UIDAI again found itself embroiled in a controversy when it was revealed that its helpline was being automatically added in the contact lists of mobile phones. But Google acknowledged that its coding error led to the mishap. Why was Google involved in getting a phone number for UIDAI preloaded on phones?
The Virtual ID system that can be used in lieu of Aadhaar number for identity verification is now operational across banks and enterprises. However, UIDAI has extended its migration deadline to Aug. 31 to enable all organizations to be ready. Experts weigh in on the enterprise readiness for Virtual Aadhaar.
French cybersecurity researcher Baptiste Robert, who goes by the name Elliot Alderson on Twitter, has once again exposed an apparent Aadhaar leak. The latest leak, which occurred on state-owned gas company Indane's website, exposed data of as many as 6.7 million customers, the researcher claims.
The Unique Identity Authority of India, which administers the Aadhaar program, is again facing harsh criticism about its security measures, this time from State Bank of India. But rather than pointing fingers, all government organizations need to collaborate to enhance security.
The issue of access management and vulnerable software applications has come back to haunt the Unique Identification Authority of India which manages the Aadhaar database containing biometrics and personal information of over 1 billion Indians.
The intensive discussion between the Supreme Court and the CEO of UIDAI on recent Aadhaar-related data leaks could result in the court recommending that the Ministry of Law and Justice make amendments to the Aadhaar Act and direct the UIDAI to build a far more robust security framework.
The B.N. Srikrishna Committee, in its report on a proposed data protection bill, spells out a number of consumer privacy rights, including the "right to be forgotten." What challenges would organizations face if these provisions become law? A panel of experts offers insights.
The entire approach toward Aadhaar security needs to change to address problems on the users' end, rather than focus on the UIDAI's core database, contends Na. Vijayashankar, a cyber law expert. He'll be a featured speaker at ISMG's Fraud and Breach Prevention Summit in Bengaluru.
In an exclusive, in-depth analysis, a panel of experts says the proposed personal data protection and privacy bill, prepared by the Justice B. N. Srikrishna committee, has many gaps and some provisions that could prove challenging to implement.