Professional Documents
Culture Documents
Chapter 3 Case
Chapter 3 Case
Introduction to IT, Operating Systems and Networks Vedant Jaydevkumar Patel ( 220015293)
Business of enterprise – “Adhaar ” system is not business purpose but it is for nation to
authenticate each citizens, to face corruption, for smooth delivery of government services.
Case questions –
1
CSCO 1000
Introduction to IT, Operating Systems and Networks Vedant Jaydevkumar Patel ( 220015293)
2. Courts decisions in many countries have stated that an individual’s privacy must be
balanced against the need of society. Does the Aadhaar system go too far in favour of the
need of society? Why and why not? Support your answer.
No, I am against this statement. In order to provide basic needs to benefitted people
only, it is necessary to identify that qualified people. For that, biometric proofs are
required. If system negotiates with structure to build the program, then illegal and
unqualified persons with fake identity can get benefited from program.
However, in terms of privacy breach, system can update their database with advanced
firewall protection. Also, government should know “need to know” terminology of
business and limits Aadhaar detail usage to authorized agency only that too with
extended cyber security structure. By this, a person’s privacy can be maintained.
Personal insight - For the countries with more populations like India, a Aadhaar system is ideal
for providing government benefits policies to people to get rid of fraudulent people. Meanwhile,
privacy of each should not disturb especially, when it comes to financial information.
Initially, this system was made for poor citizen so that they can reach out to basic needs like
food, gas, etc. Therefore, government should limits usage of Aadhaar system to basic necessity
only, instead of expanding it to banking advantages and other sectors. This makes system
trustable even if it notices breach of information as it is not linked with any financial accounts.
Protecting systems with advanced firewall can also be a solution but still there will be a risk of
breach.