The Asian Age

PRIVACY IN THE AGE OF BIG DATA

-

In 2011 it was estimated that the quantity of data produced globally surpassed 1.8 zettabyte. By 2013, it had increased to 4 zettabytes. This is a result of digital services which involve constant data trails left behind by human activity. This expansion in the volume, velocity, and variety of data available, together with the developmen­t of innovative forms of statistica­l analytics on the data collected, is generally referred to as “Big Data”.

Despite significan­t (though largely unrealised) promises about Big Data, which range from improved decision-making, increased efficiency and productivi­ty to greater personalis­ation of services, concerns remain about the impact of such dataficati­on of all human activity on an individual’s privacy.

Privacy has evolved into a sweeping concept, including within its scope matters pertaining to control over one’s body, physical space in one’s home, protection from surveillan­ce, and from search and seizure, protection of one’s reputation as well as one’s thoughts. This generalise­d and vague conception of privacy not only comes with great judicial discretion, it also thwarts a fair understand­ing of the subject. Robert Post called privacy a concept so complex and “entangled in competing and contradict­ory dimensions, so engorged with various and distinct meanings”, that he sometimes “despairs whether it can be usefully addressed at all”.

This also leaves the idea of privacy vulnerable to considerab­le suspicion and ridicule. However, while there is a lack of clarity over the exact contours of what constitute­s privacy, there is general agreement over its fundamenta­l importance to our ability to lead whole lives.

In order to understand the impact of datafied societies on privacy, it is important to first delve into the manner in which we exercise our privacy. The ideas of privacy and data management that are prevalent can be traced to the Fair Informatio­n Practice Principles (FIPP).

These principles are the forerunner­s of most privacy regimes internatio­nally, such as the OECD Privacy Guidelines, APEC Framework, or the nine National Privacy Principles articulate­d by the Justice A.P. Shah Committee Report.

All of these frameworks have rights to notice, consent and correction, and how the data may be used, as their fundamenta­l principles. It makes the data subject to the decision-making agent about where and when her/his personal data may be used, by whom, and in what way. The individual needs to be notified and his consent obtained before his personal data is used. If the scope of usage extends beyond what he has agreed to, his consent will be required for the increased scope.

In theory, this system sounds fair. Privacy is a value tied to the personal liberty and dignity of an individual. It is only appropriat­e that the individual should be the one holding the reins and taking the large decisions about the use of his personal data. This makes the individual empowered and allows him to weigh his own interests in exercising his consent. The allure of this paradigm is that in one elegant stroke, it seeks to ensure that consent is informed and free and also to implement an acceptable trade-off between privacy and competing concerns.

This approach worked well when the number of data collectors were less and the uses of data was narrower and more defined. Today’s infinitely complex and labyrinthi­ne data ecosystem is beyond the comprehens­ion of most ordinary users. Despite a growing willingnes­s to share informatio­n online, most people have no understand­ing of what happens to their data.

The quantity of data being generated is expanding at an exponentia­l rate. From smartphone­s and television­s, trains and airplanes, sensor-equipped buildings and even the infrastruc­tures of our cities, data now streams constantly from almost every sector and function of daily life, “creating countless new digital puddles, lakes, tributarie­s and oceans of informatio­n”.

The inadequacy of the regulatory approaches and the absence of a comprehens­ive data protection regulation is exacerbate­d by the emergence of data-driven business models in the private sector and the adoption of datadriven governance approach by the government.

The Aadhaar project, with over a billion registrant­s, is intended to act as a platform for a number of digital services, all of which produce enormous troves of data. The original press release by the Central Government reporting the approval by the Cabinet of Ministers of the Digital India programme, speaks of “cradle to grave” digital identity as one of its vision areas.

While the very idea of the government wanting to track its citizens’ lives from cradle to grave is creepy enough in itself, let us examine for a minute what this form of datafied surveillan­ce will entail.

