Search
00
GBAF Logo
trophy
Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

Subscribe to our newsletter

Get the latest news and updates from our team.

Global Banking and Finance Review

Global Banking & Finance Review

Company

    GBAF Logo
    • About Us
    • Profile
    • Privacy & Cookie Policy
    • Terms of Use
    • Contact Us
    • Advertising
    • Submit Post
    • Latest News
    • Research Reports
    • Press Release
    • Awards▾
      • About the Awards
      • Awards TimeTable
      • Submit Nominations
      • Testimonials
      • Media Room
      • Award Winners
      • FAQ
    • Magazines▾
      • Global Banking & Finance Review Magazine Issue 79
      • Global Banking & Finance Review Magazine Issue 78
      • Global Banking & Finance Review Magazine Issue 77
      • Global Banking & Finance Review Magazine Issue 76
      • Global Banking & Finance Review Magazine Issue 75
      • Global Banking & Finance Review Magazine Issue 73
      • Global Banking & Finance Review Magazine Issue 71
      • Global Banking & Finance Review Magazine Issue 70
      • Global Banking & Finance Review Magazine Issue 69
      • Global Banking & Finance Review Magazine Issue 66
    Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

    Global Banking & Finance Review® is a leading financial portal and online magazine offering News, Analysis, Opinion, Reviews, Interviews & Videos from the world of Banking, Finance, Business, Trading, Technology, Investing, Brokerage, Foreign Exchange, Tax & Legal, Islamic Finance, Asset & Wealth Management.
    Copyright © 2010-2025 GBAF Publications Ltd - All Rights Reserved.

    Editorial & Advertiser disclosure

    Global Banking and Finance Review is an online platform offering news, analysis, and opinion on the latest trends, developments, and innovations in the banking and finance industry worldwide. The platform covers a diverse range of topics, including banking, insurance, investment, wealth management, fintech, and regulatory issues. The website publishes news, press releases, opinion and advertorials on various financial organizations, products and services which are commissioned from various Companies, Organizations, PR agencies, Bloggers etc. These commissioned articles are commercial in nature. This is not to be considered as financial advice and should be considered only for information purposes. It does not reflect the views or opinion of our website and is not to be considered an endorsement or a recommendation. We cannot guarantee the accuracy or applicability of any information provided with respect to your individual or personal circumstances. Please seek Professional advice from a qualified professional before making any financial decisions. We link to various third-party websites, affiliate sales networks, and to our advertising partners websites. When you view or click on certain links available on our articles, our partners may compensate us for displaying the content to you or make a purchase or fill a form. This will not incur any additional charges to you. To make things simpler for you to identity or distinguish advertised or sponsored articles or links, you may consider all articles or links hosted on our site as a commercial article placement. We will not be responsible for any loss you may suffer as a result of any omission or inaccuracy on the website.

    Home > Business > SECURING TRUST IN INDIA’S DIGITAL CITIZENSHIP
    Business

    SECURING TRUST IN INDIA’S DIGITAL CITIZENSHIP

    SECURING TRUST IN INDIA’S DIGITAL CITIZENSHIP

    Published by Gbaf News

    Posted on January 30, 2018

    Featured image for article about Business

    Jaikishan Rajaraman, VP & Global Head of Technology at GSMA

    User privacy has been at the forefront of debates over digital identity since their inception.  The case of Aadhaar, the Indian government’s digital identity solution, has attracted particular attention in recent months.  India’s Supreme Court ruled in August of last year that privacy is a fundamental right of Indian citizenship, reigniting legal and political debates over Aadhaar.  Aadhaar has not been deemed a breach of privacy in itself; the case hinged rather on the security and confidentiality of the personal data the system relies on, and to what use that data may be put.

    As India pursues its aim to bring about a largely cashless society, digital identity verification will play an increasingly central role in daily life there.  What citizens buy, which publications they read, and where they travel will in time become a matter of record.  Should transit by rail, for instance, come to require one’s Aadhaar number, the state will hold details on every train journey a citizen makes as a matter of course. With subscription to mobile networks in India already requiring verification via Aadhaar, the state would soon be able to link the travel and call records of every individual in the country. These implications have prompted debates across Indian society over proper safeguards on how that data can be used and secured.

    Public trust in the solution was not helped by a recent exposé by investigative journalists.  Earlier this month, Indian newspaper The Tribune reported that it had been able to gain access to private identity information belonging to Indian citizens enrolled in Aadhaar, by paying an official at the Unique Identification Authority of India (UIDAI) around $8.  The official in question also provided, for a further $5, software necessary to print Aadhaar cards on entering the Aadhaar number of any individual – effectively enabling the reporters to clone the digital identity of almost anyone in India.  Sanjay Jindal, Additional Director-General at the UIDAI Regional Centre in Chandigarh, has accepted that these events constitute “a major national security breach.”  The story appears not to end there: the lead reporter working on the report claims she has so far revealed only “the tip of the iceberg” and that there is “much more to come”.

