Aadhaar Case Study

Improved Essays
Name: Anand Nair
School: The Daly College
Delegation: Dr Karan Singh
Council: Rajya Sabha
Agenda: The Legal Basis for the Aadhaar Biometric Registration Scheme
Aadhaar is a 12-digit unique identification number issued by the Indian government to every individual resident of India. The Unique Identification Authority of India (UIDAI), which functions under the Planning Commission of India, is responsible for managing Aadhaar numbers and Aadhaar identification cards. The Aadhaar project was initiated as an attempt towards having a single, unique identification document or number that would capture all the details, including demographic and biometric information, of every resident Indian individual. Aadhaar numbers will eventually serve as the
…show more content…
In a true democracy, people’s participation is required in major policy matters. Hence, initiating the Aadhaar project first and then plan to put in place a legal framework, appears to be a device to pre-empt informed debate in the process of decision making. In India, the inability to prove one’s identity is one of the biggest barriers that prevent the poor from accessing benefits and subsidies. Both public and private agencies in India require proof of identity before providing services or benefits to those living in India. Until the introduction of the Aadhaar program, there was no verifiable identity number program that both residents and agencies could use. As a result, every time Indian residents tried to receive benefits, they had to undergo an arduous personal identification process. What made it even more difficult was that the various service providers had different …show more content…
Future plans call for Aadhaar to be used for digital signatures, electronic documents and digital locker services. Also, Aadhaar could also be used for college/university certificates, as well as credit registries. The Aadhaar identity platform and Aadhaar-enabled applications are helping a billion people in India to participate in the digital economy, and benefit from government, public and private sector services that are tailored to

Related Documents

  • Improved Essays

    5. Physical Security Devices a) Employee Identification Badges / Smart Cards: The company should provide employees with picture identification badges with a smart chip and magnetic strip. The company will provide unique public-key infrastructure (PKI) certificates on the employee’s smart chip, which will allow user access to the company network. Radio Frequency Identification (RFID) capable cards should not be used. While they are more convenient for access control than swipe cards, an attacker can scan and capture the identification information provided by the RFID chip without having to have any physical contact with the ID card, and use that information to gain access [43].…

    • 617 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Task 2 (P2) Describe the following physical security measures and explain how they may be used to help keep systems secure. • Locks Locks are physical security measure that can be used in different aspect within the company. The locks can be put on the door to avoid people who not supposed be in the building or employees who not supposed be on that room. There are different types of locks that can be used within the company such as Password locks that be put on the doors, this will avoid anyone coming to room without password identification to enter the room. Also the company can use ID IDENIFACTION on the door so any employees comes have to use their ID in order to enter the building, this will…

    • 806 Words
    • 4 Pages
    Decent Essays
  • Improved Essays

    AAIP Case Study

    • 367 Words
    • 2 Pages

    AAIP wants to take a moment to thank you. You are making a difference. Your role in a healthy future for Native Americans is creating change. AAIP wishes to partner with you in reaching its mission, “To pursue excellence in Native American healthcare by promoting education in the medical disciplines, honoring traditional healing principles and restoring the balance of mind, body and spirit”. The Annual Meeting will be held on July 26 - 29th, 2018 at the beautiful We-Ko-Pa Resort & Conference Center in Scottsdale, Arizona.…

    • 367 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    As a result, deployments are rapid, reducing implementation inefficiencies and improving return on investment and IAM is also very effective in providing out-of-box compliance with HIPAA Security Requirements which ensures compliance by providing user-centric tracking across the enterprise end-points combined with powerful reporting capabilities and the ability to automate sign-off requirements. While so many medical electronic record are being created for good reason, IAM and user provisioning solution for integration and connecting multiple system while limiting an access to the appropriate people to access patient ’s records, health care providers can provide a better care experience. And when records are digital, providers improve operational…

    • 106 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Vast amounts of voters have been turned away due to not having the “sufficient identification” to appease the polling workers. In Texas alone, nearly 1.4 million people were disenfranchised by the new voting laws (Rhodan 1). It is baffling that the disenfranchisement of millions is noted as a worthy and justifiable result of “solving” a problem that does not exist. Not only are people being denied the right to vote, but they are also being purged off of voter rolls. Such is the case in Virginia, where 38,000 unsuspecting individuals were thrown off the register due to the new laws (Liebelson 1).…

