UID and Implications For Other Countries PDF
UID and Implications For Other Countries PDF
I. Introduction
Title of the study
UID and Implications for other Countries.
Summary
A crucial factor that determines an individuals well-being in a country is
whether their identity is recognized in the eyes of the government. Weak identity limits the
power of the countrys residents when it comes to claiming basic political and economic
rights. The lack of identity is especially detrimental for the poor and the underprivileged, the
people who live in Indias social, political and economic periphery. Agencies in both the
public and private sector in India usually require a clear proof of identity to provide
services. Since the poor often lack such documentation, they face enormous barriers in
accessing benefits and subsidies.
For governments and individuals alike, strong identity for residents has real economic
value. While weak identity systems cause the individual to miss out on benefits and services,
it also makes it difficult for the government to account for money and resource flows across
a country. In addition, it complicates government efforts to account for residents during
1
Name
Date of birth
Place of birth
Gender
Fathers name
Mothers name
Mothers UID number (optional for adult residents)
Address (Permanent and Present)
Expiry date
Photograph
Finger prints
Urban Poor
The urban poor are among the most ignored and disadvantaged people in India. The
main challenges in enrolment here exist because this group consists mainly of migrant
workers with temporary or seasonal jobs. The following may be ways to get them enrolled
into the UID system.
Co-resident enrolment: Many of Indias urban poor work as drivers, maids, or as workers
associated with a family or a business. One approach to reach them could be for the head of
the family or business to enable these members (who are co-residents/co-workers) to get
enrolled into the UID with the same address proof the business or family uses. There can be
a host of financial incentives offered to enrol such co-residents.
Financial institutions: The urban poor often borrow from micro-finance institutions and other
sources and these could serve as enrolment points for them. There are established chit funds
that can also act as enrolment points for the UID to improve coverage.
NGOs and Non-profits: There are several established non-profits working in urban slums in
education, healthcare and social empowerment. They can be used to educate the poor on
the benefits of the UID, for actual enrolment and to help endorse identity for people who lack
documentation.
Children
India is a young country with over 400 million residents below the age of 18. While
family- based government schemes will as Registrars, help enrol children, this population
may need to be specifically targeted.
ICDS: ICDS is one of the worlds largest integrated early childhood programs, with over
40,000 centers nationwide. The program covers over 5 million expectant and nursing mothers
and 25 million children under the age of six. These centers can be information or enrolment
points for non-school going children.
School admission: It may be mandated that at the time of joining school (first standard) it is
necessary for children to have a UID or to enrol for one. This way the child can be tracked
9
Women
Apart from enrollers that are family-based government services in both urban and rural
India such as PDS, RSBY etc, there needs to be a strategy to cover women outside this net:
Financial institutions: Robust collectives of women exist within micro-finance institutions
and self-help groups across the country. These would be important enrolment points for
women.
Organizations like Mahila Samakhya in the 9 states of Karnataka, Kerala, Andhra Pradesh,
Gujarat, Uttar Pradesh, Uttar Khand, Assam and Jharkhand. They work in several thousand
villages to help women and can act as touch points for education or enrolment of women.
The National Commission for Women: This is the apex national level organization of India
for protecting and promoting the interests of women. They have a massive outreach
program that can reach out to disadvantaged women and get them to enrol. The UID can
subsequently be used as a unique handle for a variety of services to be rendered to these
women.
Differently-abled people
It is estimated that India has over 60 million differently-abled people, and identity for
this population is a massive challenge. The Disability Act of 1995 mandates a certain
percentage of employment for the differently-abled, but without the clear identification of
such individuals, it is difficult to enforce the law. There is an obvious incentive for
organizations like National Center for Promotion of Employment for Disabled People
10
Tribals
India has a significant tribal population of approximately 90 million tribals, mostly
concentrated along a few states. The Government has many programs for the 697 notified
tribes, which can be used for enrolment and information dissemination. In addition, NGOs
and governments in states with high tribal populations can be Registrars for tribal groups.
