National IAS Academy Current Affairs: Contact: PRELIMS. Impeachment of a SC judge. Ice sheets found in Mars

Size: px
Start display at page:

Download "National IAS Academy Current Affairs: Contact: PRELIMS. Impeachment of a SC judge. Ice sheets found in Mars"

Transcription

1 Topic: Polity PRELIMS Impeachment of a SC judge More about Impeachment of a SC judge: Recently four Supreme Court judges went public with charges against Chief Justice of India. According to constitution a judge of the SC can be removed from his office by an order of the president. The president can issue the removal order only after an address by parliament has been presented to him in the same session for such removal. The address must be supported by special majority of each house of the parliament (i.e. a majority of the total membership of that house and a majority of not less than 2/3rd of the members of that house present and voting). Article 124 (4) specifies the grounds of removal as proved misbehaviour or incapacity. So far no SC judge has been impeached in India. Topic: Science and Technologies Ice sheets found in Mars More about Ice sheets found in Mars: NASA has detected thick underground ice sheets along the middle latitudes of the Mars. This is believed to be a potential source of water that could help sustain future human outposts. The water could be used for drinking and potentially conversion into oxygen to breathe. Topic: Economy International termination charges (ITC) More about International termination charges (ITC): The Telecom Regulatory Authority of India (TRAI) cut termination charges for international incoming calls to Land line and wireless connections. International termination charges (ITC) are payable by an international long-distance operator (ILDO), which carries calls from outside the country, to an access provider in the country in whose network the call terminates. ITC is one of the source of foreign earnings for the country. 1 P a g e

2 Topic: GS-2, Polity MAINS Virtual ID for Aadhaar Authentication Context: The Unique Identification Authority of India (UIDAI), which is facing criticism in the light of alleged data breaches, recently, announced a new method of identification called Virtual Identity Introduction: The Unique Identification Authority of India recently introduced the concept of a virtual ID that can be used in lieu of the Aadhaar number at the time of authentication, thus eliminating the need to share and store Aadhaar numbers. It can be generated only by the Aadhaar number-holder via the UIDAI website, Aadhaar enrolment, or its mobile application. The citizens will also have the choice for the reverse which is to not generate their virtual IDs and continue using their Aadhaar numbers each time. Even to the income tax department or other agencies required by law to map Aadhaar, people don t have to give their Aadhaar number and can authenticate using the Virtual ID It also limited the information visible to authentication agencies. The citizens will also have the choice for the reverse which is to not generate their virtual IDs and continue using their Aadhaar numbers each time. What is virtual ID? Virtual ID, the 16-digit randomly generated number that people can share instead of their Aadhaar number It is an extra layer of security to protect privacy of people and does not imply there were gaps in the existing security architecture. Virtual ID can be used for authentication of individuals identity. Virtual ID can be changed any number of times. No documents or proof will be needed to generate a VID. But an Aadhaar number will be essential. Rationale behind this move: To address security concerns over Aadhaar database. The measures are expected to strengthen privacy The new VID system will hide the Aadhaar number from the authenticating agency, while still confirming the identity of the user. These steps will ensure greater privacy and limit access to its database Prevent profiling of people by combining dozens of databases linked to Aadhaar in the country. 2 P a g e

3 Virtual ID would address this concern by giving people the option to generate a random number from a mobile application or the Unique Identification Authority s website. It will enable users to undergo Aadhaar authentication without having to furnish their 12-digit Unique Identity Number (UID), also known as Aadhaar number. VID will be a temporary number that will be automatically revoked once the Aadhaar holder generates a new VID or after the validity of the current VID lapses Only the Aadhaar holder would be able to generate a VID. The new VID system will hide the Aadhaar number from the authenticating agency, while still confirming the identity of the user. It also introduced what it described as a system of Limited KYC (Know Your Customer) to reduce the storage of Aadhaar numbers with the Authentication User Agencies (AUAs). How will it be different from the Aadhaar number itself? VID will be a 16-digit number, which will be temporary in nature. Unlike the 12-digit Aadhaar number that is permanent, the VID will have a certain period of validity, at the end of which it will expire, and the user will have to generate a new one. A VID will automatically expire when a user generates a new one, as there can only be one valid VID number against a particular Aadhaar number at any given point in time. The VID can only be generated by the user in question and, according to UIDAI s circular, it is not possible to derive Aadhaar number from the VID. The VID cannot be used by agencies for duplication, and it cannot be generated by the Authentication User Agency (AUA) either. How will VID help with Aadhaar-linking? Does this mean most agencies will no longer store your Aadhaar data? UIDAI has also introduced a Limited KYC, which is supposed to allow paperless authentication, while ensuring at the same time that the Aadhaar database is not accessed. But it appears that AUAs will be divided into two separate categories: Global AUAs and Local AUAs. The Global AUAs will have complete access to the full ekyc (Aadhaar number), and will also be able to store Aadhaar numbers in their systems. This is something privacy activists have been cautioning against, because the number can used to reveal various other signifiers about an individual. Local AUAs, on the other hand, will have Limited KYC, and will only get a UID token which they can use to identify customers. According to the UIDAI, all agencies will need to set up the UID token system. However, Global AUAs will have the freedom to use the UID token as per their need for authentication and database usage, 3 P a g e

