Sachin Garg and Isha MahajanDownload PDF
. Both the states follow legacy system (Section 32A, The Registration Act, 1908).
. Photocopy of Aadhaar used as Identity Proofs
. NO Consent Based Aadhaar Authentication.
. Registration Deed containing Aadhaar: Leaks Personally Identifiable Information (Core Biometric information on public platform).
. Violates the Law: Section 29 of the Aadhaar Act, 2016 (Restricts sharing Core Biometric information linked with Aadhaar).
This study seeks to understand the issues that emerge when new-age digital systems, built from scratch interact with legacy systems in e-governance contexts. Aadhaar, India’s national digital identity project is the quintessential example of an extensively deployed new-age digital system. On the other hand, land administration systems are the perfect example of legacy systems. We find that there is leakage of Personally Identifiable Information (PII) when the land administration system interacts with Aadhaar (Garg, 2017).
Comments are closed.