Deprecated (16384): The ArrayAccess methods will be removed in 4.0.0.Use getParam(), getData() and getQuery() instead. - /home/brlfuser/public_html/src/Controller/ArtileDetailController.php, line: 73 You can disable deprecation warnings by setting `Error.errorLevel` to `E_ALL & ~E_USER_DEPRECATED` in your config/app.php. [CORE/src/Core/functions.php, line 311]Code Context
trigger_error($message, E_USER_DEPRECATED);
}
$message = 'The ArrayAccess methods will be removed in 4.0.0.Use getParam(), getData() and getQuery() instead. - /home/brlfuser/public_html/src/Controller/ArtileDetailController.php, line: 73 You can disable deprecation warnings by setting `Error.errorLevel` to `E_ALL & ~E_USER_DEPRECATED` in your config/app.php.' $stackFrame = (int) 1 $trace = [ (int) 0 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/ServerRequest.php', 'line' => (int) 2421, 'function' => 'deprecationWarning', 'args' => [ (int) 0 => 'The ArrayAccess methods will be removed in 4.0.0.Use getParam(), getData() and getQuery() instead.' ] ], (int) 1 => [ 'file' => '/home/brlfuser/public_html/src/Controller/ArtileDetailController.php', 'line' => (int) 73, 'function' => 'offsetGet', 'class' => 'Cake\Http\ServerRequest', 'object' => object(Cake\Http\ServerRequest) {}, 'type' => '->', 'args' => [ (int) 0 => 'catslug' ] ], (int) 2 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Controller/Controller.php', 'line' => (int) 610, 'function' => 'printArticle', 'class' => 'App\Controller\ArtileDetailController', 'object' => object(App\Controller\ArtileDetailController) {}, 'type' => '->', 'args' => [] ], (int) 3 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/ActionDispatcher.php', 'line' => (int) 120, 'function' => 'invokeAction', 'class' => 'Cake\Controller\Controller', 'object' => object(App\Controller\ArtileDetailController) {}, 'type' => '->', 'args' => [] ], (int) 4 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/ActionDispatcher.php', 'line' => (int) 94, 'function' => '_invoke', 'class' => 'Cake\Http\ActionDispatcher', 'object' => object(Cake\Http\ActionDispatcher) {}, 'type' => '->', 'args' => [ (int) 0 => object(App\Controller\ArtileDetailController) {} ] ], (int) 5 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/BaseApplication.php', 'line' => (int) 235, 'function' => 'dispatch', 'class' => 'Cake\Http\ActionDispatcher', 'object' => object(Cake\Http\ActionDispatcher) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {} ] ], (int) 6 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Runner.php', 'line' => (int) 65, 'function' => '__invoke', 'class' => 'Cake\Http\BaseApplication', 'object' => object(App\Application) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {}, (int) 2 => object(Cake\Http\Runner) {} ] ], (int) 7 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Routing/Middleware/RoutingMiddleware.php', 'line' => (int) 162, 'function' => '__invoke', 'class' => 'Cake\Http\Runner', 'object' => object(Cake\Http\Runner) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {} ] ], (int) 8 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Runner.php', 'line' => (int) 65, 'function' => '__invoke', 'class' => 'Cake\Routing\Middleware\RoutingMiddleware', 'object' => object(Cake\Routing\Middleware\RoutingMiddleware) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {}, (int) 2 => object(Cake\Http\Runner) {} ] ], (int) 9 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Routing/Middleware/AssetMiddleware.php', 'line' => (int) 88, 'function' => '__invoke', 'class' => 'Cake\Http\Runner', 'object' => object(Cake\Http\Runner) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {} ] ], (int) 10 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Runner.php', 'line' => (int) 65, 'function' => '__invoke', 'class' => 'Cake\Routing\Middleware\AssetMiddleware', 'object' => object(Cake\Routing\Middleware\AssetMiddleware) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {}, (int) 2 => object(Cake\Http\Runner) {} ] ], (int) 11 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Error/Middleware/ErrorHandlerMiddleware.php', 'line' => (int) 96, 'function' => '__invoke', 'class' => 'Cake\Http\Runner', 'object' => object(Cake\Http\Runner) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {} ] ], (int) 12 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Runner.php', 'line' => (int) 65, 'function' => '__invoke', 'class' => 'Cake\Error\Middleware\ErrorHandlerMiddleware', 'object' => object(Cake\Error\Middleware\ErrorHandlerMiddleware) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {}, (int) 2 => object(Cake\Http\Runner) {} ] ], (int) 13 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Runner.php', 'line' => (int) 51, 'function' => '__invoke', 'class' => 'Cake\Http\Runner', 'object' => object(Cake\Http\Runner) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {} ] ], (int) 14 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Server.php', 'line' => (int) 98, 'function' => 'run', 'class' => 'Cake\Http\Runner', 'object' => object(Cake\Http\Runner) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\MiddlewareQueue) {}, (int) 1 => object(Cake\Http\ServerRequest) {}, (int) 2 => object(Cake\Http\Response) {} ] ], (int) 15 => [ 'file' => '/home/brlfuser/public_html/webroot/index.php', 'line' => (int) 39, 'function' => 'run', 'class' => 'Cake\Http\Server', 'object' => object(Cake\Http\Server) {}, 'type' => '->', 'args' => [] ] ] $frame = [ 'file' => '/home/brlfuser/public_html/src/Controller/ArtileDetailController.php', 'line' => (int) 73, 'function' => 'offsetGet', 'class' => 'Cake\Http\ServerRequest', 'object' => object(Cake\Http\ServerRequest) { trustProxy => false [protected] params => [ [maximum depth reached] ] [protected] data => [[maximum depth reached]] [protected] query => [[maximum depth reached]] [protected] cookies => [ [maximum depth reached] ] [protected] _environment => [ [maximum depth reached] ] [protected] url => 'latest-news-updates/unique-identity-leakages-and-development-by-jayati-ghosh-5025/print' [protected] base => '' [protected] webroot => '/' [protected] here => '/latest-news-updates/unique-identity-leakages-and-development-by-jayati-ghosh-5025/print' [protected] trustedProxies => [[maximum depth reached]] [protected] _input => null [protected] _detectors => [ [maximum depth reached] ] [protected] _detectorCache => [ [maximum depth reached] ] [protected] stream => object(Zend\Diactoros\PhpInputStream) {} [protected] uri => object(Zend\Diactoros\Uri) {} [protected] session => object(Cake\Http\Session) {} [protected] attributes => [[maximum depth reached]] [protected] emulatedAttributes => [ [maximum depth reached] ] [protected] uploadedFiles => [[maximum depth reached]] [protected] protocol => null [protected] requestTarget => null [private] deprecatedProperties => [ [maximum depth reached] ] }, 'type' => '->', 'args' => [ (int) 0 => 'catslug' ] ]deprecationWarning - CORE/src/Core/functions.php, line 311 Cake\Http\ServerRequest::offsetGet() - CORE/src/Http/ServerRequest.php, line 2421 App\Controller\ArtileDetailController::printArticle() - APP/Controller/ArtileDetailController.php, line 73 Cake\Controller\Controller::invokeAction() - CORE/src/Controller/Controller.php, line 610 Cake\Http\ActionDispatcher::_invoke() - CORE/src/Http/ActionDispatcher.php, line 120 Cake\Http\ActionDispatcher::dispatch() - CORE/src/Http/ActionDispatcher.php, line 94 Cake\Http\BaseApplication::__invoke() - CORE/src/Http/BaseApplication.php, line 235 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\RoutingMiddleware::__invoke() - CORE/src/Routing/Middleware/RoutingMiddleware.php, line 162 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\AssetMiddleware::__invoke() - CORE/src/Routing/Middleware/AssetMiddleware.php, line 88 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Error\Middleware\ErrorHandlerMiddleware::__invoke() - CORE/src/Error/Middleware/ErrorHandlerMiddleware.php, line 96 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Http\Runner::run() - CORE/src/Http/Runner.php, line 51 Cake\Http\Server::run() - CORE/src/Http/Server.php, line 98
Deprecated (16384): The ArrayAccess methods will be removed in 4.0.0.Use getParam(), getData() and getQuery() instead. - /home/brlfuser/public_html/src/Controller/ArtileDetailController.php, line: 74 You can disable deprecation warnings by setting `Error.errorLevel` to `E_ALL & ~E_USER_DEPRECATED` in your config/app.php. [CORE/src/Core/functions.php, line 311]Code Context
trigger_error($message, E_USER_DEPRECATED);
}
$message = 'The ArrayAccess methods will be removed in 4.0.0.Use getParam(), getData() and getQuery() instead. - /home/brlfuser/public_html/src/Controller/ArtileDetailController.php, line: 74 You can disable deprecation warnings by setting `Error.errorLevel` to `E_ALL & ~E_USER_DEPRECATED` in your config/app.php.' $stackFrame = (int) 1 $trace = [ (int) 0 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/ServerRequest.php', 'line' => (int) 2421, 'function' => 'deprecationWarning', 'args' => [ (int) 0 => 'The ArrayAccess methods will be removed in 4.0.0.Use getParam(), getData() and getQuery() instead.' ] ], (int) 1 => [ 'file' => '/home/brlfuser/public_html/src/Controller/ArtileDetailController.php', 'line' => (int) 74, 'function' => 'offsetGet', 'class' => 'Cake\Http\ServerRequest', 'object' => object(Cake\Http\ServerRequest) {}, 'type' => '->', 'args' => [ (int) 0 => 'artileslug' ] ], (int) 2 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Controller/Controller.php', 'line' => (int) 610, 'function' => 'printArticle', 'class' => 'App\Controller\ArtileDetailController', 'object' => object(App\Controller\ArtileDetailController) {}, 'type' => '->', 'args' => [] ], (int) 3 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/ActionDispatcher.php', 'line' => (int) 120, 'function' => 'invokeAction', 'class' => 'Cake\Controller\Controller', 'object' => object(App\Controller\ArtileDetailController) {}, 'type' => '->', 'args' => [] ], (int) 4 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/ActionDispatcher.php', 'line' => (int) 94, 'function' => '_invoke', 'class' => 'Cake\Http\ActionDispatcher', 'object' => object(Cake\Http\ActionDispatcher) {}, 'type' => '->', 'args' => [ (int) 0 => object(App\Controller\ArtileDetailController) {} ] ], (int) 5 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/BaseApplication.php', 'line' => (int) 235, 'function' => 'dispatch', 'class' => 'Cake\Http\ActionDispatcher', 'object' => object(Cake\Http\ActionDispatcher) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {} ] ], (int) 