Aadhaar Rules and Regulations

1uidai.gov.in/my-aadhaar/about-your-aadhaar.html UIDAI clearly did not communicate the rules clearly to the public. Instead of trying to enforce its rules, it imposes a duty on the public to exercise « normal caution. » 11. Service providers shall ensure that the Authority is informed without delay of any action, legal proceedings, etc. brought against it in the event of a material breach or non-compliance with the laws, rules, regulations and instructions of the Authority or any other regulatory authority. Unlike most other identification and address identification documents, there are regulatory requirements for the collection, storage and processing of Aadhaar numbers. The Aadhaar Act and the corresponding regulations specify in detail the requirements for the collection, use and storage of Aadhaar numbers and Aadhaar cards. By now, you may have noticed that these regulations are in line with UIDAI`s first press release, which was later withdrawn. It is the revocation statement that calls for « normal caution » (whatever that means) that is deeply misleading. UIDAI has clearly failed to communicate these rules to the public in a clear and transparent manner.

In particular, it has not made people aware of its rights under these rules. Second, these regulations are regularly broken, but no one seems to be responsible for monitoring violations, let alone taking action against offenders. Today, a number of entities (governmental and non-governmental) exist on the Aadhaar card as proof of identity without following the rules. Instead of trying to enforce its regulations, UIDAI imposes a duty on the public to exercise « normal caution. » Thales can help your company comply with many of the regulations and mandates required for Aadhaar. Talk to us about the complexities of managing cloud-native HSMs separately, resulting in islands of security, each with different features and policies. One possible reason for this is that the press release contained a factually incorrect statement, namely that OVSEs require a « user license ». From what we can see from the Aadhaar Act and UIDAI regulations, this is not the case. It is therefore all the more important to be careful.

In the meantime, this brings out three major problems. First, UIDAI continues to issue obscure regulations that few people read or understand. 9. Service providers shall from time to time comply with the provisions of the Act and the rules and regulations issued by the Government and the Authority, if any. While UIDAI has been clear in its purpose to allow the collection and storage of Aadhaar numbers by individuals for lawful purposes in order to prevent misuse of this information, the Auditor and Auditor General (« GAC ») identified a number of concerns and deficiencies regarding the operation of UIDAI in their first UIDAI performance audit. It was observed that UIDAI generated Aadhaar numbers with incomplete information that, combined with lack of proper documentation or poor biometric quality, resulted in multiple or duplicate Aadhaar cards being issued to the same person. He also criticized UIDAI for its « poor data management » when it comes to cases where holders` data has not been matched with their Aadhaar figures, even after 10 years. In view of the above concerns, UIDAI must take the corrective measures proposed by the ACG as soon as possible so that its objective of protecting Aadhaar numbers and preventing misuse of Aadhaar numbers can be complied with and that the rules for the protection of Aadhaar numbers and documents containing Aadhaar numbers are maintained in their letter and spirit. The call for normal caution leaves it up to you to decide whether or not to share a photocopy of your Aadhaar card (unmasked) with an OVSE if this is expressly prohibited by UIDAI regulations. One of these provisions is that the OVSE must obtain your consent and inform you about other types of identity verification if you prefer to avoid transmitting your Aadhaar card (Aadhaar Authentication and Offline Verification Regulations 2021, Regulation 5). There are now at least seven different types of Aadhaar-based authentication and verification – Yes/No authentication, e-KYC, demographic authentication, QR code verification, Aadhaar offline e-KYC verification, e-Aadhaar verification, and offline paper verification – each with its own rules. Traditionally, companies have focused on IT security primarily on perimeter defense, building walls to prevent external threats from entering the network.

With the current proliferation of data, the evolution of global and regional data protection regulations, the increasing adoption of the cloud and. Support for intelligent single sign-on and strong authentication enables organizations to maximize convenience for end users and ensure they only need to authenticate when needed. Detailed reports allow organizations to create a detailed audit trail of all access and authentication events to ensure they can demonstrate compliance with a wide range of regulations. (h) « registration » means the procedure provided for in this Regulation for the collection of demographic and biometric information on persons by clerks for the purpose of issuing Aadhaar numbers to such persons in accordance with the law; Thales` access management and authentication solutions provide both the security mechanisms and reporting capabilities that organizations need to comply with data security regulations. Our solutions protect sensitive data by applying appropriate access controls when users connect to applications that store sensitive data. By supporting a wide range of policy-based role-based authentication and access methods, our solutions help organizations minimize the risk of data breaches due to compromised or stolen credentials or the misuse of internal credentials. Confusion is not necessary. UIDAI`s rules and regulations are clear on this. If someone asks for your Aadhaar card to verify your identity, this is an « offline verification » under the amended Aadhaar Act, and the person or agency concerned is an « offline verification body » (OVSE). Offline verification is allowed, but is subject to compliance with UIDAI rules.

(k) « head of household » means any member of the family of a resident for whom a document proving the relationship with the resident may be produced and which may include the father, mother or spouse of the resident; a) Registration based on registration: If a resident is unable to provide written proof of identity or address, he or she may be registered through a pre-designated importer identified and notified by the registrar or regional offices of the authority. Persons registered with the authority as importers include registrars` staff, elected members of the local body, members of local administrative authorities, postmen, influencers such as teachers, health workers, doctors, Aanganwadis/Asha workers, representatives of local NGOs.