    Public confidence in the solution has therefore inevitably been called into question.  While the Indian government faces no easy task, in digitising personal identity in the world’s largest democracy, the bottom line is that consumer trust is vital to uptake and success. The mobile industry can help here.  Mobile network operators have a natural interest in ensuring the privacy of their customers – it is on this relationship of trust that much of their commercial success depends.  Where operators are in the driving seat of identity verification, they will naturally place privacy among their very highest priorities.  With their range of authentication assets, such as the SIM card, strong registration processes, and multiple fraud detection and mitigation processes, mobile operators are uniquely well-positioned to help governments design and operate identity solutions – rather than merely providing them with the architecture via which to run them.  And, as 2017 drew to a close, it had become increasingly clear that operators are collaborating to take the lead in digital identity worldwide, building their expertise in this vital component of connected commerce and civic life.

    Operator-led identity solutions like Mobile Connect can offer a robust system of consent management: where for instance the present implementation of Aadhaar sees users merely receiving SMS notification when their data is accessed by an approved party, operators can offer a far more consumer-centric consent mechanism.  By matching users with something they have on their person as a matter of course (their mobile phone), in conjunction with something they know (a PIN), and/or something they are (a biometric scan), Mobile Connect’s design precludes data breaches of the kind exposed by The Tribune.  With rigorous transparency and granularity – for instance data availability on a per-transaction basis – operator-led solutions can act primarily as tools of the user, rather than simply a means of integrating that user into a system over which they have little recourse.  Once users are confident in their level of control over their own data, legal and political roadblocks to connected citizenship can be increasingly removed – and rises in living standards can be realised for millions.

    Jaikishan Rajaraman, VP & Global Head of Technology at GSMA

    User privacy has been at the forefront of debates over digital identity since their inception.  The case of Aadhaar, the Indian government’s digital identity solution, has attracted particular attention in recent months.  India’s Supreme Court ruled in August of last year that privacy is a fundamental right of Indian citizenship, reigniting legal and political debates over Aadhaar.  Aadhaar has not been deemed a breach of privacy in itself; the case hinged rather on the security and confidentiality of the personal data the system relies on, and to what use that data may be put.

    As India pursues its aim to bring about a largely cashless society, digital identity verification will play an increasingly central role in daily life there.  What citizens buy, which publications they read, and where they travel will in time become a matter of record.  Should transit by rail, for instance, come to require one’s Aadhaar number, the state will hold details on every train journey a citizen makes as a matter of course. With subscription to mobile networks in India already requiring verification via Aadhaar, the state would soon be able to link the travel and call records of every individual in the country. These implications have prompted debates across Indian society over proper safeguards on how that data can be used and secured.

    Public trust in the solution was not helped by a recent exposé by investigative journalists.  Earlier this month, Indian newspaper The Tribune reported that it had been able to gain access to private identity information belonging to Indian citizens enrolled in Aadhaar, by paying an official at the Unique Identification Authority of India (UIDAI) around $8.  The official in question also provided, for a further $5, software necessary to print Aadhaar cards on entering the Aadhaar number of any individual – effectively enabling the reporters to clone the digital identity of almost anyone in India.  Sanjay Jindal, Additional Director-General at the UIDAI Regional Centre in Chandigarh, has accepted that these events constitute “a major national security breach.”  The story appears not to end there: the lead reporter working on the report claims she has so far revealed only “the tip of the iceberg” and that there is “much more to come”.

    Public confidence in the solution has therefore inevitably been called into question.  While the Indian government faces no easy task, in digitising personal identity in the world’s largest democracy, the bottom line is that consumer trust is vital to uptake and success. The mobile industry can help here.  Mobile network operators have a natural interest in ensuring the privacy of their customers – it is on this relationship of trust that much of their commercial success depends.  Where operators are in the driving seat of identity verification, they will naturally place privacy among their very highest priorities.  With their range of authentication assets, such as the SIM card, strong registration processes, and multiple fraud detection and mitigation processes, mobile operators are uniquely well-positioned to help governments design and operate identity solutions – rather than merely providing them with the architecture via which to run them.  And, as 2017 drew to a close, it had become increasingly clear that operators are collaborating to take the lead in digital identity worldwide, building their expertise in this vital component of connected commerce and civic life.

