Weitere Artikel dieser Ausgabe durch Wischen aufrufen
The Author researched the Aadhaar from 2010 to 2014, which involved repeated trips to India, and the accumulation of nearly one year of total fieldwork. Observations presented herein, are the by-products of those efforts.
This article is part of the Topical Collection on Privacy and Security of Medical Information
It is important that digital biometric identity systems be used by governments with a Do no Harm mandate, and the establishment of regulatory, enforcement and restorative frameworks ensuring data protection and privacy needs to transpire prior to the implementation of technological programs and services. However, when, and where large government bureaucracies are involved, the proper planning and execution of public service programs very often result in ungainly outcomes, and are often qualitatively not guaranteeable. Several important factors, such as the strength of the political and legal systems, may affect such cases as the implementation of a national digital identity system. Digital identity policy development, as well as technical deployment of biometric technologies and enrollment processes, may all differ markedly, and could depend in some part at least, on the overall economic development of the country in question, or political jurisdiction, among other factors. This article focuses on the Republic of India’s national digital biometric identity system, the Aadhaar, for its development, data protection and privacy policies, and impact. Two additional political jurisdictions, the European Union, and the United States are also situationally analyzed as they may be germane to data protection and privacy policies originated to safeguard biometric identities. Since biometrics are foundational elements in modern digital identity systems, expression of data protection policies that orient and direct how biometrics are to be utilized as unique identifiers are the focus of this analysis. As more of the world’s economies create and elaborate capacities, capabilities and functionalities within their respective digital ambits, it is not enough to simply install suitable digital identity technologies; much, much more - is durably required. For example, both vigorous and descriptive means of data protection should be well situated within any jurisdictionally relevant deployment area, prior to in-field deployment of digital identity technologies. Toxic mixes of knowledge insufficiencies, institutional naïveté, political tomfoolery, cloddish logical constructs, and bureaucratic expediency must never overrun fundamental protections for human autonomy, civil liberties, data protection, and privacy.
World Bank Open Data. Identification for development global dataset, January 2016. Available at: http://data.worldbank.org/data-catalog/id4d-dataset.
Atick J.: Digital identity: the essential guide, ID4Africa Identity Forum. 2016:1–3. Available at: http://www.id4africa.com/prev/img/Digital_Identity_The_Essential_Guide.pdf.
Van Brakel R, Van Kerckhoven, X. The emergence of the identity card in Belgium and its colonies (November 10, 2013). pp. 170–185.
Boersma K, van Brakel R, Fonio C, Wagenaar P. Histories of state surveillance in Europe and beyond. London: Routledge; 2014.
The National Identification Authority of India Bill 2010, PRS, Available at: http://www.prsindia.org/uploads/media/UID/The%20National%20Identification%20Authority%20of%20India%20Bill,%202010.pdf.
Biometric Institute. Privacy guidelines, 2016. Available at: http://www.biometricsinstitute.org.
Barnes Jeffery G. The fingerprint sourcebook, CJ 225321, 2010. National criminal justice reference service. Available at: https://www.ncjrs.gov/pdffiles1/nij/225321.pdf.
Manimekalai S. A study on biometric for single sign on health care security system. Int J Comput Sci Mob Comput. 2014;3(6):79–87.
Abdullah M, Alhijily S. Biometric in healthcare security system, face - Iris fusion system. Acad Res Int. 2011;3(1):11–9.
Solove DJ, Hartzog W. Should the FTC kill the password? The case for better authentication (July 27, 2015).
Christian P. The soft cage: surveillance in America from slavery to the war on terror. New York: Basic Books; 2003.
Wang Y, Jiang X, Zhang D. Conference paper. Sixth International Conference on Graphic and Image Processing (ICGIP 2014).
Yuxi P, Luuk S, Veldhuis R. Designing a low-resolution face recognition system for long-range surveillance. 2016 International Conference of the Biometrics Special Interest Group (BIOSIG).