4 What is Aadhaar? The Aadhaar is the brand name of the Unique Identification Number that the Unique Identification Authority of India (UIDAI) issues to every resident of India. It is a twelve digit number which is linked the resident s demographic and biometric information Each number relates to a set of information stored in a centralized database which aids in real time verification. About UIDAI: The Unique Identification Authority of India (UIDAI) is a statutory authority established under the provisions of the Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services Act, 2016 ( Aadhaar Act 2016 )on 12 July 2016 by the Government of India, under the Ministry of Electronics and Information Technology (MeitY). UIDAI was created with the objective to issue Unique Identification numbers (UID), named as Aadhaar, to all residents of India that is (a) robust enough to eliminate duplicate and fake identities, and (b) can be verified and authenticated in an easy, cost-effective way. The UIDAI was established in 2009 and functions as part of the Planning Commission of India. The agency issues cards with the help of several registrar agencies composed of stateowned entities and departments as well as public sector banks and entities such as the Life Insurance Corporation of India. UIDAI works in consultation with the Registrar General of India, which is responsible for census data in India Conclusion: The move to introduce an untested virtual ID to address security concerns over Aadhaar database is a step in the right direction, but may be a case of too little, too late, according to experts, as many of the 119 crore Aadhaar holders have already shared their 12-digit numbers with various entities. Unless all entitites are required to use virtual IDs or UID tokens, and are barred from storing Aadhaar numbers, the new measures won t really help. 4 P a g e ******** National IAS Academy , Lucky Paradise, 2nd floor, 8th 'F' main road, 22nd cross, Opp. ICICI bank,

5 3rd Block, Jayanagar, Bangalore P a g e

Public Key Infrastructure & esign in India November 2015

Public Key Infrastructure & esign in India November 2015 Public Key Infrastructure & esign in India November 2015 Vikash Chourasia CDAC Noida Controller of Certifying Authorities Department of Electronics and Information Technology Ministry of Communications

More information

Lecture 41 Blockchain in Government III (Digital Identity)

Lecture 41 Blockchain in Government III (Digital Identity) Blockchains Architecture, Design and Use Cases Prof. Sandip Chakraborty Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture 41 Blockchain in Government III

More information

Central Depository Services (India) Limited

Central Depository Services (India) Limited Central Depository Services (India) Limited A Wing, 25th Floor, Marathon Futurex, Mafatlal Mills Compounds, N.M.Joshi Marg, Lower Parel East, Mumbai-400013 Tel:23023333 www.cdslindia.com Page 1 of 6 e-kyc

More information

Challenges in Aadhaar Implementation : Opportunities for products and innovations Proposal Presentation

Challenges in Aadhaar Implementation : Opportunities for products and innovations Proposal Presentation Challenges in Aadhaar Implementation : Opportunities for products and innovations Proposal Presentation 27 May 2011 ?????? Conception is easy Delivery is difficult 2 Agenda About Aadhaar- What the world

More information

e-sign and TimeStamping

e-sign and TimeStamping e-sign and TimeStamping Dr. Balaji Rajendran Centre for Development of Advanced Computing (C-DAC) Bangalore Under the Aegis of Controller of Certifying Authorities (CCA) Government of India 1 Recent Developments:

More information

esign - Evolving Opportunities and Applications C E N T R E F O R D E V ELOPMENT O F A D VANCED C O MPUTING N O V E M B E R 1 5,

esign - Evolving Opportunities and Applications C E N T R E F O R D E V ELOPMENT O F A D VANCED C O MPUTING N O V E M B E R 1 5, esign - Evolving Opportunities and Applications C E N T R E F O R D E V ELOPMENT O F A D VANCED C O MPUTING N O V E M B E R 1 5, 2 0 1 7 Presentation Outline e-sign Architecture Interesting Challenges

More information

The Aadhaar Project NANDAN NILEKANI CHAIRMAN UNIQUE IDENTIFICTION AUTHORITY OF INDIA

The Aadhaar Project NANDAN NILEKANI CHAIRMAN UNIQUE IDENTIFICTION AUTHORITY OF INDIA The Aadhaar Project NANDAN NILEKANI CHAIRMAN UNIQUE IDENTIFICTION AUTHORITY OF INDIA OVERALL MANDATE OF THE AADHAAR PROJECT AADHAAR AND IT S POTENTIAL DIRECT BENEFIT TRANSFER AND AADHAAR WHY AADHAAR FOR

More information

Identity Proofing Standards and Beyond

Identity Proofing Standards and Beyond Solutions for Health Care Providers Identity Proofing Standards and Beyond Kimberly Little Sutherland LexisNexis Risk Solutions Sr. Director, Identity Management Solution Strategy Agenda Identity Proofing

More information

A National e-authentication Service

A National e-authentication Service e-pramaan A National e-authentication Service State of Art Disparate methods of authentication across e-gov Services Unsecured communication channel for credential exchange in multiple cases Non-availability

More information

Aadhaar. Scalability & Data Management Challenges. Dr. Pramod K. Varma. Chief Architect, UIDAI

Aadhaar. Scalability & Data Management Challenges. Dr. Pramod K. Varma. Chief Architect, UIDAI Aadhaar Scalability & Data Management Challenges Dr. Pramod K. Varma Chief Architect, UIDAI twitter.com/pramodkvarma pramodkvarma.com Understanding Aadhaar System 2 Establishing ID is a Challenge Issue