6 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Runner.php', 'line' => (int) 65, 'function' => '__invoke', 'class' => 'Cake\Http\BaseApplication', 'object' => object(App\Application) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {}, (int) 2 => object(Cake\Http\Runner) {} ] ], (int) 7 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Routing/Middleware/RoutingMiddleware.php', 'line' => (int) 162, 'function' => '__invoke', 'class' => 'Cake\Http\Runner', 'object' => object(Cake\Http\Runner) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {} ] ], (int) 8 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Runner.php', 'line' => (int) 65, 'function' => '__invoke', 'class' => 'Cake\Routing\Middleware\RoutingMiddleware', 'object' => object(Cake\Routing\Middleware\RoutingMiddleware) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {}, (int) 2 => object(Cake\Http\Runner) {} ] ], (int) 9 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Routing/Middleware/AssetMiddleware.php', 'line' => (int) 88, 'function' => '__invoke', 'class' => 'Cake\Http\Runner', 'object' => object(Cake\Http\Runner) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {} ] ], (int) 10 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Runner.php', 'line' => (int) 65, 'function' => '__invoke', 'class' => 'Cake\Routing\Middleware\AssetMiddleware', 'object' => object(Cake\Routing\Middleware\AssetMiddleware) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {}, (int) 2 => object(Cake\Http\Runner) {} ] ], (int) 11 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Error/Middleware/ErrorHandlerMiddleware.php', 'line' => (int) 96, 'function' => '__invoke', 'class' => 'Cake\Http\Runner', 'object' => object(Cake\Http\Runner) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {} ] ], (int) 12 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Runner.php', 'line' => (int) 65, 'function' => '__invoke', 'class' => 'Cake\Error\Middleware\ErrorHandlerMiddleware', 'object' => object(Cake\Error\Middleware\ErrorHandlerMiddleware) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {}, (int) 2 => object(Cake\Http\Runner) {} ] ], (int) 13 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Runner.php', 'line' => (int) 51, 'function' => '__invoke', 'class' => 'Cake\Http\Runner', 'object' => object(Cake\Http\Runner) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {} ] ], (int) 14 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Server.php', 'line' => (int) 98, 'function' => 'run', 'class' => 'Cake\Http\Runner', 'object' => object(Cake\Http\Runner) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\MiddlewareQueue) {}, (int) 1 => object(Cake\Http\ServerRequest) {}, (int) 2 => object(Cake\Http\Response) {} ] ], (int) 15 => [ 'file' => '/home/brlfuser/public_html/webroot/index.php', 'line' => (int) 39, 'function' => 'run', 'class' => 'Cake\Http\Server', 'object' => object(Cake\Http\Server) {}, 'type' => '->', 'args' => [] ] ] $frame = [ 'file' => '/home/brlfuser/public_html/src/Controller/ArtileDetailController.php', 'line' => (int) 74, 'function' => 'offsetGet', 'class' => 'Cake\Http\ServerRequest', 'object' => object(Cake\Http\ServerRequest) { trustProxy => false [protected] params => [ [maximum depth reached] ] [protected] data => [[maximum depth reached]] [protected] query => [[maximum depth reached]] [protected] cookies => [ [maximum depth reached] ] [protected] _environment => [ [maximum depth reached] ] [protected] url => 'latest-news-updates/unique-identity-leakages-and-development-by-jayati-ghosh-5025/print' [protected] base => '' [protected] webroot => '/' [protected] here => '/latest-news-updates/unique-identity-leakages-and-development-by-jayati-ghosh-5025/print' [protected] trustedProxies => [[maximum depth reached]] [protected] _input => null [protected] _detectors => [ [maximum depth reached] ] [protected] _detectorCache => [ [maximum depth reached] ] [protected] stream => object(Zend\Diactoros\PhpInputStream) {} [protected] uri => object(Zend\Diactoros\Uri) {} [protected] session => object(Cake\Http\Session) {} [protected] attributes => [[maximum depth reached]] [protected] emulatedAttributes => [ [maximum depth reached] ] [protected] uploadedFiles => [[maximum depth reached]] [protected] protocol => null [protected] requestTarget => null [private] deprecatedProperties => [ [maximum depth reached] ] }, 'type' => '->', 'args' => [ (int) 0 => 'artileslug' ] ]deprecationWarning - CORE/src/Core/functions.php, line 311 Cake\Http\ServerRequest::offsetGet() - CORE/src/Http/ServerRequest.php, line 2421 App\Controller\ArtileDetailController::printArticle() - APP/Controller/ArtileDetailController.php, line 74 Cake\Controller\Controller::invokeAction() - CORE/src/Controller/Controller.php, line 610 Cake\Http\ActionDispatcher::_invoke() - CORE/src/Http/ActionDispatcher.php, line 120 Cake\Http\ActionDispatcher::dispatch() - CORE/src/Http/ActionDispatcher.php, line 94 Cake\Http\BaseApplication::__invoke() - CORE/src/Http/BaseApplication.php, line 235 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\RoutingMiddleware::__invoke() - CORE/src/Routing/Middleware/RoutingMiddleware.php, line 162 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\AssetMiddleware::__invoke() - CORE/src/Routing/Middleware/AssetMiddleware.php, line 88 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Error\Middleware\ErrorHandlerMiddleware::__invoke() - CORE/src/Error/Middleware/ErrorHandlerMiddleware.php, line 96 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Http\Runner::run() - CORE/src/Http/Runner.php, line 51 Cake\Http\Server::run() - CORE/src/Http/Server.php, line 98
Warning (512): Unable to emit headers. Headers sent in file=/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Error/Debugger.php line=853 [CORE/src/Http/ResponseEmitter.php, line 48]Code Contextif (Configure::read('debug')) {
trigger_error($message, E_USER_WARNING);
} else {
$response = object(Cake\Http\Response) { 'status' => (int) 200, 'contentType' => 'text/html', 'headers' => [ 'Content-Type' => [ [maximum depth reached] ] ], 'file' => null, 'fileRange' => [], 'cookies' => object(Cake\Http\Cookie\CookieCollection) {}, 'cacheDirectives' => [], 'body' => '<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <link rel="canonical" href="https://im4change.in/<pre class="cake-error"><a href="javascript:void(0);" onclick="document.getElementById('cakeErr67ea3c56b6c0b-trace').style.display = (document.getElementById('cakeErr67ea3c56b6c0b-trace').style.display == 'none' ? '' : 'none');"><b>Notice</b> (8)</a>: Undefined variable: urlPrefix [<b>APP/Template/Layout/printlayout.ctp</b>, line <b>8</b>]<div id="cakeErr67ea3c56b6c0b-trace" class="cake-stack-trace" style="display: none;"><a href="javascript:void(0);" onclick="document.getElementById('cakeErr67ea3c56b6c0b-code').style.display = (document.getElementById('cakeErr67ea3c56b6c0b-code').style.display == 'none' ? '' : 'none')">Code</a> <a href="javascript:void(0);" onclick="document.getElementById('cakeErr67ea3c56b6c0b-context').style.display = (document.getElementById('cakeErr67ea3c56b6c0b-context').style.display == 'none' ? '' : 'none')">Context</a><pre id="cakeErr67ea3c56b6c0b-code" class="cake-code-dump" style="display: none;"><code><span style="color: #000000"><span style="color: #0000BB"></span><span style="color: #007700"><</span><span style="color: #0000BB">head</span><span style="color: #007700">> </span></span></code> <span class="code-highlight"><code><span style="color: #000000"> <link rel="canonical" href="<span style="color: #0000BB"><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">Configure</span><span style="color: #007700">::</span><span style="color: #0000BB">read</span><span style="color: #007700">(</span><span style="color: #DD0000">'SITE_URL'</span><span style="color: #007700">); </span><span style="color: #0000BB">?><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">$urlPrefix</span><span style="color: #007700">;</span><span style="color: #0000BB">?><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">$article_current</span><span style="color: #007700">-></span><span style="color: #0000BB">category</span><span style="color: #007700">-></span><span style="color: #0000BB">slug</span><span style="color: #007700">; </span><span style="color: #0000BB">?></span>/<span style="color: #0000BB"><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">$article_current</span><span style="color: #007700">-></span><span style="color: #0000BB">seo_url</span><span style="color: #007700">; </span><span style="color: #0000BB">?></span>.html"/> </span></code></span> <code><span style="color: #000000"><span style="color: #0000BB"> </span><span style="color: #007700"><</span><span style="color: #0000BB">meta http</span><span style="color: #007700">-</span><span style="color: #0000BB">equiv</span><span style="color: #007700">=</span><span style="color: #DD0000">"Content-Type" </span><span style="color: #0000BB">content</span><span style="color: #007700">=</span><span style="color: #DD0000">"text/html; charset=utf-8"</span><span style="color: #007700">/> </span></span></code></pre><pre id="cakeErr67ea3c56b6c0b-context" class="cake-context" style="display: none;">$viewFile = '/home/brlfuser/public_html/src/Template/Layout/printlayout.ctp' $dataForView = [ 'article_current' => object(App\Model\Entity\Article) { 'id' => (int) 4933, 'title' => 'Unique Identity, Leakages and Development by Jayati Ghosh', 'subheading' => '', 'description' => '<br /> <div align="justify"> For some reason, governments - as well as the development ''industry'' as a whole - have always had a tendency to look for universal panaceas, particular silver bullets that will solve all or most of their implementation problems and somehow achieve the development project for them. The latest such initiative bullet that seems to have been accepted as a silver bullet is the Unique Identification Project, which is now seen as the easy means to ensure no corruption and no leakages, and to ensure efficient access to what are going to be targeted systems of public delivery.<br /> <br /> On the face of it, the UID project appears to have many advantages for ordinary citizens, especially the poor. After all, the requirement of having multiple cards for particular kinds of access to public or other services, each of which is typically difficult to acquire, places disproportionate burdens on the poor. Anyone who has tried to get a ration card without some preferential access to lower level bureaucracy knows how prolonged and nightmarish the process can be. Even something like opening a bank account used to be a horrendously difficult and complicated process for those without masses of supporting documents. One of the great indirect benefits of the NREGA has been the system of payments through bank accounts, which has enabled many rural workers to access banks in a way that was simply denied to them earlier.