A Failure to “Do No Harm” -- India’s Aadhaar biometric ID program and its inability to protect privacy in relation to measures in Europe and the U.S.

@article{Dixon2017AFT,
  title={A Failure to “Do No Harm” -- India’s Aadhaar biometric ID program and its inability to protect privacy in relation to measures in Europe and the U.S.},
  author={Pam Dixon},
  journal={Health and Technology},
  year={2017},
  volume={7},
  pages={539 - 567}
}
  • Pam Dixon
  • Published 2017
  • Business, Medicine
  • Health and Technology
It is important that digital biometric identity systems be used by governments with a Do no Harm mandate, and the establishment of regulatory, enforcement and restorative frameworks ensuring data protection and privacy needs to transpire prior to the implementation of technological programs and services. However, when, and where large government bureaucracies are involved, the proper planning and execution of public service programs very often result in ungainly outcomes, and are often… Expand
New Principles for Governing Aadhaar: Improving Access and Inclusion, Privacy, Security, and Identity Management
Legal identification for all by 2030 is a global strategic goal under the UN Sustainable Development Goals (SDG 16.9). Legal identification is perceived as a critical element in increasing people’sExpand
Survey of Security and Privacy Issues on Biometric System
TLDR
It is concluded that there must be some techniques or protocols that are based on the signal processing and the cryptography mechanism that would protect the biometric data from the intruders. Expand
‘Without an Aadhaar card nothing could be done’: a mixed methods study of biometric identification and birth registration for children in Varanasi, India
TLDR
It is suggested that promoting Aadhaar enrollment over birth registration undermines the critical role of birth registration in providing the state with comprehensive and actionable public health data. Expand
A Crypto-Blocking Approach for the Security Paradigm for Aadhar Towards Privacy Preservation on Cloud Infrastructure
TLDR
A security model namely ECrypto-AaDhaar based on the cryptography approach synchronous to the cloud architecture is proposed, which aims to ensure the highest level of data protection as well as privacy preservation of the Aadhar card propagation through a network. Expand
Protecting Mental Health Data Privacy in India: The Case of Data Linkage With Aadhaar
TLDR
This article provides guidelines for mental health policy makers, professionals, technologists, and related health system stakeholders to protect the individual’s data privacy based on Global Data Protection Regulation and other data privacy regulations. Expand
Sovereignty, privacy, and ethics in blockchain-based identity management systems
  • Georgy Ishmaev
  • Medicine, Sociology
  • Ethics and information technology
  • 2020
TLDR
It is argued that ‘self-sovereignty' in this context can be understood as the concept of individual control over identity relevant private data, capacity to choose where such data is stored, and the ability to provide it to those who need to validate it. Expand
Realizing digital identity in government: Prioritizing design and implementation objectives for Aadhaar in India
TLDR
The study identified uniqueness, security and privacy as the top priority goals in an identity system and is 11 times more crucial than scalability which is identified to be of lesser priority. Expand
Big Data and the Illusion of Choice: Comparing the Evolution of India’s Aadhaar and China’s Social Credit System as Technosocial Discourses
India and China have launched enormous projects aimed at collecting vital personal information regarding their billion-plus populations and building the world’s biggest data sets in the process.Expand
Prioritizing Digital Identity Goals - The Case Study of Aadhaar in India
TLDR
This study could be taken as a starting point by other nations that are desirous of having a similar biometric identity program for its citizens and identified nine primary goals with uniqueness, privacy and security as the high priority goals and scalability and future-proofing of technology as low priority goals. Expand
Development of a Mobile, Self-Sovereign Identity Approach for Facility Birth Registration in Kenya
TLDR
A smartphone-based prototype system that allows interaction between families and health workers to carry out the initial steps of birth registration and linkage of mothers-baby pairs in an urban Kenyan setting using verifiable credentials, decentralized identifiers, and the emerging standards for their implementation in identity systems are described. Expand
...
1
2
3
4
...

References

SHOWING 1-10 OF 80 REFERENCES
A Briefing Document on the National Identification Authority of India Bill, 2010: Questions of Constitutionality & Legislative Options Open to Parliament
The National Identification Authority of India Bill, 2010 was laid before Parliament on the 8th of November, 2010 by the Prime Minister of India. The Bill seeks to create a regulatory structure toExpand
Curbing Leakage in Public Programs with Biometric Identification Systems: Evidence from India's Fuel Subsidies
In many developing countries, pervasive corruption and evasion often undermine the provision of public programs. I focus on India where a large universal program provides USD 8 billion in fuelExpand
Technology, Security and Privacy: The Fear of Frankenstein, the Mythology of Privacy and the Lessons of King Ludd
This article suggests that the current public debate that pits security and privacy as dichotomous rivals to be traded one for another in a zero-sum game is based on a general misunderstanding andExpand
Regulating Privacy by Design
Privacy regulators are embracing privacy by design as never before. This is the idea that “building in” privacy throughout the design and development of products and services achieves better resultsExpand
Privacy and Regulatory Innovation : Moving Beyond Voluntary Codes
According to its many critics, privacy selfregulation is a failure. It suffers from an overall lack of transparency, weak or incomplete realization of the Fair Information Practice Principles,Expand
Should the FTC Kill the Password? The Case for Better Authentication
Data security breaches are occurring at an alarming frequency, and one of the main causes involves problems authenticating the identity of account holders. The most common approach to authenticationExpand
A Study on Biometric for Single Sign on Health Care Security System
A Health System consists of all organizations, people and actions whose primary intent is to promote, restore or maintain health. This includes efforts to influence the determinants of health as wellExpand
Privacy in Context - Technology, Policy, and the Integrity of Social Life
TLDR
Arguing that privacy concerns should not be limited solely to concern about control over personal information, Helen Nissenbaum counters that information ought to be distributed and protected according to norms governing distinct social context, be it workplace, health care, schools, or among family and friends. Expand
Obscurity and Privacy
‘Obscurity’ is a distinctive concept in the privacy literature that has recently been gaining attention due to increasing frustration with the theoretical and practical limits of traditional privacyExpand
Global Data Privacy Laws: 89 Countries, and Accelerating
It is almost forty years since Sweden’s Data Act 1973 was the first comprehensive national data privacy law, and was the first to implement what we can now recognize as a basic set of data protectionExpand
...
1
2
3
4
5
...