More information

REPOSITORY ACCOUNT OPENING MANUAL

REPOSITORY ACCOUNT OPENING MANUAL REPOSITORY ACCOUNT OPENING MANUAL Version 1.0 September 2017 Page 1 of 11 INDEX 1. Abbreviations... 3 2. General Guidelines... 3 3. Proof of Identity (POI)... 4 4. Proof of Address (POA)... 4 5. Account

More information

Aadhar card photo id software. Aadhar card photo id software.zip

Aadhar card photo id software. Aadhar card photo id software.zip Aadhar card photo id software Aadhar card photo id software.zip 17/04/2013 Freedom fighter photo card Government photo ID cards Aadhaar UID Biometric Card How To Aadhaar UID Biometric Card How To Enrollment

More information

Aaple Sarkar DBT Portal

Aaple Sarkar DBT Portal Aaple Sarkar DBT Portal Aaple Sarkar DBT Portal (Direct Benefit Transfer) is an initiative taken by the Government of Maharashtra, which is a unique Platform for Citizens to help them to avail benefits

More information

Demographic Update through Update Client Lite (UCL)

Demographic Update through Update Client Lite (UCL) CSC e-governance Services India Limited, Ministry of Communications & Information Technology, Electronics Niketan, 3rd Floor, DeitY, 6 CGO Complex, Lodhi Road, New Delhi 110003 Phone : - 011-24301349 Operator

More information

KSi Malta Privacy Policy

KSi Malta Privacy Policy KSi Malta Privacy Policy CONTENTS KSi Malta Privacy Policy 6 Details about the data controller & Scope 6 How information is collected from you 7 Legal basis of data processing 8 What information we collect

More information

Can eid card make life easier and more secure? Michal Ševčík Industry Solution Consultant Hewlett-Packard, Slovakia ITAPA, November 9 th, 2010

Can eid card make life easier and more secure? Michal Ševčík Industry Solution Consultant Hewlett-Packard, Slovakia ITAPA, November 9 th, 2010 Can eid card make life easier and more secure? Michal Ševčík Industry Solution Consultant Hewlett-Packard, Slovakia ITAPA, November 9 th, 2010 Content eid Primary Functions eid Privacy Features and Security

More information

May MapR Technologies 2014 MapR Technologies 1

May MapR Technologies 2014 MapR Technologies 1 MapR Technologies May 2016 1 Largest Biometric Database in the World 20 BILLION BIOMETRICS PEOPLE 2 3 Unique Identity Authority of India: Vision To empower residents of India with a unique identity and

More information

Directive on Security of Network and Information Systems

Directive on Security of Network and Information Systems European Commission - Fact Sheet Directive on Security of Network and Information Systems Brussels, 6 July 2016 Questions and Answers The European Parliament's plenary adopted today the Directive on Security

More information

eid Applications Cross Border Authentication

eid Applications Cross Border Authentication eid Applications Cross Border Authentication 07 November 2017 Mr. Gary Yeung, MH Hon Secretary Chairman, eid Committee Smart City Consortium Smart City Consortium Background What is Smart City Consortium?

More information

Birendra Kumar Mishra. Director General Department of Information Technology Ministry Of Science and Technology Government of Nepal

Birendra Kumar Mishra. Director General Department of Information Technology Ministry Of Science and Technology Government of Nepal Birendra Kumar Mishra Director General Department of Information Technology Ministry Of Science and Technology Government of Nepal Area Total: 147,141 Sq. Km Mountains and Hill: 83 % Terai(flat Land):

More information

US Constitution. Articles I-VII

US Constitution. Articles I-VII US Constitution Articles I-VII Quick Questions ª What is the Constitution? ª What is the Preamble? ª What are the Articles and their purpose? Preamble http://www.schooltube.com/video/03f9c858260a4da9b582/

More information

Unclaimed Wages - Department of Labor

Unclaimed Wages - Department of Labor Unclaimed Wages - Department of Labor The following information corresponds to Section 1308 of New York s Abandoned Property Law. For more information, refer to Section 1308 of the statute. This document

More information

Electronic signature framework

Electronic signature framework R E P U B L I C O F S E R B I A Negotation Team for the Accession of Republic of Serbia to the European Union Working Group for Chapter 10 Information society and media Electronic signature framework Contents

More information

Aadhaar Authentication Failure in the Public Distribution System of Andhra Pradesh

Aadhaar Authentication Failure in the Public Distribution System of Andhra Pradesh DIRI Data Brief: 01 Aadhaar Authentication Failure in the Public Distribution System of Andhra Pradesh Siddharth Sekhar Singh and Ashwini Chhatre April 2018 Key Facts The average Aadhaar authentication

More information

TRUSTIS FPS. Enrolment Requirements: Acceptable Evidence in Support of an Application for a Digital Certificate

TRUSTIS FPS. Enrolment Requirements: Acceptable Evidence in Support of an Application for a Digital Certificate TRUSTIS FPS Enrolment Requirements: Acceptable Evidence in Support of an Application for a Digital Certificate Important Notice: The information here is guidance on the minimum requirements of Enrolment

More information

HF Markets SA (Pty) Ltd Protection of Personal Information Policy

HF Markets SA (Pty) Ltd Protection of Personal Information Policy Protection of Personal Information Policy Protection of Personal Information Policy This privacy statement covers the website www.hotforex.co.za, and all its related subdomains that are registered and