<br /> <br /> All too often, acquiring any of these cards that provide access to some service requires not just lots of time and energy, but also the payment of bribes. So a system whereby the large transaction costs of acquiring different cards for different purposes are reduced and the entire process is simplified for the ordinary citizen is something that should be welcomed. In addition, it could be argued that having a single card for many different purposes would enable public service delivery to shift from its present form which is based entirely on residence, to a more flexible system that recognises the internal movement of people.<br /> <br /> But such attempts at simplifying life for those whose various socio-economic rights need to be met is rather different from creating and then enforcing a system that can lead not only to an invasion of basic privacy but also to possibly excessive and undesirable monitoring by the state.<br /> <br /> The UID project has already been devastatingly critiqued for its implications for privacy and civil liberties, by scholars such as R. Ramakumar and Jean Dreze. It is worth noting that in most developed countries, similar projects of governments have not been implemented after strong public pressure. Even where they have been, they have generally avoided putting in personal and professional details such as religion, ethnic identity, profession and socio-economic status. Yet such data are all explicitly part of the information gathering exercise for the UID project.<br /> <br /> The incorporation of biometric data raises a further hornet's nest, since it is now widely recognised that biometric information is subject to significant errors in large populations. This is among the factors that led the government of China to shelve their own plan for such information to be stored in identity cards. The current evidence on the technological possibilities of biometric data use suggests that it is not a foolproof system for preventing identity theft. It is also increasingly accepted that, since fingerprints of a person (especially those engaged in manual labour) can change over time, they may be unreliable guides to identity. Ramakumar points out that ''according to some estimates, in developing countries like India, the share of persons with noisy or bad data could go up to 15 per cent'', or more than 150 million people!<br /> <br /> What is even more troubling is how the government plans to use the UID data. There are attempts to coerce wage workers in rural India to ''voluntarily'' enter the scheme by making it mandatory for the issue of job cards of NREGA. There are reports that UID can be used to ''solve'' the problem of leakages and misappropriation from what is likely to be an immensely convoluted targeted Public Distribution Scheme (TPDS) for food grain. Next UID may be introduced in health programmes and other forms of basic delivery, on the false presumption that this will do away with corruption.<br /> <br /> This is a very fundamental mistake, which misses out the basic elements of the power relations that enable and assist the pattern of corruption in India, or even the possible errors in targeting. How will a UID system ensure that complicated systems of defining the poor actually do capture the right group and do not have well-known errors of unfair exclusion and unwarranted inclusion? How will it prevent those who systematically engage in siphoning off either NREGA wages or TPDS food grains from the rightful targets from continuing to do so? It is a simple matter to ensure that the recipient of wages or grain or any other good or service puts her or his fingerprints in the required spot, even if they receive only a fraction of what is their right. Introducing such a requirement is likely to undermine the very functioning of such schemes, especially the flagship programmes like NREGS.<br /> <br /> Technology cannot be a substitute for social transformation. If it is introduced in social and economic contexts of greatly unequal and oppressive power relations, the outcomes are likely to be the opposite of those intended by the most well-meaning of planners and implementers. The important lesson is that purely technological fixes will not work: it is not possible to avoid the crucial political economy challenge of the need to change and overthrow existing power structures that prevent and constrain genuine development.<br /> <br /> </div>', 'credit_writer' => 'Macroscan.com, 16 December, 2010, http://macroscan.com/cur/dec10/cur161210Unique_Identity.htm', 'article_img' => '', 'article_img_thumb' => '', 'status' => (int) 1, 'show_on_home' => (int) 1, 'lang' => 'EN', 'category_id' => (int) 16, 'tag_keyword' => '', 'seo_url' => 'unique-identity-leakages-and-development-by-jayati-ghosh-5025', 'meta_title' => null, 'meta_keywords' => null, 'meta_description' => null, 'noindex' => (int) 0, 'publish_date' => object(Cake\I18n\FrozenDate) {}, 'most_visit_section_id' => null, 'article_big_img' => null, 'liveid' => (int) 5025, 'created' => object(Cake\I18n\FrozenTime) {}, 'modified' => object(Cake\I18n\FrozenTime) {}, 'edate' => '', 'tags' => [ [maximum depth reached] ], 'category' => object(App\Model\Entity\Category) {}, '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[hasErrors]' => false, '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'Articles' }, 'articleid' => (int) 4933, 'metaTitle' => 'LATEST NEWS UPDATES | Unique Identity, Leakages and Development by Jayati Ghosh', 'metaKeywords' => 'UIDAI,NREGS,PDS', 'metaDesc' => ' For some reason, governments - as well as the development ''industry'' as a whole - have always had a tendency to look for universal panaceas, particular silver bullets that will solve all or most of their implementation problems and somehow...', 'disp' => '<br /><div align="justify">For some reason, governments - as well as the development ''industry'' as a whole - have always had a tendency to look for universal panaceas, particular silver bullets that will solve all or most of their implementation problems and somehow achieve the development project for them. The latest such initiative bullet that seems to have been accepted as a silver bullet is the Unique Identification Project, which is now seen as the easy means to ensure no corruption and no leakages, and to ensure efficient access to what are going to be targeted systems of public delivery.<br /><br />On the face of it, the UID project appears to have many advantages for ordinary citizens, especially the poor. After all, the requirement of having multiple cards for particular kinds of access to public or other services, each of which is typically difficult to acquire, places disproportionate burdens on the poor. Anyone who has tried to get a ration card without some preferential access to lower level bureaucracy knows how prolonged and nightmarish the process can be. Even something like opening a bank account used to be a horrendously difficult and complicated process for those without masses of supporting documents. One of the great indirect benefits of the NREGA has been the system of payments through bank accounts, which has enabled many rural workers to access banks in a way that was simply denied to them earlier.<br /><br />All too often, acquiring any of these cards that provide access to some service requires not just lots of time and energy, but also the payment of bribes. So a system whereby the large transaction costs of acquiring different cards for different purposes are reduced and the entire process is simplified for the ordinary citizen is something that should be welcomed. In addition, it could be argued that having a single card for many different purposes would enable public service delivery to shift from its present form which is based entirely on residence, to a more flexible system that recognises the internal movement of people.<br /><br />But such attempts at simplifying life for those whose various socio-economic rights need to be met is rather different from creating and then enforcing a system that can lead not only to an invasion of basic privacy but also to possibly excessive and undesirable monitoring by the state.<br /><br />The UID project has already been devastatingly critiqued for its implications for privacy and civil liberties, by scholars such as R. Ramakumar and Jean Dreze. It is worth noting that in most developed countries, similar projects of governments have not been implemented after strong public pressure. Even where they have been, they have generally avoided putting in personal and professional details such as religion, ethnic identity, profession and socio-economic status. Yet such data are all explicitly part of the information gathering exercise for the UID project.<br /><br />The incorporation of biometric data raises a further hornet's nest, since it is now widely recognised that biometric information is subject to significant errors in large populations. This is among the factors that led the government of China to shelve their own plan for such information to be stored in identity cards. The current evidence on the technological possibilities of biometric data use suggests that it is not a foolproof system for preventing identity theft. It is also increasingly accepted that, since fingerprints of a person (especially those engaged in manual labour) can change over time, they may be unreliable guides to identity. Ramakumar points out that ''according to some estimates, in developing countries like India, the share of persons with noisy or bad data could go up to 15 per cent'', or more than 150 million people!<br /><br />What is even more troubling is how the government plans to use the UID data. There are attempts to coerce wage workers in rural India to ''voluntarily'' enter the scheme by making it mandatory for the issue of job cards of NREGA. There are reports that UID can be used to ''solve'' the problem of leakages and misappropriation from what is likely to be an immensely convoluted targeted Public Distribution Scheme (TPDS) for food grain. Next UID may be introduced in health programmes and other forms of basic delivery, on the false presumption that this will do away with corruption.