Selinger E, Hartzog, W. Obscurity and privacy (May 21, 2014). Routledge Companion to Philosophy of Technology (Joseph Pitt & Ashley Shew, eds., 2014). Available at SSRN: https://ssrn.com/abstract=2439866.
Kaur P, Neeru N. A hybrid approach for secure biometric authentication using fusion of iris and ear . International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 5, Issue 8 August 2015. Available at: http://ijarcsse.com/docs/papers/Volume_5/8_August2015/V5I8-0273.pdf.
Dustin Charles, MPH; Meghan Gabriel, PhD; Talisha Searcy, MPA, MA. Adoption of electronic health record systems among u.s. non- federal acute care hospitals: 2008–2014, ONC Data Brief No. 23, April 2015. Office of the National Coordinator, Health Information Technology. Available at: https://www.healthit.gov/sites/default/files/data-brief/2014HospitalAdoptionDataBrief.pdf.
Nilekani N, Shah V. Rebooting India, Penguin Books, 2016.
Vaishnav M. When crime pays: money and muscle in indian politics. New Haven: Yale University Press; 2017.
Wilson JQ. Bureaucracy: what government agencies do and why they do it. New York: Basic Books; 1991.
Mukerjee S. There is no accountability for wrongdoing or failure in indian politics, The wire, July 26, 2016. Available at: https://thewire.in/53768/nobody-appears-to-be-indispensable-or-accountable-in-indian-politics/.
Shah R. Is your sensitive data like Aadhaar, PAN card details safe with the government? DNA daily news and analysis, March 23, 2017. Available at: http://www.dnaindia.com/money/report-is-your-sensitive-data-like-aadhaar-pan-card-safe-with-the-government-2364851.
Reddy P, Sengupta A, Ambast S, Chandrashekaran S, Natarajan S, Hallikeri V, Krishnaprasad KV, Sai Vinod N. A briefing document on the national identification authority of india bill, 2010: questions of constitutionality & legislative options open to parliament (January 26, 2011). Available at SSRN: https://ssrn.com/abstract=1759719 or doi: 10.2139/ssrn.1759719.
Ramanathan U. The law needs to catch up to aadhaar, but not in the way jaitley is promising, the wire. March 3, 2016. Available at: http://thewire.in/23543/the-law-needs-to-catch-up-with-aadhaar-but-not-in-the-way-jaitley-is-promising/.
Hoofnagle CJ. The origin of fair information practices: archive of the meetings of the secretary's advisory committee on automated personal data systems (SACAPDS) (2014), Available at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2466418.
Jinoy Jose P. Let’s not push for Aadhaar. The Hindu Businessline. March 14, 2017. Available at: http://www.thehindubusinessline.com/opinion/columns/from-the-viewsroom/lets-not-push-for-aadhaar/article9583822.ece.
Ramanathan U. A Shaky Aadhaar, Indian Express, March 30, 2017. Available at: http://indianexpress.com/article/opinion/columns/Aadhaar-card-uid-supreme-court-a-shaky-aadhaar-4591671/.
Ramanathan U. Blundering along, dangerously, Frontline India, April 28, 2017. Available at: http://www.frontline.in/cover-story/blundering-along-dangerously/article9629188.ece?homepage=true.
Roy C, Kalra H. The information technology rules, 2011, PRS Legislative Research, Center for Policy Research. August 12, 2011. Available at: http://www.prsindia.org/uploads/media/IT%20Rules/IT%20Rules%20and%20Regulations%20Brief%202011.pdf.
Eherbeck T. Could India’s unique ID be a financial inclusion game changer? Consultative Group to Assist the Poor (CGAP), Feb. 5. 2014. Available at: http://www.cgap.org/blog/could-india’s-unique-id-be-financial-inclusion-game-changer.