More information

Mobile Financial Services. Ms. Vinod Kotwal Advisor (F&EA), TRAI

Mobile Financial Services. Ms. Vinod Kotwal Advisor (F&EA), TRAI Mobile Financial Services Ms. Vinod Kotwal Advisor (F&EA), TRAI Mobile Financial Services Ms. Vinod Kotwal Advisor (F&EA), TRAI 20 th September 2016 25 countries account for 73% of the world s unbanked

More information

Regulations on production, export, import, circulation and business of audio and video tapes and discs on music and stage performances

Regulations on production, export, import, circulation and business of audio and video tapes and discs on music and stage performances Regulations on production, export, import, circulation and business of audio and video tapes and discs o Regulations on production, export, import, circulation and business of audio and video tapes and

More information

SOLUTION ARCHITECTURE AND TECHNICAL OVERVIEW. Decentralized platform for coordination and administration of healthcare and benefits

SOLUTION ARCHITECTURE AND TECHNICAL OVERVIEW. Decentralized platform for coordination and administration of healthcare and benefits SOLUTION ARCHITECTURE AND TECHNICAL OVERVIEW Decentralized platform for coordination and administration of healthcare and benefits ENABLING TECHNOLOGIES Blockchain Distributed ledgers Smart Contracts Relationship

More information

UIDAI, RO Guwahati. Application & Authentication Division Unique Identification Authority of India New Delhi

UIDAI, RO Guwahati. Application & Authentication Division Unique Identification Authority of India New Delhi UIDAI, RO Guwahati Application & Authentication Division Unique Identification Authority of India New Delhi 1 What is Aadhaar? A Unique 12 digit number issued to resident of India It uses demographics

More information

ACCOUNT OPENING MANUAL

ACCOUNT OPENING MANUAL ACCOUNT OPENING MANUAL Guidelines related to Account Category, Account Title and Documents required at the time of Account opening. Account Opening Manual Page 1 Sr.no Topic Page No 1 General Guidelines

More information

Section I. GENERAL PROVISIONS

Section I. GENERAL PROVISIONS LAW OF THE RUSSIAN FEDERATION NO. 5151-1 OF JUNE 10, 1993 ON CERTIFICATION OF PRODUCTS AND SERVICES (with the Additions and Amendments of December 27, 1995, March 2, July 31, 1998) Federal Law No. 154-FZ

More information

Travelers Checks and Money Orders Non-Banking Organizations

Travelers Checks and Money Orders Non-Banking Organizations Travelers Checks and Money Orders Non-Banking Organizations The following information corresponds to Section 1309 of New York s Abandoned Property Law. For more information, refer to Section 1309. This

More information

NATIONAL PROGRAMME Chapter 15 Telecommunication and Post. Telecommunication and Post

NATIONAL PROGRAMME Chapter 15 Telecommunication and Post. Telecommunication and Post Introduction Telecommunication and Post The n legislation in the field of telecommunication and post is almost in full incompliance with that of the EU, except for certain legal rules on general legal

More information

MERGING NPR and UID???

MERGING NPR and UID??? MERGING NPR and UID??? Some purely personal (unofficial) thoughts by Rajesh Aggarwal, IAS Principal Secretary, Information Technology, Government of Maharashtra Draft Version 1.0 dated 1 st June 2014 This

More information

Submission Cover Page

Submission Cover Page Submission Cover Page Fees Correspondence related to this submission will be sent to you using the contact information provided in the Submitter Information section of the form. Submission Fee: $ (go to

More information

UT HEALTH SAN ANTONIO HANDBOOK OF OPERATING PROCEDURES

UT HEALTH SAN ANTONIO HANDBOOK OF OPERATING PROCEDURES ACCESS MANAGEMENT Policy UT Health San Antonio shall adopt access management processes to ensure that access to Information Resources is restricted to authorized users with minimal access rights necessary

More information

AADHAAR PAYMENT BRIDGE SYSTEM

AADHAAR PAYMENT BRIDGE SYSTEM VERSION 1.1 SEPTEMBER 17, 2016 AADHAAR PAYMENT BRIDGE SYSTEM FAQ-BANK NATIONAL PAYMENTS CORPORATION OF INDIA Frequently Asked Questions (FAQs) on Aadhaar Payment Bridge (APB) System 1) What is Aadhaar

More information

PERSONAL DATA PROCESSING POLICY FOR SUPPLIER

PERSONAL DATA PROCESSING POLICY FOR SUPPLIER PERSONAL DATA PROCESSING POLICY FOR SUPPLIER 1. Definitions. In accordance with current legislation on the subject definitions are: a) Authorization: Expressed and informed prior consent of the Data Subject

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK A PROPOSAL FOR UNIQUE IDENTIFICATION NUMBER FOR ALL ONLINE ACCOUNT HOLDERS TO CURB

More information

Instructions to fill ecan form. 2. You have a provision to fill a new form as well as retrieve an already filled up form.

Instructions to fill ecan form. 2. You have a provision to fill a new form as well as retrieve an already filled up form. Instructions to fill ecan form 1. ecan An easy way to open a Common Account Number (CAN) 2. You have a provision to fill a new form as well as retrieve an already filled up form. 3. For both purposes,

More information

Privacy Statement. Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information

Privacy Statement. Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information Privacy Statement Introduction Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information about how IT Support (UK) Ltd handle personal information.