<br /><br />This is a very fundamental mistake, which misses out the basic elements of the power relations that enable and assist the pattern of corruption in India, or even the possible errors in targeting. How will a UID system ensure that complicated systems of defining the poor actually do capture the right group and do not have well-known errors of unfair exclusion and unwarranted inclusion? How will it prevent those who systematically engage in siphoning off either NREGA wages or TPDS food grains from the rightful targets from continuing to do so? It is a simple matter to ensure that the recipient of wages or grain or any other good or service puts her or his fingerprints in the required spot, even if they receive only a fraction of what is their right. Introducing such a requirement is likely to undermine the very functioning of such schemes, especially the flagship programmes like NREGS.<br /><br />Technology cannot be a substitute for social transformation. If it is introduced in social and economic contexts of greatly unequal and oppressive power relations, the outcomes are likely to be the opposite of those intended by the most well-meaning of planners and implementers. The important lesson is that purely technological fixes will not work: it is not possible to avoid the crucial political economy challenge of the need to change and overthrow existing power structures that prevent and constrain genuine development.<br /><br /></div>', 'lang' => 'English', 'SITE_URL' => 'https://im4change.in/', 'site_title' => 'im4change', 'adminprix' => 'admin' ] $article_current = object(App\Model\Entity\Article) { 'id' => (int) 4933, 'title' => 'Unique Identity, Leakages and Development by Jayati Ghosh', 'subheading' => '', 'description' => '<br /> <div align="justify"> For some reason, governments - as well as the development ''industry'' as a whole - have always had a tendency to look for universal panaceas, particular silver bullets that will solve all or most of their implementation problems and somehow achieve the development project for them. The latest such initiative bullet that seems to have been accepted as a silver bullet is the Unique Identification Project, which is now seen as the easy means to ensure no corruption and no leakages, and to ensure efficient access to what are going to be targeted systems of public delivery.<br /> <br /> On the face of it, the UID project appears to have many advantages for ordinary citizens, especially the poor. After all, the requirement of having multiple cards for particular kinds of access to public or other services, each of which is typically difficult to acquire, places disproportionate burdens on the poor. Anyone who has tried to get a ration card without some preferential access to lower level bureaucracy knows how prolonged and nightmarish the process can be. Even something like opening a bank account used to be a horrendously difficult and complicated process for those without masses of supporting documents. One of the great indirect benefits of the NREGA has been the system of payments through bank accounts, which has enabled many rural workers to access banks in a way that was simply denied to them earlier.<br /> <br /> All too often, acquiring any of these cards that provide access to some service requires not just lots of time and energy, but also the payment of bribes. So a system whereby the large transaction costs of acquiring different cards for different purposes are reduced and the entire process is simplified for the ordinary citizen is something that should be welcomed. In addition, it could be argued that having a single card for many different purposes would enable public service delivery to shift from its present form which is based entirely on residence, to a more flexible system that recognises the internal movement of people.<br /> <br /> But such attempts at simplifying life for those whose various socio-economic rights need to be met is rather different from creating and then enforcing a system that can lead not only to an invasion of basic privacy but also to possibly excessive and undesirable monitoring by the state.<br /> <br /> The UID project has already been devastatingly critiqued for its implications for privacy and civil liberties, by scholars such as R. Ramakumar and Jean Dreze. It is worth noting that in most developed countries, similar projects of governments have not been implemented after strong public pressure. Even where they have been, they have generally avoided putting in personal and professional details such as religion, ethnic identity, profession and socio-economic status. Yet such data are all explicitly part of the information gathering exercise for the UID project.<br /> <br /> The incorporation of biometric data raises a further hornet's nest, since it is now widely recognised that biometric information is subject to significant errors in large populations. This is among the factors that led the government of China to shelve their own plan for such information to be stored in identity cards. The current evidence on the technological possibilities of biometric data use suggests that it is not a foolproof system for preventing identity theft. It is also increasingly accepted that, since fingerprints of a person (especially those engaged in manual labour) can change over time, they may be unreliable guides to identity. Ramakumar points out that ''according to some estimates, in developing countries like India, the share of persons with noisy or bad data could go up to 15 per cent'', or more than 150 million people!<br /> <br /> What is even more troubling is how the government plans to use the UID data. There are attempts to coerce wage workers in rural India to ''voluntarily'' enter the scheme by making it mandatory for the issue of job cards of NREGA. There are reports that UID can be used to ''solve'' the problem of leakages and misappropriation from what is likely to be an immensely convoluted targeted Public Distribution Scheme (TPDS) for food grain. Next UID may be introduced in health programmes and other forms of basic delivery, on the false presumption that this will do away with corruption.<br /> <br /> This is a very fundamental mistake, which misses out the basic elements of the power relations that enable and assist the pattern of corruption in India, or even the possible errors in targeting. How will a UID system ensure that complicated systems of defining the poor actually do capture the right group and do not have well-known errors of unfair exclusion and unwarranted inclusion? How will it prevent those who systematically engage in siphoning off either NREGA wages or TPDS food grains from the rightful targets from continuing to do so? It is a simple matter to ensure that the recipient of wages or grain or any other good or service puts her or his fingerprints in the required spot, even if they receive only a fraction of what is their right. Introducing such a requirement is likely to undermine the very functioning of such schemes, especially the flagship programmes like NREGS.<br /> <br /> Technology cannot be a substitute for social transformation. If it is introduced in social and economic contexts of greatly unequal and oppressive power relations, the outcomes are likely to be the opposite of those intended by the most well-meaning of planners and implementers. The important lesson is that purely technological fixes will not work: it is not possible to avoid the crucial political economy challenge of the need to change and overthrow existing power structures that prevent and constrain genuine development.<br /> <br /> </div>', 'credit_writer' => 'Macroscan.com, 16 December, 2010, http://macroscan.com/cur/dec10/cur161210Unique_Identity.htm', 'article_img' => '', 'article_img_thumb' => '', 'status' => (int) 1, 'show_on_home' => (int) 1, 'lang' => 'EN', 'category_id' => (int) 16, 'tag_keyword' => '', 'seo_url' => 'unique-identity-leakages-and-development-by-jayati-ghosh-5025', 'meta_title' => null, 'meta_keywords' => null, 'meta_description' => null, 'noindex' => (int) 0, 'publish_date' => object(Cake\I18n\FrozenDate) {}, 'most_visit_section_id' => null, 'article_big_img' => null, 'liveid' => (int) 5025, 'created' => object(Cake\I18n\FrozenTime) {}, 'modified' => object(Cake\I18n\FrozenTime) {}, 'edate' => '', 'tags' => [ (int) 0 => object(Cake\ORM\Entity) {}, (int) 1 => object(Cake\ORM\Entity) {}, (int) 2 => object(Cake\ORM\Entity) {} ], 'category' => object(App\Model\Entity\Category) {}, '[new]' => false, '[accessible]' => [ '*' => true, 'id' => false ], '[dirty]' => [], '[original]' => [], '[virtual]' => [], '[hasErrors]' => false, '[errors]' => [], '[invalid]' => [], '[repository]' => 'Articles' } $articleid = (int) 4933 $metaTitle = 'LATEST NEWS UPDATES | Unique Identity, Leakages and Development by Jayati Ghosh' $metaKeywords = 'UIDAI,NREGS,PDS' $metaDesc = ' For some reason, governments - as well as the development ''industry'' as a whole - have always had a tendency to look for universal panaceas, particular silver bullets that will solve all or most of their implementation problems and somehow...' $disp = '<br /><div align="justify">For some reason, governments - as well as the development ''industry'' as a whole - have always had a tendency to look for universal panaceas, particular silver bullets that will solve all or most of their implementation problems and somehow achieve the development project for them. The latest such initiative bullet that seems to have been accepted as a silver bullet is the Unique Identification Project, which is now seen as the easy means to ensure no corruption and no leakages, and to ensure efficient access to what are going to be targeted systems of public delivery.<br /><br />On the face of it, the UID project appears to have many advantages for ordinary citizens, especially the poor. After all, the requirement of having multiple cards for particular kinds of access to public or other services, each of which is typically difficult to acquire, places disproportionate burdens on the poor. Anyone who has tried to get a ration card without some preferential access to lower level bureaucracy knows how prolonged and nightmarish the process can be. Even something like opening a bank account used to be a horrendously difficult and complicated process for those without masses of supporting documents. One of the great indirect benefits of the NREGA has been the system of payments through bank accounts, which has enabled many rural workers to access banks in a way that was simply denied to them earlier.