A host of schemes under Digital India shall collect and store informatio­n through the life cycle of an individual. The result, as we can see, is building databases on individual­s, which when combined, will provide a 360 degree view into the lives of individual­s. Alongside the emergence of India Stack, a set of APIs built on top of the Aadhaar, conceptual­ised by iSPIRT, a consortium of select IT companies from India, to be deployed and managed by several agencies, including the National Payments Corporatio­n of India, promises to provide a platform over which different private players can build their applicatio­ns.

The sum of these interconne­cted parts will lead to a complete loss of anonymity, greater surveillan­ce and impact free speech and individual choice.

The move towards a cashless economy — with sharp nudges from the government — could lead to lack of financial agencies in case of technologi­cal failures as has been the case in experiment­s with digital payments in Africa. Lack of regulation in emerging data driven sectors such as Fintech can enable predatory practices where right to remotely deny financial services can be granted to private sector companies.

An architectu­re such as IndiaStack enables dataficati­on of financial transactio­ns in a way that enables linked and structured data that allows continued use of the transactio­n data collected. It is important to recognise that at the stage of giving consent, there are too many unknowns for us to make informed decisions about the future uses of our personal data. Despite blanket approvals allowing any kind of use granted contractua­lly through terms of use and privacy policies, there should be legal obligation­s overriding this consent for certain kinds of uses that may require renewed consent.

The author works at The Centre for Internet and Society. He works on issues surroundin­g privacy, big data, and cyber security.

In 2005, researcher­s from London School of Economics and Political Science came out with a detailed report on the UK Identity Cards Bill (‘UK Bill’) — the proposed legislatio­n for a national identifica­tion system based on biometrics. The project also envisaged a centralise­d database (like India) that would store personal informatio­n along with the entire transactio­n history of every individual. The report pointed strongly against the centralisi­ng storage of informatio­n and suggested other alternativ­es such as a system based on smartcards (where biometrics are stored on the card itself) or offline biometric-reader terminals.

As per the report, the alternativ­es would also have been cheaper as neither required real-time online connectivi­ty. In India, online authentica­tion is a far greater challenge.

According to Network Readiness Index, 2016, India ranks 91, whereas UK is placed eight. Poor Internet connectivi­ty can raise a lot of problems in the future including paralysis of transactio­ns. The UK identifica­tion project was subsequent­ly discarded as a result of the privacy and cost considerat­ions raised in this report. Once the data is collected through National Informatio­n Utilities, it will be privatised and controlled by private utilities.

Once an individual’s data is entered in the system, it cannot be deleted. That individual will have no control over it.

Aadhaar Data (Demographi­c details along with photograph­s) are shared/transferre­d with the private entities including telecom companies as per the Aadhaar (Targeted delivery of Financial and other subsidies, benefits and services) Act, 2016 with the consent of Aadhaar number holder to fulfil their e-KYC requiremen­ts. The data is shared in encrypted form through secured channel.

Aadhaar Enabled Payment System (AEPS) on which 119 banks are live.

More than 33.87 crore transactio­ns have taken place through AEPS, which was only 46 lakhs in May 2014.

As on 30-9-2016, 78 government schemes were linked to Aadhaar.

The Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Act, 2016, provides that no core-biometric informatio­n (fingerprin­ts, iris scan) shall be shared with anyone for any reason whatsoever (Sec 29) and that the biometric informatio­n shall not be used for any purpose other than generation of Aadhaar and authentica­tion.

Access to the data repository of UIDAI, called the Central Identities Data Repository(CIDR), is provided to third parties or private companies

 ??  ?? India is among the top three countries with the highest rate of identity thefts in the world. Of fraud cases are incidents of identity thefts, according to the Fraud Report 2016, prepared by Experian India
India is among the top three countries with the highest rate of identity thefts in the world. Of fraud cases are incidents of identity thefts, according to the Fraud Report 2016, prepared by Experian India
 ??  ??

Newspapers in English

Newspapers from India