID" maintained in the data base of the UIDAI

For Authorities & Agencies

Can ensure the identity before delivering services

For Government

Eliminating duplication under various schemes is expected to save the government exchequer upwards of Rs. 20,000 crores a year

on on cyber Implications world world  Can be made it compulsory for having a
on on cyber Implications world world  Can be made it compulsory for having a

Implications onon cyber

Implications

cyber

world

world

Can be made it compulsory for having a UID for accessing any cyber services. This will benefit in two ways

Prevention of cyber crime Aid for investigation of cyber crime

See his See his words… words… “ When we have the full coverage, that is once
See his See his words… words… “ When we have the full coverage, that is once

See his

See

his words…

words…

When we have the full coverage, that is once everybody has the number, which may take number of years, it will help in identification of a person. At that point if somebody doesn't have UID that would itself become an issue. And more appropriately under the then legal framework you can also track somebody (with help of the UID number). So I think it would benefit security.

it it will How help in in prevention of prevention of cybercrime cybercrime • Once
it it will How help in in prevention of prevention of cybercrime cybercrime • Once

How itit will

How

will help

help inin

prevention of

prevention

of cybercrime

cybercrime

Once identity become compulsory ,people would be feared of being caught.

Elimination of fraud identity

Identification is possible through biometric enabled mobile phone. In case of doubt authentication can be made

Identification process is easy for public service providers eg:- cyber cafe, mobile phone service providers etc.

it it will How help in in Investigation of Investigation of cybercrime cybercrime  When
it it will How help in in Investigation of Investigation of cybercrime cybercrime  When

How itit will

How

will help

help inin

Investigation of

Investigation

of cybercrime

cybercrime

When ID become compulsory for digital services, gathering valid proof will become easy.

and UID IT IT Act  UID will be "Information Residing Inside a Computer Resource"
and UID IT IT Act  UID will be "Information Residing Inside a Computer Resource"

UID and

UID

and ITIT Act

Act

UID will be "Information Residing Inside a Computer Resource" and is subject to the provisions of Information Technology Act 2000 (ITA 2000/08)

Any alteration of UID information which is unauthorised and causes wrongful harm is therefore an "offence" under Section 66, 72, 72A of ITA 2000/8 and is also subject to payment of compensation under Section 43 and 43A ITA 2000/8.

and UID IT IT Act Contd. Contd.  The UID authority is also subject to
and UID IT IT Act Contd. Contd.  The UID authority is also subject to

UID and

UID

and ITIT Act

Act

Contd.

Contd.

The UID authority is also subject to the provisions of Sec 67C since the ultimate owner of the data is that of the data subject and the UIDAI is only an "Intermediary" as per the provisions of ITA 2000/8

Maintenance of "Inaccurate Data" leading to wrongful loss would constitute lack of "Due Diligence" and could make the UIDAI liable.

Proper legal frame work should be enacted

11/05/15 ISIM

18


 Concerns Concerns UIDAI is constituted before finalizing Authority & Legal frame work “ Framework –

Concerns

Concerns

UIDAI is constituted before finalizing Authority & Legal frame work

Framework – The UIDAI would be set up under a Statutory authority. The UIDAI is in the process of drafting a legislation for this purpose”-

UIDAI website

Safe guard against Privacy invasion ? Legal and Technological safeguard against possible misuse, hacking etc. ? Answer to a question regarding security

Nilekani replied

“"That is a very legitimate concern. We are looking at the design as to how to make it secure,"

Interview with Interview with Nilekani Nilekani 11/05/15 ISIM 20
Interview with Interview with Nilekani Nilekani 11/05/15 ISIM 20

Interview with

Interview

with Nilekani

Nilekani

Conclusion Conclusion  We hope ,one of the most ambitious project of India will succeed. 
Conclusion Conclusion  We hope ,one of the most ambitious project of India will succeed. 

Conclusion

Conclusion

We hope ,one of the most ambitious project of India will succeed.

If administer properly, it can eliminate many social evils including cyber crimes and track the offenders.

We wish all the best to Nilekani and his team.

References References  http://uidai.gov.in/  http://www.naavi.org:80/cl_editorial_09/ed it_june_27_s_national_id.htm  http://bit.ly/8RAiKP  http://www.youtube.com/watch? v=tCp6UKA4YKM  http://cyberlawsinindia.blogspot.com/2009 /09/is-unique-identification-authority- of.html
References References  http://uidai.gov.in/  http://www.naavi.org:80/cl_editorial_09/ed it_june_27_s_national_id.htm  http://bit.ly/8RAiKP  http://www.youtube.com/watch? v=tCp6UKA4YKM  http://cyberlawsinindia.blogspot.com/2009 /09/is-unique-identification-authority- of.html

References

References

http://uidai.gov.in/ http://www.naavi.org:80/cl_editorial_09/ed

it_june_27_s_national_id.htm

http://bit.ly/8RAiKP

http://www.youtube.com/watch?

v=tCp6UKA4YKM

http://cyberlawsinindia.blogspot.com/2009

/09/is-unique-identification-authority-

of.html

http://economictimes.indiatimes.com/infot

ech/software/UID-number-could-help-

improve-national-security-

Nilekani/articleshow/5314881.cms

Thank you Questions please? 11/05/15 ISIM 23
Thank you Questions please? 11/05/15 ISIM 23

Thank you

Questions

please?