<br /><br />All too often, acquiring any of these cards that provide access to some service requires not just lots of time and energy, but also the payment of bribes. So a system whereby the large transaction costs of acquiring different cards for different purposes are reduced and the entire process is simplified for the ordinary citizen is something that should be welcomed. In addition, it could be argued that having a single card for many different purposes would enable public service delivery to shift from its present form which is based entirely on residence, to a more flexible system that recognises the internal movement of people.<br /><br />But such attempts at simplifying life for those whose various socio-economic rights need to be met is rather different from creating and then enforcing a system that can lead not only to an invasion of basic privacy but also to possibly excessive and undesirable monitoring by the state.<br /><br />The UID project has already been devastatingly critiqued for its implications for privacy and civil liberties, by scholars such as R. Ramakumar and Jean Dreze. It is worth noting that in most developed countries, similar projects of governments have not been implemented after strong public pressure. Even where they have been, they have generally avoided putting in personal and professional details such as religion, ethnic identity, profession and socio-economic status. Yet such data are all explicitly part of the information gathering exercise for the UID project.<br /><br />The incorporation of biometric data raises a further hornet's nest, since it is now widely recognised that biometric information is subject to significant errors in large populations. This is among the factors that led the government of China to shelve their own plan for such information to be stored in identity cards. The current evidence on the technological possibilities of biometric data use suggests that it is not a foolproof system for preventing identity theft. It is also increasingly accepted that, since fingerprints of a person (especially those engaged in manual labour) can change over time, they may be unreliable guides to identity. Ramakumar points out that ''according to some estimates, in developing countries like India, the share of persons with noisy or bad data could go up to 15 per cent'', or more than 150 million people!<br /><br />What is even more troubling is how the government plans to use the UID data. There are attempts to coerce wage workers in rural India to ''voluntarily'' enter the scheme by making it mandatory for the issue of job cards of NREGA. There are reports that UID can be used to ''solve'' the problem of leakages and misappropriation from what is likely to be an immensely convoluted targeted Public Distribution Scheme (TPDS) for food grain. Next UID may be introduced in health programmes and other forms of basic delivery, on the false presumption that this will do away with corruption.<br /><br />This is a very fundamental mistake, which misses out the basic elements of the power relations that enable and assist the pattern of corruption in India, or even the possible errors in targeting. How will a UID system ensure that complicated systems of defining the poor actually do capture the right group and do not have well-known errors of unfair exclusion and unwarranted inclusion? How will it prevent those who systematically engage in siphoning off either NREGA wages or TPDS food grains from the rightful targets from continuing to do so? It is a simple matter to ensure that the recipient of wages or grain or any other good or service puts her or his fingerprints in the required spot, even if they receive only a fraction of what is their right. Introducing such a requirement is likely to undermine the very functioning of such schemes, especially the flagship programmes like NREGS.<br /><br />Technology cannot be a substitute for social transformation. If it is introduced in social and economic contexts of greatly unequal and oppressive power relations, the outcomes are likely to be the opposite of those intended by the most well-meaning of planners and implementers. The important lesson is that purely technological fixes will not work: it is not possible to avoid the crucial political economy challenge of the need to change and overthrow existing power structures that prevent and constrain genuine development.<br /><br /></div>' $lang = 'English' $SITE_URL = 'https://im4change.in/' $site_title = 'im4change' $adminprix = 'admin'</pre><pre class="stack-trace">include - APP/Template/Layout/printlayout.ctp, line 8 Cake\View\View::_evaluate() - CORE/src/View/View.php, line 1413 Cake\View\View::_render() - CORE/src/View/View.php, line 1374 Cake\View\View::renderLayout() - CORE/src/View/View.php, line 927 Cake\View\View::render() - CORE/src/View/View.php, line 885 Cake\Controller\Controller::render() - CORE/src/Controller/Controller.php, line 791 Cake\Http\ActionDispatcher::_invoke() - CORE/src/Http/ActionDispatcher.php, line 126 Cake\Http\ActionDispatcher::dispatch() - CORE/src/Http/ActionDispatcher.php, line 94 Cake\Http\BaseApplication::__invoke() - CORE/src/Http/BaseApplication.php, line 235 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\RoutingMiddleware::__invoke() - CORE/src/Routing/Middleware/RoutingMiddleware.php, line 162 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\AssetMiddleware::__invoke() - CORE/src/Routing/Middleware/AssetMiddleware.php, line 88 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Error\Middleware\ErrorHandlerMiddleware::__invoke() - CORE/src/Error/Middleware/ErrorHandlerMiddleware.php, line 96 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Http\Runner::run() - CORE/src/Http/Runner.php, line 51</pre></div></pre>latest-news-updates/unique-identity-leakages-and-development-by-jayati-ghosh-5025.html"/> <meta http-equiv="Content-Type" content="text/html; charset=utf-8"/> <link href="https://im4change.in/css/control.css" rel="stylesheet" type="text/css" media="all"/> <title>LATEST NEWS UPDATES | Unique Identity, Leakages and Development by Jayati Ghosh | Im4change.org</title> <meta name="description" content=" For some reason, governments - as well as the development ''industry'' as a whole - have always had a tendency to look for universal panaceas, particular silver bullets that will solve all or most of their implementation problems and somehow..."/> <script src="https://im4change.in/js/jquery-1.10.2.js"></script> <script type="text/javascript" src="https://im4change.in/js/jquery-migrate.min.js"></script> <script language="javascript" type="text/javascript"> $(document).ready(function () { var img = $("img")[0]; // Get my img elem var pic_real_width, pic_real_height; $("<img/>") // Make in memory copy of image to avoid css issues .attr("src", $(img).attr("src")) .load(function () { pic_real_width = this.width; // Note: $(this).width() will not pic_real_height = this.height; // work for in memory images. }); }); </script> <style type="text/css"> @media screen { div.divFooter { display: block; } } @media print { .printbutton { display: none !important; } } </style> </head> <body> <table cellpadding="0" cellspacing="0" border="0" width="98%" align="center"> <tr> <td class="top_bg"> <div class="divFooter"> <img src="https://im4change.in/images/logo1.jpg" height="59" border="0" alt="Resource centre on India's rural distress" style="padding-top:14px;"/> </div> </td> </tr> <tr> <td id="topspace"> </td> </tr> <tr id="topspace"> <td> </td> </tr> <tr> <td height="50" style="border-bottom:1px solid #000; padding-top:10px;" class="printbutton"> <form><input type="button" value=" Print this page " onclick="window.print();return false;"/></form> </td> </tr> <tr> <td width="100%"> <h1 class="news_headlines" style="font-style:normal"> <strong>Unique Identity, Leakages and Development by Jayati Ghosh</strong></h1> </td> </tr> <tr> <td width="100%" style="font-family:Arial, 'Segoe Script', 'Segoe UI', sans-serif, serif"><font size="3"> <br /><div align="justify">For some reason, governments - as well as the development ''industry'' as a whole - have always had a tendency to look for universal panaceas, particular silver bullets that will solve all or most of their implementation problems and somehow achieve the development project for them. The latest such initiative bullet that seems to have been accepted as a silver bullet is the Unique Identification Project, which is now seen as the easy means to ensure no corruption and no leakages, and to ensure efficient access to what are going to be targeted systems of public delivery.<br /><br />On the face of it, the UID project appears to have many advantages for ordinary citizens, especially the poor. After all, the requirement of having multiple cards for particular kinds of access to public or other services, each of which is typically difficult to acquire, places disproportionate burdens on the poor. Anyone who has tried to get a ration card without some preferential access to lower level bureaucracy knows how prolonged and nightmarish the process can be. Even something like opening a bank account used to be a horrendously difficult and complicated process for those without masses of supporting documents. One of the great indirect benefits of the NREGA has been the system of payments through bank accounts, which has enabled many rural workers to access banks in a way that was simply denied to them earlier.<br /><br />All too often, acquiring any of these cards that provide access to some service requires not just lots of time and energy, but also the payment of bribes. So a system whereby the large transaction costs of acquiring different cards for different purposes are reduced and the entire process is simplified for the ordinary citizen is something that should be welcomed. In addition, it could be argued that having a single card for many different purposes would enable public service delivery to shift from its present form which is based entirely on residence, to a more flexible system that recognises the internal movement of people.<br /><br />But such attempts at simplifying life for those whose various socio-economic rights need to be met is rather different from creating and then enforcing a system that can lead not only to an invasion of basic privacy but also to possibly excessive and undesirable monitoring by the state.