Biometrics , Governance & Risk Management , Next-Generation Technologies & Secure Development

Revamping the Approach to Aadhaar Security

Cyber Law Expert Na. Vijayashankar on Why UIDAI Needs to Change its Security Strategy
Revamping the Approach to Aadhaar Security

The entire approach toward Aadhaar security needs to change to address problems on the users' end, rather than focus on the Unique Identification Authority of India's core database, contends Na. Vijayashankar, a cyber law expert.

"The concern which we have today is how Aadhaar data is being secured at the users' end," he says in an interview with Information Security Media Group.

"In days to come, we will be having this Aadhaar payment systems where there would be a number of merchants who will be using the Aadhaar number of a particular person and linking it to a bank. In such a case, the authorized merchants ... will have access to the Aadhaar data as well as a bank number. To what extent security breaches can occur at users ... is a matter of concern." (See: Aadhaar Getting Additional Security Layer)

Vijayashnakar will speak on Aadhaar security at ISMG's Fraud and Breach Prevention Summit, to be held Tuesday and Wednesday in Bengaluru. (See: Fraud & Breach Prevention Summit in Bengaluru: A Preview)

In this interview (see audio link below image) Vijayashankar also discusses:

  • Why Facebook can't be solely blamed for breaching data privacy of its users;
  • Whether a law like GDPR could be adopted in in India;
  • Critical components of an Indian data protection law.

Vijayashankar, popularly known as Naavi, is a cyber law and information assurance consultant based in Bangalore. He was the author of the first book and e-book on cyber laws in India. He also wrote the books "Cyber Laws, Corporate Mantra for the Digital Era" and "Cyber Laws Demystified." Vijayashankar is the founder of www.naavi.org, a cyber law portal, where he regularly blogs.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.asia, you agree to our use of cookies.