Search Results for: UIDAI

Security of Aahaar again comes for review

The recent news report that UIDAI has initiated investigation on three firms suspected to have violated the rules of aadhaar authentication by sending stored biometrics to UIDAI server for authentication. The firms involved are Axis Bank, Suvidha Infoserve and E … Continue reading

Posted in Cyber Law | Leave a comment

Metrics for Digital payments, Watal Commitee Report..2.

This is the continuation of our discussion on the Watal Committee report on digital payment system in India. It is not common for Committees set up by Government first of all to complete its work within the allocated time. Most … Continue reading

Posted in Cyber Law | Leave a comment

Domain Name Regulation in ITA 2000..to be amended

This is a continuation of our discussions on proposed amendments to ITA 2000 presently under consideration by the T.K.Vishwanathan Committee. For further discussions henceforth we shall refer to the proposed amendments as ITAA2017(p) and the new Act as ITA2017(p). The … Continue reading

Posted in Cyber Law | Leave a comment

Is Bangalore One collectively boycotting Aadhar related services ?

Today I visited the following 5 Bangalore One centers in South Bangalore Srinagar (Ramanjaneya Road) Srinivasanagar (80ft Road) BDA complex, Banashankari II stage .N.R.Colony BBMP office near Ashoka Pillar with a request to get my finger prints updated on my … Continue reading

Posted in Cyber Law | Leave a comment

Aadhar authentication is unreliable

[I am one of the vocal supporters of the Modi’s initiatives on Note ban and other measures. However, it is necessary to bring instances such as the following to the attention of the public since they indicate the unknown risks … Continue reading

Posted in Cyber Law | Leave a comment

NITI Ayog to promote PIN less and Card less systems of payment to go cash less

One of the consequences of the demonetization drive which was prompted as much by the declared need to suck black money in cash form as to starve terrorists and Naxalites of their funding, and drying out political parties of their … Continue reading

Posted in Cyber Law | Leave a comment