The above mentioned approaches are merely indicative of the strategy that the UIDAI
will follow to reach marginalized groups. In addition, the UIDAI will reach out to other
marginalized groups such as homeless people, individuals in shelter homes, remand homes,
asylum, etc.
Enrolment Costs
Based on initial estimates, the enrolment of each resident may cost between Rs. 20
and Rs. 25, leading to a potential total enrolment cost of Rs. 3,000 crore. The enrolment
strategy will explore the possibility of various beneficiaries funding the enrolment cost.
The Registrars have the option here of charging for the cards they issue residents to offset
enrolment costs. The UIDAI may issue guidelines around such pricing.
11
12
13
16
infrastructure and systems necessary to authenticate residents in different parts of the country.
This will be especially critical for Registrars working in rural areas and among the poor.
Types of authentication
There are multiple forms of authentication that the UID authority can offer. Certain
types of authentication would have low to medium assurance if there is the possibility that the
card is forged. Here we summarize the main forms of authentication, depending on the
situation and equipment available.
Online authentication is supported by the UID system. This can include
- Online demographic authentication where the authenticating agency compares
the UID number and demographic information of the UID holder to the information
stored in the UID database. The assurance level here is medium.
18
Offline authentication may be supported by the Registrar, and does not use the authenticating
service provided by the UIDAI. This may come in two forms:
- Photo match authentication where the photo on the card is compared with the
cardholder. This is the most basic form of authentication. The assurance level here is low.
- Offline biometric authentication compares the scanned fingerprint of the cardholder
to the biometric stored on the Registrar-issued card. The assurance level here is medium.
19
21
V.
Technology Architecture
The technical architecture of the UIDAI is at this point, based on high-level
assumptions. The architecture has been structured to ensure clear data verification,
authentication and de- duplication, while ensuring a high level of privacy and information
security.
System architecture
The Central ID Data Repository will be the central database of all residents, containing
the minimal set of fields sufficient to confirm identity. The federated set of databases
belonging to the Registrars may contain additional information about the resident, and can
use the residents UID as the key.
The UID Server, which provides the enrolment and the authentication service.
These services will be available over the network for the various Registrars and their
22
The Biometric sub-system is central to the UID system for enrolling as well as
authenticating residents. It is likely that a multi-modal biometric solution will be used
to achieve a high level of assurance. The 1:N de-duplication envisioned will be by far
the most computing-intensive operation of the UID system. Innovative techniques of
hashing, indexing, distributed processing, and in-memory databases using multiplebiometric-modes need to be employed to get acceptable performance.
The Enrolment client application will capture and validate demographic and biometric
data. This client needs to work in an offline mode in the village setting when there
is no internet connectivity, and upload batch files to the server for processing.
The client application will be deployed on a standard enrolment workstation.
The Network is a critical aspect of the system, since all UID enrolment and
authentication services will be available online. UID services could work over secure
WAN networks, the vanilla internet or over mobile SMS channels. It could also
potentially work over existing networks such as credit-card POS (point-of-service)
devices.
The Security design secures all the above components from logical/physical attack.
This includes
o
o Role based access control Assign rights over UID resources based on role.
o Audit trailing track every access to the UID system.
o Fraud detection detect identity theft and cyber crimes using audit trails
o Reporting and Analytics Visual decision support tools GIS, Charting etc.
23
protected. Loss of this information risks the residents financial and other assets, as well as
reputation, when the resident is a victim of identity theft.
24
25
28
All this being said, it cannot be stressed enough however, that despite the great
potential that the UID presents, the program is still in its nascent stages and it remains to
be seen how these authentication options ultimately come on line and to what extent they
interface with, and rely upon, the UID database.