More information

Privacy Notice. Lonsdale & Marsh Privacy Notice Version July

Privacy Notice. Lonsdale & Marsh Privacy Notice Version July Privacy Notice Lonsdale & Marsh understands that your privacy is important to you and that you care about how your personal data is used. We respect and value the privacy of all of our clients and will

More information

Our Commitment To Privacy PRIVACY POLICY. Last Modified July 26, 2018

Our Commitment To Privacy PRIVACY POLICY. Last Modified July 26, 2018 Our Commitment To Privacy PRIVACY POLICY Last Modified July 26, 2018 Please read this Privacy Policy carefully before using this online entertainment service. Access to and use of this online entertainment

More information

Identity Ecosystem Design challenges. Wim Coulier eidas Expert Belgian Mobile ID

Identity Ecosystem Design challenges. Wim Coulier eidas Expert Belgian Mobile ID Identity Ecosystem Design challenges Wim Coulier eidas Expert Belgian Mobile ID Belgian Mobile ID respects the guidelines provided by is the reference for digital identification and authentication in Belgium

More information

CHESS Release 10.0 Business and Technical Specification

CHESS Release 10.0 Business and Technical Specification CHESS Release 10.0 Business and Technical Specification ASX mfund Enhancements CHESS 10 Version: 1.6 Publication Date: 13 July 2018 Property of: ASX Operations Pty Limited Document History Version No.

More information

FAQ: Privacy, Security, and Data Protection at Libraries

FAQ: Privacy, Security, and Data Protection at Libraries FAQ: Privacy, Security, and Data Protection at Libraries This FAQ was developed out of workshops and meetings connected to the Digital Privacy and Data Literacy Project (DPDL) and Brooklyn Public Library

More information

eidas Regulation eid and assurance levels Outcome of eias study

eidas Regulation eid and assurance levels Outcome of eias study eidas Regulation eid and assurance levels Outcome of eias study Dr. Marijke De Soete Security4Biz (Belgium) ETSI eidas Workshop 24 June 2015 Sophia Antipolis eidas Regulation Regulation on electronic identification

More information

Digital Solutions. January, 2016

Digital Solutions. January, 2016 Digital Solutions January, 2016 This document provides an outline of a presentation and is incomplete without the accompanying oral commentary and discussion. Conclusions and/ or potential strategies contained

More information

Singapore s National Digital Identity (NDI):

Singapore s National Digital Identity (NDI): Singapore s National Digital Identity (NDI): Leaving no one behind Kwok Quek Sin Director, National Digital Identity Programme Government Technology Agency PART 1 INTRODUCTION TO NDI Better Living For

More information

Federal Ministry of Budget & National Planning TACKLING NIGERIA'S INFRASTRUCTURE DEFICIT THROUGH PUBLIC PRIVATE PARTNERSHIPS

Federal Ministry of Budget & National Planning TACKLING NIGERIA'S INFRASTRUCTURE DEFICIT THROUGH PUBLIC PRIVATE PARTNERSHIPS Federal Ministry of Budget & National Planning TACKLING NIGERIA'S INFRASTRUCTURE DEFICIT THROUGH PUBLIC PRIVATE PARTNERSHIPS SUMMIT CONVENORS His Excellency Prof. Yemi Osinbajo SAN Vice President, Federal

More information

This guide is for informational purposes only. Please do not treat it as a substitute of a professional legal

This guide is for informational purposes only. Please do not treat it as a substitute of a professional legal What is GDPR? GDPR (General Data Protection Regulation) is Europe s new privacy law. Adopted in April 2016, it replaces the 1995 Data Protection Directive and marks the biggest change in data protection

More information

FCC USAC Joint Training Event

FCC USAC Joint Training Event FCC USAC Joint Training Event Certification and Recertification June 19, 2012 Washington, DC To edit this footer, select the View tab, then Slide Master and edit the first Master Slide. 1 Initial Certification

More information

Developing and Implementing Data Protection Law: Malaysia and Beyond

Developing and Implementing Data Protection Law: Malaysia and Beyond Developing and Implementing Data Protection Law: Malaysia and Beyond Professor Abu Bakar Munir Faculty of Law, University of Malaya Malaysia K&K Advocates - Expert Panel Discussion on Data Protection Jakarta,

More information

We collect information from you when You register for an Traders account to use the Services or Exchange and when You use such Services. V.

We collect information from you when You register for an Traders account to use the Services or Exchange and when You use such Services. V. Privacy Policy General A. The parties involved in reference to this policy are Company and You, the User of these sites: www.bittrademarket.com A.1 Bittrade Market decentralize system is the publisher

More information

Legislative Decree. Legislative Decree. President of the Government of Islamic Republic of Afghanistan,

Legislative Decree. Legislative Decree. President of the Government of Islamic Republic of Afghanistan, Legislative Decree Ref: 60 Date: 26/ 5/1394 Legislative Decree President of the Government of Islamic Republic of Afghanistan, with regards to Approving Telecommunication Service Charge Law Article One:

More information

Legal framework of ensuring of cyber security in the Republic of Azerbaijan

Legal framework of ensuring of cyber security in the Republic of Azerbaijan Legal framework of ensuring of cyber security in the Republic of Azerbaijan Bakhtiyar N.Mammadov Ministry of Communications and Information Technologies Head of Legal and HR Department ITU WSIS Thematic