    • 1456 Words
    • 6 Pages
    Improved Essays
  • Superior Essays

    Advance Health Informatics Problem Statement Technology has grown at such a rapid pace that no aspect of human lives is untouched by it. Every other sector uses technology for their advancement and to improve the customer experience. One such sector where we can use technology and get unprecedented results would be the health care. It would be possible to better public health and lower the expenses by integrating all the health records of the patients within a single secure network. 5…

    • 1034 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    The Future of Policing in America The wrong doers won’t stand a chance when in future the police force will become all technically sound and intelligent. When they will be able to find the culprits from the suspects within no time, when chasing the track to robberies and controlling angry crowd won’t be any problem. Technologies like the body cameras and other tracking devices are already a part of enhancements the police department already owns and uses. They help a great deal in ensuring flawless operation management.…

    • 1028 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    eHealth, the future of health care system, is gaining popularity in quick succession in the context of Australia. The core of eHealth is the Electronic Health Record (eHR) system which functions to record patient health information. In the era of the current communication networks, healthcare systems should utilise the advantages of storing, fetching and distributing the information between different healthcare stakeholders efficiently. To make the system secure in respect to the access to eHRs, the Personally Controlled Electronic Health Record (PCEHR) has recently been proposed. Despite the claim of PCEHR being controlled by the patients, vulnerabilities of disclosing credentials by the healthcare professionals and system operators are still present in the system.…

    • 484 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Immigrants Migration

    • 548 Words
    • 3 Pages

    Immigrants moving to America faced many hardships. As they started arriving on US shores they knew it would be like they were starting over again. When immigrants showed up they were taken to Ellis island. Then they were inspected for medical purposes and background checks. They had to take a test to be accepted into America.…

    • 548 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Likely implications: Amnesty international have certain likely implications that can occur via the use of this IoT framework. The major issue is security, with the amount of internet-connected devices are lacking in rudimentary cyber security procedures that it's likely to hack them in as little as three minutes, allowing cyber attackers to steal data (Palmer, 2016). This is a huge issue for any company as well as Amnesty International. This is because they carry so much data form their donors which contain personal information including credit card details as well as home addresses. This personal information needs to be protected so that a cyber attacker cannot hack them and get a hold of this information.…

    • 217 Words
    • 1 Pages
    Decent Essays
  • Superior Essays

    He declares that “genuine improvements in identification … have made it harder for illegal immigrants to live undetected in the United States” (381). In accordance to this, he names a few. Employment verification (e-verify) is a system that verifies the identity of employee. Some states have imposed this by making it a requirement in order to conserve a business licence. Other measures are fingerprint check, this seeks any criminal and homeland security record and finalizing with border control, a fenced barrier that is supported by cameras, sensors and technology.…

    • 1076 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    States across the country are passing new voter ID laws. These laws happen to be supported strongly by Republicans and disapproved strongly by Democrats. The big question seems to be, does the new laws matter? The Indiana Supreme Court don’t think it matters.…

    • 712 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Public key infrastructure is the combination of software, encryption technologies and services that enables enterprises to maintain the security of their business transactions on over the internet. It integrates digital certificates, public key cryptography and certification authorities into a complete enterprise-wide network security architecture. It is also defined as a set of roles, policies and procedures needed to create, revoke digital certificates and manage public-key encryption. It is used to bind public keys to entities, enables other entities to verify public key bindings, and provides the services needed for ongoing management of keys in a distributed system [1]. Public key infrastructure allows one to do business over the internet…

    • 968 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Biometric Authentication

    • 685 Words
    • 3 Pages

    For years, biometric authentication has been seen in movies and television shows as a purely fictional piece of technology. However, in the past two decades, biometric authentication has become so common is it everywhere from phones, to computers, and even national digital based identification systems. There are still concerns about the privacy that this type of identification may lack. There are three major categories of authentication: what you know, what you have, and what you are. (See Figure 1).…

    • 685 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Abstract: This paper to create Health Care Information’s (HCIs) that are efficient and secure. HCIs can be stored in a third party cloud. The patients, who have created their profiles in the system, make their own HCIs, mentioning their disease, symptoms and other sufficient details. The doctors who are also a part of the system attend to the queries of the patients that have been updated in the cloud. The doctors’ prescription is updated by the admin of the system, whereas the cloud admin has no access to the data.…

    • 1250 Words
    • 5 Pages
    Improved Essays