29
30
31
32
Unlike many legacy national ID programs, the UID is designed from the
ground up to support authentication applications. The government is
providing the tools to enable public and private sector entities to utilize the system
with biometrics. Most other national ID schemes may use an ID card for
authentication, but without biometrics, there is no proof of identity. And almost
no other government, with the possible exception of South Africa, which recently
opened its national ID system to banks to address bank-related identity fraud, is
actually using the national ID infrastructure to support private and public
institutional needs to verify identity. The fact that the Indian government invested
in establishing the protocols, the APIs and the structure for certification and
empanelment, provides a structure for maximum participation, making it possible
for thousands of authentication points to communicate with a central ID
repository. And in turn, because so many agencies and private sector entities will
be relying on the UID to provide services to the people, not having a UID will be
a major inconvenience. This is the main driver for inclusion. Also, because the
UID will link to the passport, driver license, PAN (tax ID) card, bank accounts,
33
34
35
Multiple biometrics promote inclusion and maximize usage of the UID. One
of the main reasons for including iris biometrics upon enrollment was the
significant increase in accuracy, but the added benefit of maximizing inclusion
among the people is not to be underestimated. Most national ID system rely on
fingerprints only, and in the developing world in particular, this can propagate a
situation of under registration or under utilization of the system as many people
doing physical labor would not be able to be enrolled, or the quality of their
enrollments would be low, subsequently hampering the ability to authenticate them
for services. A secondary biometric alleviates this issue assuming both could also
be used at the point of service.
Industry standards enable scalability and minimize project risk. The insistence
on biometric standards for the collection of the information means that future
changes and accommodations in technology will be possible. It also unleashes the
possibilities for innovation around applications that can leverage the UID. Many
national ID programs use proprietary systems, which make it very difficult and
expensive to upgrade and expand. And finally, the use of three backend database
systems assures that the government is not reliant on any particular vendor.
36
X.
Conclusion
The UID project is a very critical initiative for India and in all possibilities, we would
need to be careful that the project neither faces the same fate as similar other large scale
exercises in the country nor like the national id initiatives of some other countries. Hence, it
becomes critical to analyze the areas of concerns coming up from whatever has been done in
this so far in this initiative.
UIDAI had claimed that 10 crore UIDs would be distributed by March 2011 and 600
million by March 2014. However, as of November 25, 2010, only 153,791 UIDs were
generated (Balaganga, 2010; Khan, 2010; Kushwaha, 2010). This raises serious doubts on the
plan for achieving the optimistic target of generating 10 crore UIDs by March 2011.
It is not that the ambition of providing unique identification to all the residents/citizens
of India is unachievable. The overall exercise needs to be planned meticulously based on
concrete evidences and the efforts and outcomes of the project clearly mapped. Also, the
perceived benefits of such a scheme need to be well quantified in terms of its value and impact
on the society as well as its capacity to generate revenue or save cost. The feasibility of the
claimed benefits and their impact needs to be thoroughly evaluated in consultation with the
respective stakeholders. From the existing reports, it seems that very little effort has been made
towards estimating the total cost of the project and mapping the same with the perceived
benefits. In fact there is no indication of any cost-benefit analysis being conducted by the
government for the UID project. Given the scale and complexity of the initiative, a much
sincere effort needs to be made to estimate the overall cost of the project taking into
consideration various direct as well as indirect components of cost that would ultimately
contribute towards the cost to citizens (including government expenditure). Further, a detailed
cost-benefit analysis needs to be conducted by considering various alternatives for achieving
the perceived benefits (or social objectives) in order to check whether the UID scheme is the
best alternative for achieving the said benefits.
37
XI. Bibliography
Websites Referred:
1. http://uidai.gov.in/images/aadhaar_seeding_v_10_280312.pdf
2. http://uidai.gov.in/
3. http://businesstoday.intoday.in/story/nandan-nilekani-uid-controversy/1/22422.html
4. http://www.businessdailyafrica.com/Corporate-News/India-high-tech-IDproject-to-create-employment/-/539550/1048770/-/y0jr7u/-/index.html
Articles:
1. UID truce burden on taxpayers: The Daily Mail, 29th January, 2012
2. Monitoring the G8 promise to Africa: The Data Report, 25th May, 2010
38