Banerjee, SS. From cash to digital transfers in India: the story so far . CGAP Brief, Consultative Group to Assist the Poor (CGAP), Washington, DC 2015 Available at: http://www.cgap.org/sites/default/files/Brief-From -Cash-to-Digital-Transfers-in-India-Feb-2015_0.pdf.
Barnwal P. Curbing leakage in public programs with biometric identification systems: evidence from India’s fuel subsidies, 2015. PhD Thesis, Columbia University School of International and Public Affairs, New York. Available at: http://www.ldeo.columbia.edu/~avangeen/publications/documents/Barnwal%202015_%20PhD%20Disseration%20draftv2.pdf.
Deshmane A. Identity crisis, Frontline India, April 28, 2017. Available at: http://www.frontline.in/cover-story/identity-crisis/article9630345.ece?homepage=true.
Medine D. India stack: major potential, but mind the risks, CGAP, April 10, 2017. Available at: http://www.cgap.org/blog/india-stack-major-potential-mind-risks.
Dixon P. Medical identity theft: the information crime that can kill you, World Privacy Forum, May 2006. Available at: http://www.worldprivacyforum.org/wp-content/uploads/2007/11/wpf_medicalidtheft2006.pdf.
Stewart C. Recent virginia case carries major implications for fingerprint passcodes and self-incrimination, virginia bar association, docket call. Available at: http://www.vsb.org/docs/conferences/young-lawyers/dc_spr2015.pdf.
Hulette E. Police can require cellphone finger print, not pass code. The Virginian pilot, October 30, 2014. Available at: http://pilotonline.com/news/local/crime/police-can-require-cellphone-fingerprint-not-pass-code/article_25373eb2-d719-5a6e-b677-656699a50168.html.
U.S. Government Accountability Office (GAO). Facial recognition technology: commercial uses, privacy issues, and applicable federal law, GAO-15-621. Washington, D.C.: U.S. GAO, July 30, 2015.
Hoofnagle Chris J. The origin of fair information practices. 2014. Available at: https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/archive-of-the-meetings-of-the-secretarys-advisory-committee-on-automated-personal-data-systems-sacapds/.
The Encyclopedia of Law Enforcement, Robert Gellman, The Privacy Act. Ed. Larry E. Sullivan, Marie Simonetti Rosen, Dorothy Moses Schultz, M.R. Haberfeld. Sage, 2004.
Moodie S. National conference on state legislatures(NCSL) legislative briefing paper. Fac Recognit Biometrics 2015; 23(41).
Nissenbaum H. Privacy in context: technology, policy, and the integrity of social life. Palo Alto: Stanford University Press.
The White House. Consumer data privacy in a networked world: a framework for protecting privacy and promoting innovation in the global digital economy, Feb 2012. Available at: http://www.whitehouse.gov/sites/default/files/privacy-final.pdf.
Greenleaf G. Global data privacy laws: 89 countries, and accelerating (February 6, 2012). Privacy Laws & Business International Report, Issue 115, Special Supplement, February 2012; Queen Mary School of Law Legal Studies Research Paper No. 98/2012. Available at SSRN: https://ssrn.com/abstract=2000034.
Batch K. Summary of a workshop on the technology, policy, and cultural dimensions of biometric systems. National Academy Press, 2006-02-06.
Kuner C. Regulation of transborder data flows under data protection and privacy law: past, present, and future (October 1, 2010). TILT Law & Technology Working Paper No. 016/2010; Tilburg Law School Research Paper No. 016/2010. Available at SSRN: https://ssrn.com/abstract=1689483 or doi: 10.2139/ssrn.1689483.
Rijken Conny RJJ, Koster D. A human rights based approach to trafficking in human beings in theory and practice (May 2008). Available at SSRN: https://ssrn.com/abstract=1135108 or doi: 10.2139/ssrn.1135108
Refusal to Use Biometric Attendance System. The news international, Vol. 26, No. 54, April 26, 2016.
Waghmode V. Aadhaar-linked attendance a must. The Times of India, June 29, 2016.
