A Failure to “Do No Harm” -- India’s Aadhaar biometric ID program and its inability to protect privacy in relation to measures in Europe and the U.S.

@article{Dixon2017AFT,
  title={A Failure to “Do No Harm” -- India’s Aadhaar biometric ID program and its inability to protect privacy in relation to measures in Europe and the U.S.},
  author={Pam Dixon},
  journal={Health and Technology},
  year={2017},
  volume={7},
  pages={539 - 567}
}
  • Pam Dixon
  • Published 14 June 2017
  • Computer Science
  • Health and Technology
It is important that digital biometric identity systems be used by governments with a Do no Harm mandate, and the establishment of regulatory, enforcement and restorative frameworks ensuring data protection and privacy needs to transpire prior to the implementation of technological programs and services. However, when, and where large government bureaucracies are involved, the proper planning and execution of public service programs very often result in ungainly outcomes, and are often… 

New Principles for Governing Aadhaar: Improving Access and Inclusion, Privacy, Security, and Identity Management

Legal identification for all by 2030 is a global strategic goal under the UN Sustainable Development Goals (SDG 16.9). Legal identification is perceived as a critical element in increasing people’s

Survey of Security and Privacy Issues on Biometric System

TLDR
It is concluded that there must be some techniques or protocols that are based on the signal processing and the cryptography mechanism that would protect the biometric data from the intruders.

‘Without an Aadhaar card nothing could be done’: a mixed methods study of biometric identification and birth registration for children in Varanasi, India

TLDR
It is suggested that promoting Aadhaar enrollment over birth registration undermines the critical role of birth registration in providing the state with comprehensive and actionable public health data.

A Crypto-Blocking Approach for the Security Paradigm for Aadhar Towards Privacy Preservation on Cloud Infrastructure

TLDR
A security model namely ECrypto-AaDhaar based on the cryptography approach synchronous to the cloud architecture is proposed, which aims to ensure the highest level of data protection as well as privacy preservation of the Aadhar card propagation through a network.

Protecting Mental Health Data Privacy in India: The Case of Data Linkage With Aadhaar

TLDR
This article provides guidelines for mental health policy makers, professionals, technologists, and related health system stakeholders to protect the individual’s data privacy based on Global Data Protection Regulation and other data privacy regulations.

Prioritizing Digital Identity Goals - The Case Study of Aadhaar in India

TLDR
This study could be taken as a starting point by other nations that are desirous of having a similar biometric identity program for its citizens and identified nine primary goals with uniqueness, privacy and security as the high priority goals and scalability and future-proofing of technology as low priority goals.

Development of a Mobile, Self-Sovereign Identity Approach for Facility Birth Registration in Kenya

TLDR
A smartphone-based prototype system that allows interaction between families and health workers to carry out the initial steps of birth registration and linkage of mothers-baby pairs in an urban Kenyan setting using verifiable credentials, decentralized identifiers, and the emerging standards for their implementation in identity systems are described.

Design Choices for Central Bank Digital Currency: Policy and Technical Considerations

TLDR
This paper enumerates the fundamental technical design challenges facing CBDC designers, with a particular focus on performance, privacy, and security, and presents a vision of the rich range of functionalities and use cases that a well-designed CBDC platform could ultimately offer users.

Digital Development: An Interpretive Policy Analysis of Privacy and Social Inclusion in World Bank Technology Projects

Despite the growing priority to leverage information and communications technology as a tool of development (ICT4D), governments and multilateral institutions have yet to arrive at a global consensus

References

SHOWING 1-10 OF 80 REFERENCES

A Briefing Document on the National Identification Authority of India Bill, 2010: Questions of Constitutionality & Legislative Options Open to Parliament

The National Identification Authority of India Bill, 2010 was laid before Parliament on the 8th of November, 2010 by the Prime Minister of India. The Bill seeks to create a regulatory structure to

Curbing Leakage in Public Programs with Biometric Identification Systems: Evidence from India's Fuel Subsidies

In many developing countries, pervasive corruption and evasion often undermine the provision of public programs. I focus on India where a large universal program provides USD 8 billion in fuel

Technology, Security and Privacy: The Fear of Frankenstein, the Mythology of Privacy and the Lessons of King Ludd

TLDR
Civil liberties can best be protected by employing value sensitive technology development strategies in conjunction with policy implementations, not by opposing technological developments or seeking to control the use of particular technologies or techniques after the fact through law alone.

Regulating Privacy by Design

TLDR
The meaning of privacy by design is clarified and how privacy regulators might develop appropriate incentives to offset the certain economic costs and uncertain privacy benefits of this new approach is suggested.

Privacy and Regulatory Innovation : Moving Beyond Voluntary Codes

According to its many critics, privacy selfregulation is a failure. It suffers from an overall lack of transparency, weak or incomplete realization of the Fair Information Practice Principles,

Should the FTC Kill the Password? The Case for Better Authentication

TLDR
It is argued that in certain circumstances, the FTC should start requiring better methods of authentication than passwords alone, and the foundation in current FTC jurisprudence for such action is explored.

A Study on Biometric for Single Sign on Health Care Security System

TLDR
In this paper, the authors are interested to review about the different biometric techniques used in health care systems.

Privacy in Context - Technology, Policy, and the Integrity of Social Life

TLDR
Arguing that privacy concerns should not be limited solely to concern about control over personal information, Helen Nissenbaum counters that information ought to be distributed and protected according to norms governing distinct social context, be it workplace, health care, schools, or among family and friends.

Obscurity and Privacy

‘Obscurity’ is a distinctive concept in the privacy literature that has recently been gaining attention due to increasing frustration with the theoretical and practical limits of traditional privacy

Global Data Privacy Laws: 89 Countries, and Accelerating

It is almost forty years since Sweden’s Data Act 1973 was the first comprehensive national data privacy law, and was the first to implement what we can now recognize as a basic set of data protection
...