More information

Regulating for a Digital Economy

Regulating for a Digital Economy Regulating for a Digital Economy Discussant s Remarks by Ambassador Asoke Kumar Mukerji, former Permanent Representative of India to the United Nations At Brookings India, New Delhi 20 April 2018 3 Issues

More information

Go Cloud. VMware vcloud Datacenter Services by BIOS

Go Cloud. VMware vcloud Datacenter Services by BIOS Go Cloud VMware vcloud Datacenter Services by BIOS Is your IT infrastructure always in tune with your business? If a market opportunity suddenly arises, can your business respond in time? Or is the opportunity

More information

MUTUAL RECOGNITION MECHANISMS. Tahseen Ahmad Khan

MUTUAL RECOGNITION MECHANISMS. Tahseen Ahmad Khan MUTUAL RECOGNITION MECHANISMS Tahseen Ahmad Khan TABLE OF CONTENTS Background: Why Mutual Recognition is important? Electronic Data and its inherent nature Scope of mutual recognition, need to go beyond

More information

DISCLOSURE ON THE PROCESSING OF PERSONAL DATA LAST REVISION DATE: 25 MAY 2018

DISCLOSURE ON THE PROCESSING OF PERSONAL DATA LAST REVISION DATE: 25 MAY 2018 DISCLOSURE ON THE PROCESSING OF PERSONAL DATA LAST REVISION DATE: 25 MAY 2018 Introduction This disclosure on the processing of personal data (hereinafter, the "Disclosure") is provided pursuant to Art.

More information

GDPR RECRUITMENT POLICY

GDPR RECRUITMENT POLICY > General characteristics Company Credendo Export Credit Agency Date 12/12/2018 Version 1.2 Classification Public Status Final Document reference GDPR Recruitment Policy Revision frequency Ad hoc Document

More information

Unique ID Management Mrs. Hemangi Kulkarni, Aniket Yadav, Darpan Shah, Pratik Bhandari, Samuya Mahapatra

Unique ID Management Mrs. Hemangi Kulkarni, Aniket Yadav, Darpan Shah, Pratik Bhandari, Samuya Mahapatra Unique ID Management Mrs. Hemangi Kulkarni, Aniket Yadav, Darpan Shah, Pratik Bhandari, Samuya Mahapatra Department of Computer Engineering, Pune University Address hemangikulkarni21@gmail.com ayadav4003@gmail.com

More information

Plan a Pragmatic Approach to the new EU Data Privacy Regulation

Plan a Pragmatic Approach to the new EU Data Privacy Regulation AmChamDenmark event: EU Compliant & Cyber Resistant Plan a Pragmatic Approach to the new EU Data Privacy Regulation Janus Friis Bindslev, Partner Cyber Risk Services, Deloitte 4 February 2016 Agenda General

More information

CHESS Release 10.0 Business and Technical Specification

CHESS Release 10.0 Business and Technical Specification CHESS Release 10.0 Business and Technical Specification ASX mfund Enhancements CHESS 10 Version: 1.8 Publication Date: 1 August 2018 Property of: ASX Operations Pty Limited Copyright 2018 ASX Limited ABN

More information

Call for Expressions of Interest

Call for Expressions of Interest Call for Expressions of Interest ENISA M/CEI/17/T01 Experts for assisting in the implementation of the annual ENISA Work Programme TECHNICAL DESCRIPTION CONTENTS TECHNICAL DESCRIPTION... 3 1. INTRODUCTION...

More information

AADHAAR AUTHENTICATION API SPECIFICATION VERSION 1.0

AADHAAR AUTHENTICATION API SPECIFICATION VERSION 1.0 UIDAI Unique Identification Authority of India Planning Commission, Govt. of India (GoI), 3rd Floor, Tower II, Jeevan Bharati Building, Connaught Circus, New Delhi 110001 AADHAAR AUTHENTICATION API SPECIFICATION

More information

Barry Lowry Government CIO September Digitising Ireland the Government Chief Information Officer's Perspective

Barry Lowry Government CIO September Digitising Ireland the Government Chief Information Officer's Perspective Barry Lowry Government CIO September 2016 Digitising Ireland the Government Chief Information Officer's Perspective We all have a Digital Challenge! Go Digital or Go Home Mark Raskino (Gartner) So who

More information

ECA Trusted Agent Handbook

ECA Trusted Agent Handbook Revision 8.0 September 4, 2015 Introduction This Trusted Agent Handbook provides instructions for individuals authorized to perform personal presence identity verification of subscribers enrolling for

More information

2. What is Personal Information and Non-Personally Identifiable Information?

2. What is Personal Information and Non-Personally Identifiable Information? Privacy Notice Snipp Interactive, Inc. Last Updated: February 11, 2016 Contents: 1. Introduction 2. What is Personal Information? 3. Information we collect about you 4. Use of Your Information 5. Location

More information

E-Signature Law of Iraq no. ( 78) of 2012

E-Signature Law of Iraq no. ( 78) of 2012 INTER-REGIONAL STANDARDIZATION FORUM FOR BRIDGING THE STANDARDIZATION GAP (BSG) Muscat, Oman, 11-12 December 2017 E-Signature Law of Iraq no. ( 78) of 2012 Halah Alrubaye Projects follow-up manager, Ministry

More information

Senior Deputy Director Ministry of Knowledge Economy Sungmin Lim

Senior Deputy Director Ministry of Knowledge Economy Sungmin Lim E-Document Regulations and Businesses in South Korea September 19, 2012 Senior Deputy Director Ministry of Knowledge Economy Sungmin Lim Contents Ⅰ Background Ⅱ Latest Developments Ⅲ Future Plans Ⅳ Estimated

More information

Securing Americans Identities: The Future of the Social Security Number

Securing Americans Identities: The Future of the Social Security Number Cha : Testimony, SASC 04 /25 /2017 1 Statement Before the House Ways and Means Subcommittee on Social Security Securing Americans Identities: The Future of the Social Security Number A Testimony by: James

More information

Do you handle EU residents personal data? The GDPR update is coming May 25, Are you ready?

