Search for Cases

Case Details

Case Code: ITSY097
Case Length: 10 Pages
Period: 2017-2018     
Pub Date: 2018
Teaching Note: Available
Price:Rs.300
Organization : Unique Identification Authority of India (UIDAI)
Industry : -
Countries : India
Themes:  e-governance/ data security/cyber security
Case Studies  
Business Strategy
Marketing
Finance
Human Resource Management
IT and Systems
Operations
Economics
Leadership & Entrepreneurship

Aadhaar Data Leaks: How Secure is the World`s Largest Biometric Database?

 

ABSTRACT

 
This case discusses the security concerns over the Aadhaar card, a national identity project launched by the Government of India (GoI), which seeks to collect biometric and demographic data of residents of India and store this data in a centralized database. Aadhaar is a 12-digit unique identification number issued to the people of India for their unique identification. It is issued by the Unique Identification Authority of India (UIDAI). Using Aadhaar, a person’s identity can be certified and authenticated in an easy and cost effective way. Aadhaar has been linked to many GoI welfare schemes and is used as identity proof to open a bank account, get a passport, etc. However, there have been substantial deliberations over the privacy and security issues related to the Aadhaar project. Aadhaar is considered to be prone to possible system hacks, insider leaks, and tampering of authentication records and audit trails in the absence of proper security policies. There have been reports of Aadhaar breach in different regions of India and people are sceptical about its security. Even though the GoI is taking a lot of measures to safeguard Aadhaar data, there is a lot to be done to enhance the safekeeping of the data. .
 
IT and Systems Case Studies | Case Study in Management, Operations, Strategies, IT and Systems, Case Studies
or
IT and Systems Case Studies Case Studies | Case Study in Management, Operations, Strategies, IT and Systems, Case Studies
or
PayPal (7 USD)

 

Issues

The case is structured to achieve the following teaching objectives:
  • Analyze the significance of Aadhaar for Indian citizens.
  • Understand how Aadhaar functions as a link to GoI schemes for people.
  • Explore different possibilities of a breach to hack Aadhaar data.
  • Analyze how the GoI can strengthen its security measures to safeguard the Aadhaar data.
Contents
INTRODUCTION
BACKGROUND NOTE
AADHAAR MODEL
SECURITY CONCERNS
DATA BREACH ALLEGATIONS
THE ROAD AHEAD
EXHIBITS

Keywords

Cyber Security,Management Information System (MIS),e-governance,Data Security,Information System Security,Data breach,UIDAI

INTRODUCTION - Next Page>>