<br /><br />The UID project has already been devastatingly critiqued for its implications for privacy and civil liberties, by scholars such as R. Ramakumar and Jean Dreze. It is worth noting that in most developed countries, similar projects of governments have not been implemented after strong public pressure. Even where they have been, they have generally avoided putting in personal and professional details such as religion, ethnic identity, profession and socio-economic status. Yet such data are all explicitly part of the information gathering exercise for the UID project.<br /><br />The incorporation of biometric data raises a further hornet's nest, since it is now widely recognised that biometric information is subject to significant errors in large populations. This is among the factors that led the government of China to shelve their own plan for such information to be stored in identity cards. The current evidence on the technological possibilities of biometric data use suggests that it is not a foolproof system for preventing identity theft. It is also increasingly accepted that, since fingerprints of a person (especially those engaged in manual labour) can change over time, they may be unreliable guides to identity. Ramakumar points out that ''according to some estimates, in developing countries like India, the share of persons with noisy or bad data could go up to 15 per cent'', or more than 150 million people!<br /><br />What is even more troubling is how the government plans to use the UID data. There are attempts to coerce wage workers in rural India to ''voluntarily'' enter the scheme by making it mandatory for the issue of job cards of NREGA. There are reports that UID can be used to ''solve'' the problem of leakages and misappropriation from what is likely to be an immensely convoluted targeted Public Distribution Scheme (TPDS) for food grain. Next UID may be introduced in health programmes and other forms of basic delivery, on the false presumption that this will do away with corruption.<br /><br />This is a very fundamental mistake, which misses out the basic elements of the power relations that enable and assist the pattern of corruption in India, or even the possible errors in targeting. How will a UID system ensure that complicated systems of defining the poor actually do capture the right group and do not have well-known errors of unfair exclusion and unwarranted inclusion? How will it prevent those who systematically engage in siphoning off either NREGA wages or TPDS food grains from the rightful targets from continuing to do so? It is a simple matter to ensure that the recipient of wages or grain or any other good or service puts her or his fingerprints in the required spot, even if they receive only a fraction of what is their right. Introducing such a requirement is likely to undermine the very functioning of such schemes, especially the flagship programmes like NREGS.<br /><br />Technology cannot be a substitute for social transformation. If it is introduced in social and economic contexts of greatly unequal and oppressive power relations, the outcomes are likely to be the opposite of those intended by the most well-meaning of planners and implementers. The important lesson is that purely technological fixes will not work: it is not possible to avoid the crucial political economy challenge of the need to change and overthrow existing power structures that prevent and constrain genuine development.<br /><br /></div> </font> </td> </tr> <tr> <td> </td> </tr> <tr> <td height="50" style="border-top:1px solid #000; border-bottom:1px solid #000;padding-top:10px;"> <form><input type="button" value=" Print this page " onclick="window.print();return false;"/></form> </td> </tr> </table></body> </html>' } $maxBufferLength = (int) 8192 $file = '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Error/Debugger.php' $line = (int) 853 $message = 'Unable to emit headers. Headers sent in file=/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Error/Debugger.php line=853'Cake\Http\ResponseEmitter::emit() - CORE/src/Http/ResponseEmitter.php, line 48 Cake\Http\Server::emit() - CORE/src/Http/Server.php, line 141 [main] - ROOT/webroot/index.php, line 39
Warning (2): Cannot modify header information - headers already sent by (output started at /home/brlfuser/public_html/vendor/cakephp/cakephp/src/Error/Debugger.php:853) [CORE/src/Http/ResponseEmitter.php, line 148]Code Context$response->getStatusCode(),
($reasonPhrase ? ' ' . $reasonPhrase : '')
));
$response = object(Cake\Http\Response) { 'status' => (int) 200, 'contentType' => 'text/html', 'headers' => [ 'Content-Type' => [ [maximum depth reached] ] ], 'file' => null, 'fileRange' => [], 'cookies' => object(Cake\Http\Cookie\CookieCollection) {}, 'cacheDirectives' => [], 'body' => '<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <link rel="canonical" href="https://im4change.in/<pre class="cake-error"><a href="javascript:void(0);" onclick="document.getElementById('cakeErr67ea3c56b6c0b-trace').style.display = (document.getElementById('cakeErr67ea3c56b6c0b-trace').style.display == 'none' ? '' : 'none');"><b>Notice</b> (8)</a>: Undefined variable: urlPrefix [<b>APP/Template/Layout/printlayout.ctp</b>, line <b>8</b>]<div id="cakeErr67ea3c56b6c0b-trace" class="cake-stack-trace" style="display: none;"><a href="javascript:void(0);" onclick="document.getElementById('cakeErr67ea3c56b6c0b-code').style.display = (document.getElementById('cakeErr67ea3c56b6c0b-code').style.display == 'none' ? '' : 'none')">Code</a> <a href="javascript:void(0);" onclick="document.getElementById('cakeErr67ea3c56b6c0b-context').style.display = (document.getElementById('cakeErr67ea3c56b6c0b-context').style.display == 'none' ? '' : 'none')">Context</a><pre id="cakeErr67ea3c56b6c0b-code" class="cake-code-dump" style="display: none;"><code><span style="color: #000000"><span style="color: #0000BB"></span><span style="color: #007700"><</span><span style="color: #0000BB">head</span><span style="color: #007700">> </span></span></code> <span class="code-highlight"><code><span style="color: #000000"> <link rel="canonical" href="<span style="color: #0000BB"><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">Configure</span><span style="color: #007700">::</span><span style="color: #0000BB">read</span><span style="color: #007700">(</span><span style="color: #DD0000">'SITE_URL'</span><span style="color: #007700">); </span><span style="color: #0000BB">?><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">$urlPrefix</span><span style="color: #007700">;</span><span style="color: #0000BB">?><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">$article_current</span><span style="color: #007700">-></span><span style="color: #0000BB">category</span><span style="color: #007700">-></span><span style="color: #0000BB">slug</span><span style="color: #007700">; </span><span style="color: #0000BB">?></span>/<span style="color: #0000BB"><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">$article_current</span><span style="color: #007700">-></span><span style="color: #0000BB">seo_url</span><span style="color: #007700">; </span><span style="color: #0000BB">?></span>.html"/> </span></code></span> <code><span style="color: #000000"><span style="color: #0000BB"> </span><span style="color: #007700"><</span><span style="color: #0000BB">meta http</span><span style="color: #007700">-</span><span style="color: #0000BB">equiv</span><span style="color: #007700">=</span><span style="color: #DD0000">"Content-Type" </span><span style="color: #0000BB">content</span><span style="color: #007700">=</span><span style="color: #DD0000">"text/html; charset=utf-8"</span><span style="color: #007700">/> </span></span></code></pre><pre id="cakeErr67ea3c56b6c0b-context" class="cake-context" style="display: none;">$viewFile = '/home/brlfuser/public_html/src/Template/Layout/printlayout.ctp' $dataForView = [ 'article_current' => object(App\Model\Entity\Article) { 'id' => (int) 4933, 'title' => 'Unique Identity, Leakages and Development by Jayati Ghosh', 'subheading' => '', 'description' => '<br /> <div align="justify"> For some reason, governments - as well as the development ''industry'' as a whole - have always had a tendency to look for universal panaceas, particular silver bullets that will solve all or most of their implementation problems and somehow achieve the development project for them. The latest such initiative bullet that seems to have been accepted as a silver bullet is the Unique Identification Project, which is now seen as the easy means to ensure no corruption and no leakages, and to ensure efficient access to what are going to be targeted systems of public delivery.<br /> <br /> On the face of it, the UID project appears to have many advantages for ordinary citizens, especially the poor. After all, the requirement of having multiple cards for particular kinds of access to public or other services, each of which is typically difficult to acquire, places disproportionate burdens on the poor. Anyone who has tried to get a ration card without some preferential access to lower level bureaucracy knows how prolonged and nightmarish the process can be. Even something like opening a bank account used to be a horrendously difficult and complicated process for those without masses of supporting documents. One of the great indirect benefits of the NREGA has been the system of payments through bank accounts, which has enabled many rural workers to access banks in a way that was simply denied to them earlier.<br /> <br /> All too often, acquiring any of these cards that provide access to some service requires not just lots of time and energy, but also the payment of bribes. So a system whereby the large transaction costs of acquiring different cards for different purposes are reduced and the entire process is simplified for the ordinary citizen is something that should be welcomed. In addition, it could be argued that having a single card for many different purposes would enable public service delivery to shift from its present form which is based entirely on residence, to a more flexible system that recognises the internal movement of people.<br /> <br /> But such attempts at simplifying life for those whose various socio-economic rights need to be met is rather different from creating and then enforcing a system that can lead not only to an invasion of basic privacy but also to possibly excessive and undesirable monitoring by the state.