Do you handle EU residents personal data? The GDPR update is coming May 25, Are you ready? European Union (EU) General Data Protection Regulation (GDPR) Do you handle EU residents personal data? The GDPR update is coming May 25, 2018. Are you ready? What do you need to do? Governance and Accountability

More information

Mobile Driver s License Region IV May 24, 2017 Seattle, WA

Mobile Driver s License Region IV May 24, 2017 Seattle, WA Mobile Driver s License 2017 Region IV May 24, 2017 Seattle, WA Presenter: Loffie Jordaan Senior Project Manager, AAMVA 2 Introduction & background CDS Committee & eid WG What is a mdl? Functional requirements

More information

I am a normal taxpayer. GST New Registration Procedure

I am a normal taxpayer. GST New Registration Procedure ST New Registration Procedure Step by Step guide with Screenshots. GST New Taxpayer Registration is started from 25-06-2017 (25th June 2017), Here we provide GST New Registration Step by Step Guide at

More information

Aadhaar enabled Public Distribution System in Haryana

Aadhaar enabled Public Distribution System in Haryana DIRI Data Brief Aadhaar enabled Public Distribution System in Haryana Siddharth Sekhar Singh and Ashwini Chhatre January 2019 Key Facts Authentication failure rates in the State declined to.5% of all Active

More information

Aadhaar enabled Public Distribution System in Delhi

Aadhaar enabled Public Distribution System in Delhi DIRI Data Brief: 03 Aadhaar enabled Public Distribution System in Delhi Siddharth Sekhar Singh and Ashwini Chhatre June 2018 Key Facts The authentication failure rate for active ration cards in Delhi-

More information

A Background Note. Aadhaar - Issues and Implications

A Background Note. Aadhaar - Issues and Implications A Background Note On Aadhaar - Issues and Implications Contents Introduction... 3 Aadhaar Act... 3 Targets, Performance and Achievements of the Scheme... 4 1. Aadhaar Enrolment:... 4 2. Authentication

More information

IFEA Risk Management and Cybercrime

IFEA Risk Management and Cybercrime IFEA Risk Management and Cybercrime Digital information technology is becoming ever more deeply and rapidly entrenched in our society. It won t be long before everyone is permanently connected to each

More information

DIGITAL FINANCIAL INCLUSION FOR MONGOLIA

DIGITAL FINANCIAL INCLUSION FOR MONGOLIA DIGITAL FINANCIAL INCLUSION FOR MONGOLIA ITU-TRAI Asia-Pacific Regulators Roundtable, 21-22 August 2017 D.SEREEDORJ Vice Chairman Communications Regulatory Commission of Mongolia 1. Country profile 2.

More information

API 2.0 Error Handling document

API 2.0 Error Handling document API 2.0 Error Handling document API Error 100 200 "Pi" (basic) attributes of demographic data did not match "Pa" (address) attributes of demographic data did not match User should be allowed to reenter

More information

Special requirements for CITSS users who have been approved by other jurisdictions and are representing a participant in Nova Scotia

Special requirements for CITSS users who have been approved by other jurisdictions and are representing a participant in Nova Scotia Guidance Document: User Registration in CITSS The first step in the process is user registration. To apply, you cannot have been: Convicted of a criminal offence in the last 5 years, unless a pardon has

More information

Sustainable Consumption and Production

Sustainable Consumption and Production Sustainable Consumption and Production Resolution 2/8 Charles Arden-Clarke Head, Secretariat 10 Year Framework of Programmes on Sustainable Consumption and Production/One Planet Network CPR Meeting 28

More information

EUROPEAN COMMISSION DIRECTORATE-GENERAL INFORMATION SOCIETY AND MEDIA

EUROPEAN COMMISSION DIRECTORATE-GENERAL INFORMATION SOCIETY AND MEDIA Ref. Ares(2011)514527-12/05/2011 EUROPEAN COMMISSION DIRECTORATE-GENERAL INFORMATION SOCIETY AND MEDIA Electronic Communications Policy Implementation of Regulatory Framework (I) Brussels, 6th May 2011

More information

Society for Range Management

Society for Range Management Society for Range Management PROCEDURES FOR CERTIFICATION AS A PROFESSIONAL IN RANGELAND MANAGEMENT (CPRM) Purpose To certify individuals who have the professional credentials required to plan and implement

