Anand, a young student, is enthusiastically filling up his college admission form. He submits the form and is on the verge of completing everything when suddenly he realises he has forgotten his wallet at home. But he does not panic. He walks in to the nearest bank and gives his bank ID and Aadhaar number. His biometric details are checked and he is able to log into his account and withdraws the money. Does this sound unreal? Should not and yet it does!! It is not any paradox, only that, facts are still half-baked, people unclear, and to a large extent ignorant.
Over 200 million residents across the country have been enrolled in Phase - I of UID and more than 165 million Aadhaar numbers have been generated and delivered. Appreciable effort no doubt, but banks or similar financial institutions and government agencies are yet to link Aadhaar number to their customer database, rather more effectively put as, yet to even have technological provision to include UID within customer database at their backend centers.
Sumnesh Joshi, Assistant Director General, Unique Identification Authority of India (UIDAI), laments, “as on date, we have had several rounds of meetings with public sector banks, but still no bank is coming forward to change their system.” “I don’t know what are they waiting for?” asks Joshi. Identification of these bottlenecks is essential to align the delivery and expectation.
Elaborating on technological trends in services delivery, D B Kiran, Microsoft Corporation (India) stresses on cloud computing as the key to manage national user interface. Client database is increasing by the day. Maintaining all data within a backend data centre has numerous limitations, not only physical but also restrictions arising due to lack of uniformity, cost, and easy accessibility. Technology offers a solution in the form of cloud, a virtual space to store databases in a ubiquitous environment with easy accessibility available through widely existing Internet and broadband network.
Cloud functions through a self-serviced architecture and hence anyone can access client information as per their requirements. Since all information remains stored onto a single platform, doubts concerning uniformity are nullified. Obviously infrastructure costs of storing data scale down extensively, which in other times normally account for 30 to 40 per cent of IT costs. Public Sector Undertakings (PSUs) stand to benefit largely from cloud as their database is eternally increasing and it is not possible to keep pace with available infrastructure and still maintain costs.
The high point of cloud service lies in its simplicity. As it is built within a proper business critical environment, questions about adaptability or any chance of mis-match do not arise. Further there are no elaborate procedures; it is too simple for even minute chance of error to occur. Also, the multi-layered security system offers complete encryption of all data. Cloud offers a 3-in-1 solution of software, infrastructure, and hosting services available on a single platform.
Nonetheless, Alok Saxena, Deputy Director General (Technology), Department of Posts, is vociferous in his reservations about cloud. Despite strong indications of cloud being the future trend, he admits, “as of now, in our regulations cloud does not figure right on top. So there are limitations that we have.” Certainly, these limitations hint majorly and singularly towards security concerns. On the other hand, Anil Lad, Systems Manager, Kalyan Dombiwali Municipal Corporation, brings out a completely different angle of cloud. Although cloud is already in use at Kalyan Dombiwali Municipal Corporation, doubts abound regarding security of personal information or more aptly described as privacy of information. While discrepancies or irregularities in monetary transactions can be tracked and resolved, there is no regulation to track and nail divulgence of personal information.
However, Deepak Maheshwari, Vice President-Public Policy, South Asia, MasterCard Worldwide, contradicts this fact altogether. The core essence of MasterCard functionality lies in absolute and total security of data with equal stress on privacy. MasterCard transactions are completed within few seconds and there are no security issues at all. He cites the example of recent two-factor authentication regulation of RBI for enhanced security and privacy of information. This establishes that cloud can assume different roles and deliver essential goods in varied disguises. The essence lies in modulating cloud to suit individual requirements of organisations.
Shying away from technology is not the solution. Instead, adapting to it can not only unravel and demystify services delivery as also prove to be extremely efficient. It saves on time, costs, documentation, and similar intricacies. Amongst all these, mobile technology available through phones, iPads, or tablets, is definitely one way to look forward. Mahendra Narayan Singh, District Informatics Officer, National Informatics Centre, says mobile technology has penetrated into every nook and corner of the country thereby offering extensive coverage and reach. Most villagers in remote corners use mobiles to maintain not only their land records but also certain financial dealings. He opines that identifying and classifying applications in tune with technology coupled with strict adherence to compliances and standards can erase security and privacy concerns.
Interestingly, UID is only an identity number; it is not a service or a solution in itself. UID should be incorporated within technological applications to deliver solutions and not talked about in isolation. It requires authentication agencies to collaborate and thereafter deliver services. Joshi stresses, “UID is a number that provides identity to its holder. For that everyone else has to develop their own applications, customise it....” Whether or not UID can cater to the growing population in terms of essential infrastructure and efficiency in delivering the end services is a question many are asking.
The need of the hour is to identify issues and develop applications to tackle these as and when they arise in future. While Aadhaar based financial inclusion has already started in Jharkhand, MGNREGA beneficiaries are being paid through biometric authentication and so are the scholarships but the challenge of scale still remains.
(Comments are welcome at email@example.com)
comments powered by Disqus
Department of Posts Modernisation Project Caught in a corporate time warp
Indian Financial Sector on the Edge of a Precipice
Regulating the Regulators
21 Decisions, 1 Cabinet Meeting: Reforms In-Situ
Taxing the Losers to Benefit the Gainers
Tap the Bullion Market, don't Push it Underground
Faster, stronger, higher
IT Disaster Recovery and Business Continuity Planning
Powering the Manufacturing Sector
Community Participation for Growth
Role of Cloud in Services Delivery