<br /> <br /> The UID project has already been devastatingly critiqued for its implications for privacy and civil liberties, by scholars such as R. Ramakumar and Jean Dreze. It is worth noting that in most developed countries, similar projects of governments have not been implemented after strong public pressure. Even where they have been, they have generally avoided putting in personal and professional details such as religion, ethnic identity, profession and socio-economic status. Yet such data are all explicitly part of the information gathering exercise for the UID project.<br /> <br /> The incorporation of biometric data raises a further hornet's nest, since it is now widely recognised that biometric information is subject to significant errors in large populations. This is among the factors that led the government of China to shelve their own plan for such information to be stored in identity cards. The current evidence on the technological possibilities of biometric data use suggests that it is not a foolproof system for preventing identity theft. It is also increasingly accepted that, since fingerprints of a person (especially those engaged in manual labour) can change over time, they may be unreliable guides to identity. Ramakumar points out that ''according to some estimates, in developing countries like India, the share of persons with noisy or bad data could go up to 15 per cent'', or more than 150 million people!<br /> <br /> What is even more troubling is how the government plans to use the UID data. There are attempts to coerce wage workers in rural India to ''voluntarily'' enter the scheme by making it mandatory for the issue of job cards of NREGA. There are reports that UID can be used to ''solve'' the problem of leakages and misappropriation from what is likely to be an immensely convoluted targeted Public Distribution Scheme (TPDS) for food grain. Next UID may be introduced in health programmes and other forms of basic delivery, on the false presumption that this will do away with corruption.<br /> <br /> This is a very fundamental mistake, which misses out the basic elements of the power relations that enable and assist the pattern of corruption in India, or even the possible errors in targeting. How will a UID system ensure that complicated systems of defining the poor actually do capture the right group and do not have well-known errors of unfair exclusion and unwarranted inclusion? How will it prevent those who systematically engage in siphoning off either NREGA wages or TPDS food grains from the rightful targets from continuing to do so? It is a simple matter to ensure that the recipient of wages or grain or any other good or service puts her or his fingerprints in the required spot, even if they receive only a fraction of what is their right. Introducing such a requirement is likely to undermine the very functioning of such schemes, especially the flagship programmes like NREGS.<br /> <br /> Technology cannot be a substitute for social transformation. If it is introduced in social and economic contexts of greatly unequal and oppressive power relations, the outcomes are likely to be the opposite of those intended by the most well-meaning of planners and implementers. The important lesson is that purely technological fixes will not work: it is not possible to avoid the crucial political economy challenge of the need to change and overthrow existing power structures that prevent and constrain genuine development.<br /> <br /> </div>', 'credit_writer' => 'Macroscan.com, 16 December, 2010, http://macroscan.com/cur/dec10/cur161210Unique_Identity.htm', 'article_img' => '', 'article_img_thumb' => '', 'status' => (int) 1, 'show_on_home' => (int) 1, 'lang' => 'EN', 'category_id' => (int) 16, 'tag_keyword' => '', 'seo_url' => 'unique-identity-leakages-and-development-by-jayati-ghosh-5025', 'meta_title' => null, 'meta_keywords' => null, 'meta_description' => null, 'noindex' => (int) 0, 'publish_date' => object(Cake\I18n\FrozenDate) {}, 'most_visit_section_id' => null, 'article_big_img' => null, 'liveid' => (int) 5025, 'created' => object(Cake\I18n\FrozenTime) {}, 'modified' => object(Cake\I18n\FrozenTime) {}, 'edate' => '', 'tags' => [ [maximum depth reached] ], 'category' => object(App\Model\Entity\Category) {}, '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[hasErrors]' => false, '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'Articles' }, 'articleid' => (int) 4933, 'metaTitle' => 'LATEST NEWS UPDATES | Unique Identity, Leakages and Development by Jayati Ghosh', 'metaKeywords' => 'UIDAI,NREGS,PDS', 'metaDesc' => ' For some reason, governments - as well as the development ''industry'' as a whole - have always had a tendency to look for universal panaceas, particular silver bullets that will solve all or most of their implementation problems and somehow...', 'disp' => '<br /><div align="justify">For some reason, governments - as well as the development ''industry'' as a whole - have always had a tendency to look for universal panaceas, particular silver bullets that will solve all or most of their implementation problems and somehow achieve the development project for them. The latest such initiative bullet that seems to have been accepted as a silver bullet is the Unique Identification Project, which is now seen as the easy means to ensure no corruption and no leakages, and to ensure efficient access to what are going to be targeted systems of public delivery.<br /><br />On the face of it, the UID project appears to have many advantages for ordinary citizens, especially the poor. After all, the requirement of having multiple cards for particular kinds of access to public or other services, each of which is typically difficult to acquire, places disproportionate burdens on the poor. Anyone who has tried to get a ration card without some preferential access to lower level bureaucracy knows how prolonged and nightmarish the process can be. Even something like opening a bank account used to be a horrendously difficult and complicated process for those without masses of supporting documents. One of the great indirect benefits of the NREGA has been the system of payments through bank accounts, which has enabled many rural workers to access banks in a way that was simply denied to them earlier.<br /><br />All too often, acquiring any of these cards that provide access to some service requires not just lots of time and energy, but also the payment of bribes. So a system whereby the large transaction costs of acquiring different cards for different purposes are reduced and the entire process is simplified for the ordinary citizen is something that should be welcomed. In addition, it could be argued that having a single card for many different purposes would enable public service delivery to shift from its present form which is based entirely on residence, to a more flexible system that recognises the internal movement of people.<br /><br />But such attempts at simplifying life for those whose various socio-economic rights need to be met is rather different from creating and then enforcing a system that can lead not only to an invasion of basic privacy but also to possibly excessive and undesirable monitoring by the state.<br /><br />The UID project has already been devastatingly critiqued for its implications for privacy and civil liberties, by scholars such as R. Ramakumar and Jean Dreze. It is worth noting that in most developed countries, similar projects of governments have not been implemented after strong public pressure. Even where they have been, they have generally avoided putting in personal and professional details such as religion, ethnic identity, profession and socio-economic status. Yet such data are all explicitly part of the information gathering exercise for the UID project.<br /><br />The incorporation of biometric data raises a further hornet's nest, since it is now widely recognised that biometric information is subject to significant errors in large populations. This is among the factors that led the government of China to shelve their own plan for such information to be stored in identity cards. The current evidence on the technological possibilities of biometric data use suggests that it is not a foolproof system for preventing identity theft. It is also increasingly accepted that, since fingerprints of a person (especially those engaged in manual labour) can change over time, they may be unreliable guides to identity. Ramakumar points out that ''according to some estimates, in developing countries like India, the share of persons with noisy or bad data could go up to 15 per cent'', or more than 150 million people!<br /><br />What is even more troubling is how the government plans to use the UID data. There are attempts to coerce wage workers in rural India to ''voluntarily'' enter the scheme by making it mandatory for the issue of job cards of NREGA. There are reports that UID can be used to ''solve'' the problem of leakages and misappropriation from what is likely to be an immensely convoluted targeted Public Distribution Scheme (TPDS) for food grain. Next UID may be introduced in health programmes and other forms of basic delivery, on the false presumption that this will do away with corruption.<br /><br />This is a very fundamental mistake, which misses out the basic elements of the power relations that enable and assist the pattern of corruption in India, or even the possible errors in targeting. How will a UID system ensure that complicated systems of defining the poor actually do capture the right group and do not have well-known errors of unfair exclusion and unwarranted inclusion? How will it prevent those who systematically engage in siphoning off either NREGA wages or TPDS food grains from the rightful targets from continuing to do so? It is a simple matter to ensure that the recipient of wages or grain or any other good or service puts her or his fingerprints in the required spot, even if they receive only a fraction of what is their right. Introducing such a requirement is likely to undermine the very functioning of such schemes, especially the flagship programmes like NREGS.<br /><br />Technology cannot be a substitute for social transformation. If it is introduced in social and economic contexts of greatly unequal and oppressive power relations, the outcomes are likely to be the opposite of those intended by the most well-meaning of planners and implementers. The important lesson is that purely technological fixes will not work: it is not possible to avoid the crucial political economy challenge of the need to change and overthrow existing power structures that prevent and constrain genuine development.