More information

DECREE OF THE MINISTER OF COMMUNICATION AND INFORMATION TECHNOLOGY NUMBER: 14/PER/M.KOMINFO/09/2010

DECREE OF THE MINISTER OF COMMUNICATION AND INFORMATION TECHNOLOGY NUMBER: 14/PER/M.KOMINFO/09/2010 DECREE OF THE MINISTER OF COMMUNICATION AND INFORMATION TECHNOLOGY NUMBER: 14/PER/M.KOMINFO/09/2010 ON PROCEDURE OF EVALUATING ACHIEVEMENT ON THE LEVEL OF DOMESTIC COMPONENT IN OPERATIONAL EXPENDITURE/OPEX

More information

ETNO Reflection Document on the EC Proposal for a Directive on Network and Information Security (NIS Directive)

ETNO Reflection Document on the EC Proposal for a Directive on Network and Information Security (NIS Directive) ETNO Reflection Document on the EC Proposal for a Directive on Network and Information Security (NIS Directive) July 2013 Executive Summary ETNO supports the European Commission s global approach to cyber-security

More information

Registration Application > Normal Taxpayer/ Composition/ Casual Taxable Person/ Input Service Distributor (ISD)/ SEZ Developer/ SEZ Unit

Registration Application > Normal Taxpayer/ Composition/ Casual Taxable Person/ Input Service Distributor (ISD)/ SEZ Developer/ SEZ Unit Registration Application > Normal Taxpayer/ Composition/ Casual Taxable Person/ Input Service Distributor (ISD)/ SEZ Developer/ SEZ Unit I am a Normal Taxpayer/ Composition/ Casual Taxable Person/ Input

More information

2014 ISACA Academic Scholarship Competition DUE DATE EXTENDED TO MAY 1, 2014

2014 ISACA Academic Scholarship Competition DUE DATE EXTENDED TO MAY 1, 2014 2014 ISACA Academic Scholarship Competition DUE DATE EXTENDED TO MAY 1, 2014 ISACA is a pace-setting global organization for IT professionals focusing on information governance, security and audit. IT

More information

DEPARTMENT OF JUSTICE AND EQUALITY. Data Protection Policy

DEPARTMENT OF JUSTICE AND EQUALITY. Data Protection Policy DEPARTMENT OF JUSTICE AND EQUALITY Data Protection Policy May 2018 Contents Page 1. Introduction 3 2. Scope 3 3. Data Protection Principles 4 4. GDPR - Rights of data subjects 6 5. Responsibilities of

More information

Diana Korka Economic Affairs Officer, ICT Policy Section UNCTAD

Diana Korka Economic Affairs Officer, ICT Policy Section UNCTAD Diana Korka Economic Affairs Officer, ICT Policy Section UNCTAD UNESCAP Regional Consultation on e-commerce for Sustainable Development in Asia and the Pacific Bangkok, 30 October 2017 Information Economy

More information

FOREIGN NATIONAL INFORMATION (FNIS) DATA ENTRY SESSION

FOREIGN NATIONAL INFORMATION (FNIS) DATA ENTRY SESSION INTERNATIONAL STUDENTS FOREIGN NATIONAL INFORMATION (FNIS) DATA ENTRY SESSION Before You Start YOU WILL NEED YOUR: Passport/VISA I-94 (for entry dates in U.S.) https://i94.cbp.dhs.gov/i94/request.html

More information

Within the meanings of applicable data protection law (in particular EU Regulation 2016/679, the GDPR ):

Within the meanings of applicable data protection law (in particular EU Regulation 2016/679, the GDPR ): Privacy Policy Introduction Ikano S.A. ( Ikano ) respects your privacy and is committed to protect your Personal Data by being compliant with this privacy policy ( Policy ). In addition to Ikano, this

More information

Emergency Nurses Association Privacy Policy

Emergency Nurses Association Privacy Policy Emergency Nurses Association Privacy Policy The Emergency Nurses Association ( ENA, we, or us ) has created and posted this privacy policy in an effort to maintain efficient service while respecting your

More information

E Government in Tonga

E Government in Tonga Asia Pacific Regional Forum on e Government, 19 20 August 2015, Bangkok E Government in Tonga Presented by: Mr. Paula P. Ma u CEO MEIDECC Presentation Outline I. Background II. National ICT Plan III. E

More information

Next Stage in Korea's e-government

Next Stage in Korea's e-government Page 1 of 5 Next Stage in Korea's e-government 1. Changes & Challenges Society Government IT - Internal] Rapid aggravation of socio-structural challenges resulting from widening gap between different income

More information

Recognition as an Account Agent (User Registration) in the Compliance Instrument Tracking System Service (CITSS)

Recognition as an Account Agent (User Registration) in the Compliance Instrument Tracking System Service (CITSS) Ontario s Cap and Trade Program How to Participate: Recognition as an Account Agent (User Registration) in the Compliance Instrument Tracking System Service (CITSS) ontario.ca/capandtrade Table of contents

More information

BENCHMARKING PPP PROCUREMENT 2017 IN GABON

BENCHMARKING PPP PROCUREMENT 2017 IN GABON BENCHMARKING PPP PROCUREMENT 2017 IN GABON Regulatory and Institutional Framework for PPPs framework in your country allow procuring PPPs?. If yes, please specify the relevant regulatory framework and

More information

Efficient, broad-based solution for a Swiss digital ID

Efficient, broad-based solution for a Swiss digital ID Press release November 21, 2017 Government and private sector produce joint solution Efficient, broad-based solution for a Swiss digital ID The people of this country should have a simple, secure and unambiguous

More information