    Operator-led identity solutions like Mobile Connect can offer a robust system of consent management: where for instance the present implementation of Aadhaar sees users merely receiving SMS notification when their data is accessed by an approved party, operators can offer a far more consumer-centric consent mechanism.  By matching users with something they have on their person as a matter of course (their mobile phone), in conjunction with something they know (a PIN), and/or something they are (a biometric scan), Mobile Connect’s design precludes data breaches of the kind exposed by The Tribune.  With rigorous transparency and granularity – for instance data availability on a per-transaction basis – operator-led solutions can act primarily as tools of the user, rather than simply a means of integrating that user into a system over which they have little recourse.  Once users are confident in their level of control over their own data, legal and political roadblocks to connected citizenship can be increasingly removed – and rises in living standards can be realised for millions.

    Related Posts
    Five questions to ask before stepping into Employee Ownership
    Five questions to ask before stepping into Employee Ownership
    Cybersecurity as a Profit Engine: Turning Financial Services Security into Measurable Business Value
    Cybersecurity as a Profit Engine: Turning Financial Services Security into Measurable Business Value
    How Investability Helps Companies Navigate Transformational Times
    How Investability Helps Companies Navigate Transformational Times
    88% of UK and US organisations concerned about state-sponsored cyber attacks as national threat levels surge, IO research reveals
    88% of UK and US organisations concerned about state-sponsored cyber attacks as national threat levels surge, IO research reveals
    One in three SME leaders do not fully understand cash flow, despite 82% facing cash flow problems
    One in three SME leaders do not fully understand cash flow, despite 82% facing cash flow problems
    Inside the Company that Predicted the Remote Work Mega-Trend Before It Became Mainstream
    Inside the Company that Predicted the Remote Work Mega-Trend Before It Became Mainstream
    SEO Consultant Adrian Czarnoleski on How to Increase Business Value Before Exit
    SEO Consultant Adrian Czarnoleski on How to Increase Business Value Before Exit
    No SOC 2, No Deal: Why You’re Already Losing Clients - and What You Can Do About It
    No SOC 2, No Deal: Why You’re Already Losing Clients - and What You Can Do About It
    Jose Tolosa Guides Organizations Forward with Clarity, Purpose, and Integrity
    Jose Tolosa Guides Organizations Forward with Clarity, Purpose, and Integrity
    Reducing Freight Costs to Drive Global Trade Expansion
    Reducing Freight Costs to Drive Global Trade Expansion
    The Psychology of Music in the Modern Workplace
    The Psychology of Music in the Modern Workplace
    Revealed: Low-Cost/No-Cost Marketing Hacks For Results Oriented Businesses
    Revealed: Low-Cost/No-Cost Marketing Hacks For Results Oriented Businesses

    Why waste money on news and opinions when you can access them for free?

    Take advantage of our newsletter subscription and stay informed on the go!

    Subscribe

    More from Business

    Explore more articles in the Business category

    Finance teams still stuck in spreadsheets as manual processes stall digital transformation

    Finance teams still stuck in spreadsheets as manual processes stall digital transformation

    The Future of Remote & Hybrid Leadership: Leading With Data-Driven Foresight

    The Future of Remote & Hybrid Leadership: Leading With Data-Driven Foresight

    2025-2030: The Next Technological Innovations for Business

    2025-2030: The Next Technological Innovations for Business

    The CFO’s New Playbook: 5 Ways AI Is Redefining Finance with Insights from Rishi Oberoi

    The CFO’s New Playbook: 5 Ways AI Is Redefining Finance with Insights from Rishi Oberoi

    Revolutionizing Payments: Secure, Scalable, Sovereign

    Revolutionizing Payments: Secure, Scalable, Sovereign

    Why Trademark Abuse in Paid Search Is a Growing Risk for Financial Institutions

    Why Trademark Abuse in Paid Search Is a Growing Risk for Financial Institutions

    E-commerce Customer Service: Tips

    E-commerce Customer Service: Tips

    When to Automate Your Warehouse: The Tipping Point for Operations Growth

    When to Automate Your Warehouse: The Tipping Point for Operations Growth

    Hurt at Work? 5 Financial Facts You Need to Know

    Hurt at Work? 5 Financial Facts You Need to Know

    Against the Odds: Resilience in Consumer Subsectors Offers Prime Opportunities for Investors

    Against the Odds: Resilience in Consumer Subsectors Offers Prime Opportunities for Investors

    Empower Your Workforce With Financial Wellness This Labor Day

    Empower Your Workforce With Financial Wellness This Labor Day

    Build a brand that stands out with five simple strategies, from defining your UVP to using storytelling and building loyalty. Find out more.

    Build a brand that stands out with five simple strategies, from defining your UVP to using storytelling and building loyalty. Find out more.

    View All Business Posts
    Previous Business PostTHE ANNUAL MORGAN MCKINLEY SALARY GUIDE: GDPR AND IR35 DRIVING RECRUITMENT IN LONDON DESPITE BREXIT
    Next Business PostAPPROACHING THE GEOPOLITICAL AND CYBER THREAT LANDSCAPE WITH BUSINESS RISK INTELLIGENCE