Robert G, Pam D. EU-US privacy shield: winners and losers. World privacy forum, April 6, 2016. Available at: https://www.worldprivacyforum.org/2016/04/privacy-shield-analysis-winners-and-losers/.
Mitchell T. Legislation would require Hospitals to use biometrics to verify patients, St. Augustine Record, Feb. 5, 2016.
Singer N. When a palm reader knows more than your life line. New York Times, Nov. 10, 2012. Available at: http://www.nytimes.com/2012/11/11/technology/biometric-data-gathering-sets-off-a-privacy-debate.html.
Lydia C. Accurate health records are at their fingertips; Northeast Ohio hospitals join growing number of facilities using biometrics to register patients, track medication, Cleveland Business, Jan. 4, 2016.
Pam D. Medical identity theft, the information crime that can kill you, World Privacy Forum, May 2006.
Richard K, ed. NISTIR 7298 Revision 2, Glossary of KEY INFORMATION SECURITY TErms, National Institute of Standards and Technology, May 2013. Available at: http://nvlpubs.nist.gov/nistpubs/ir/2013/NIST.IR.7298r2.pdf.
Robert G, Pam D. Many failures, a brief history of privacy regulation in the United States, World Privacy Forum, 2011. Available at: http://www.worldprivacyforum.org/wp-content/uploads/2011/10/WPFselfregulationhistory.pdf.
Re: Convention on action against trafficking in human beings, The Council of Europe, Warsaw, 16.V.2005. Available at: http://www.coe.int/en/web/conventions/full-list/-/conventions/rms/090000168008371d.
Boersma K, van Brakel R, Fonio C, Wagenaar P. Histories of state surveillance in Europe and beyond, London: Routledge 2014. Available at SSRN: https://ssrn.com/abstract=2437990. See pages 170–185.
Face Recognition Technology: Department of justice and FBI need to take additional actions to ensure privacy and accuracy GAO-17-489T: Published: Mar 22, 2017. Publicly Released: Mar 22, 2017.
EDPS, Opinion 4/2015, Towards a new digital ethics. Available at: https://secure.edps.europa.eu/EDPSWEB/webdav/site/mySite/shared/Documents/Consultation/Opinions/2015/15-09-11_Data_Ethics_EN.pdf.
Rubinstein Ira S. Privacy and regulatory innovation: moving beyond voluntary codes, 6 I/S A Journal of Law and Policy for the Information Society 356 (2011), available at http://www.is-journal.org/hotworks/rubinstein.php.
Models of self-regulation: An overview of models in business and the professions 51–52 (November 2000), available at: http://www.talkingcure.co.uk/articles/ncc_models_self_regulation.pdf.
Taipale KA. Technology, security and privacy: the fear of Frankenstein, the Mythology of Privacy and the Lessons of King Ludd. Yale Journal of Law and Technology, 7, 123, December 2004. Available at SSRN: https://ssrn.com/abstract=601421.
Cavoukian A. Privacy by design, the 7 Foundational Principles, Implementation and mapping of the Fair Information Practices. Rev. 2011. Available at: https://www.ipc.on.ca/wp-content/uploads/Resources/7foundationalprinciples.pdf.
Rubinstein Ira S. Regulating privacy by design (May 10, 2011). Berkeley Technology Law Journal, 26, 1409, 2012. Available at SSRN: https://ssrn.com/abstract=1837862.
36:1 Bill 142, Social assistance reform act, 1997, Legislative assembly of Ontario. Available at: http://www.ontla.on.ca/web/bills/bills_detail.do?locale=en&BillID=1439&detailPage=bills_detail_the_bill&isCurrent=false.
- A Failure to “Do No Harm” -- India’s Aadhaar biometric ID program and its inability to protect privacy in relation to measures in Europe and the U.S.
- Springer Berlin Heidelberg
Neuer Inhalt/© ITandMEDIA, Erfolgsfaktoren sensitiver Robotertechnologien/© Composer | Fotolia