<br /><br /></div>', 'lang' => 'English', 'SITE_URL' => 'https://im4change.in/', 'site_title' => 'im4change', 'adminprix' => 'admin' ] $article_current = object(App\Model\Entity\Article) { 'id' => (int) 4933, 'title' => 'Unique Identity, Leakages and Development by Jayati Ghosh', 'subheading' => '', 'description' => '<br /> <div align="justify"> For some reason, governments - as well as the development ''industry'' as a whole - have always had a tendency to look for universal panaceas, particular silver bullets that will solve all or most of their implementation problems and somehow achieve the development project for them. The latest such initiative bullet that seems to have been accepted as a silver bullet is the Unique Identification Project, which is now seen as the easy means to ensure no corruption and no leakages, and to ensure efficient access to what are going to be targeted systems of public delivery.<br /> <br /> On the face of it, the UID project appears to have many advantages for ordinary citizens, especially the poor. After all, the requirement of having multiple cards for particular kinds of access to public or other services, each of which is typically difficult to acquire, places disproportionate burdens on the poor. Anyone who has tried to get a ration card without some preferential access to lower level bureaucracy knows how prolonged and nightmarish the process can be. Even something like opening a bank account used to be a horrendously difficult and complicated process for those without masses of supporting documents. One of the great indirect benefits of the NREGA has been the system of payments through bank accounts, which has enabled many rural workers to access banks in a way that was simply denied to them earlier.<br /> <br /> All too often, acquiring any of these cards that provide access to some service requires not just lots of time and energy, but also the payment of bribes. So a system whereby the large transaction costs of acquiring different cards for different purposes are reduced and the entire process is simplified for the ordinary citizen is something that should be welcomed. In addition, it could be argued that having a single card for many different purposes would enable public service delivery to shift from its present form which is based entirely on residence, to a more flexible system that recognises the internal movement of people.<br /> <br /> But such attempts at simplifying life for those whose various socio-economic rights need to be met is rather different from creating and then enforcing a system that can lead not only to an invasion of basic privacy but also to possibly excessive and undesirable monitoring by the state.<br /> <br /> The UID project has already been devastatingly critiqued for its implications for privacy and civil liberties, by scholars such as R. Ramakumar and Jean Dreze. It is worth noting that in most developed countries, similar projects of governments have not been implemented after strong public pressure. Even where they have been, they have generally avoided putting in personal and professional details such as religion, ethnic identity, profession and socio-economic status. Yet such data are all explicitly part of the information gathering exercise for the UID project.<br /> <br /> The incorporation of biometric data raises a further hornet's nest, since it is now widely recognised that biometric information is subject to significant errors in large populations. This is among the factors that led the government of China to shelve their own plan for such information to be stored in identity cards. The current evidence on the technological possibilities of biometric data use suggests that it is not a foolproof system for preventing identity theft. It is also increasingly accepted that, since fingerprints of a person (especially those engaged in manual labour) can change over time, they may be unreliable guides to identity. Ramakumar points out that ''according to some estimates, in developing countries like India, the share of persons with noisy or bad data could go up to 15 per cent'', or more than 150 million people!<br /> <br /> What is even more troubling is how the government plans to use the UID data. There are attempts to coerce wage workers in rural India to ''voluntarily'' enter the scheme by making it mandatory for the issue of job cards of NREGA. There are reports that UID can be used to ''solve'' the problem of leakages and misappropriation from what is likely to be an immensely convoluted targeted Public Distribution Scheme (TPDS) for food grain. Next UID may be introduced in health programmes and other forms of basic delivery, on the false presumption that this will do away with corruption.<br /> <br /> This is a very fundamental mistake, which misses out the basic elements of the power relations that enable and assist the pattern of corruption in India, or even the possible errors in targeting. How will a UID system ensure that complicated systems of defining the poor actually do capture the right group and do not have well-known errors of unfair exclusion and unwarranted inclusion? How will it prevent those who systematically engage in siphoning off either NREGA wages or TPDS food grains from the rightful targets from continuing to do so? It is a simple matter to ensure that the recipient of wages or grain or any other good or service puts her or his fingerprints in the required spot, even if they receive only a fraction of what is their right. Introducing such a requirement is likely to undermine the very functioning of such schemes, especially the flagship programmes like NREGS.<br /> <br /> Technology cannot be a substitute for social transformation. If it is introduced in social and economic contexts of greatly unequal and oppressive power relations, the outcomes are likely to be the opposite of those intended by the most well-meaning of planners and implementers. The important lesson is that purely technological fixes will not work: it is not possible to avoid the crucial political economy challenge of the need to change and overthrow existing power structures that prevent and constrain genuine development.<br /> <br /> </div>', 'credit_writer' => 'Macroscan.com, 16 December, 2010, http://macroscan.com/cur/dec10/cur161210Unique_Identity.htm', 'article_img' => '', 'article_img_thumb' => '', 'status' => (int) 1, 'show_on_home' => (int) 1, 'lang' => 'EN', 'category_id' => (int) 16, 'tag_keyword' => '', 'seo_url' => 'unique-identity-leakages-and-development-by-jayati-ghosh-5025', 'meta_title' => null, 'meta_keywords' => null, 'meta_description' => null, 'noindex' => (int) 0, 'publish_date' => object(Cake\I18n\FrozenDate) {}, 'most_visit_section_id' => null, 'article_big_img' => null, 'liveid' => (int) 5025, 'created' => object(Cake\I18n\FrozenTime) {}, 'modified' => object(Cake\I18n\FrozenTime) {}, 'edate' => '', 'tags' => [ (int) 0 => object(Cake\ORM\Entity) {}, (int) 1 => object(Cake\ORM\Entity) {}, (int) 2 => object(Cake\ORM\Entity) {} ], 'category' => object(App\Model\Entity\Category) {}, '[new]' => false, '[accessible]' => [ '*' => true, 'id' => false ], '[dirty]' => [], '[original]' => [], '[virtual]' => [], '[hasErrors]' => false, '[errors]' => [], '[invalid]' => [], '[repository]' => 'Articles' } $articleid = (int) 4933 $metaTitle = 'LATEST NEWS UPDATES | Unique Identity, Leakages and Development by Jayati Ghosh' $metaKeywords = 'UIDAI,NREGS,PDS' $metaDesc = ' For some reason, governments - as well as the development ''industry'' as a whole - have always had a tendency to look for universal panaceas, particular silver bullets that will solve all or most of their implementation problems and somehow...' $disp = '<br /><div align="justify">For some reason, governments - as well as the development ''industry'' as a whole - have always had a tendency to look for universal panaceas, particular silver bullets that will solve all or most of their implementation problems and somehow achieve the development project for them. The latest such initiative bullet that seems to have been accepted as a silver bullet is the Unique Identification Project, which is now seen as the easy means to ensure no corruption and no leakages, and to ensure efficient access to what are going to be targeted systems of public delivery.<br /><br />On the face of it, the UID project appears to have many advantages for ordinary citizens, especially the poor. After all, the requirement of having multiple cards for particular kinds of access to public or other services, each of which is typically difficult to acquire, places disproportionate burdens on the poor. Anyone who has tried to get a ration card without some preferential access to lower level bureaucracy knows how prolonged and nightmarish the process can be. Even something like opening a bank account used to be a horrendously difficult and complicated process for those without masses of supporting documents. One of the great indirect benefits of the NREGA has been the system of payments through bank accounts, which has enabled many rural workers to access banks in a way that was simply denied to them earlier.<br /><br />All too often, acquiring any of these cards that provide access to some service requires not just lots of time and energy, but also the payment of bribes. So a system whereby the large transaction costs of acquiring different cards for different purposes are reduced and the entire process is simplified for the ordinary citizen is something that should be welcomed. In addition, it could be argued that having a single card for many different purposes would enable public service delivery to shift from its present form which is based entirely on residence, to a more flexible system that recognises the internal movement of people.<br /><br />But such attempts at simplifying life for those whose various socio-economic rights need to be met is rather different from creating and then enforcing a system that can lead not only to an invasion of basic privacy but also to possibly excessive and undesirable monitoring by the state.<br /><br />The UID project has already been devastatingly critiqued for its implications for privacy and civil liberties, by scholars such as R. Ramakumar and Jean Dreze. It is worth noting that in most developed countries, similar projects of governments have not been implemented after strong public pressure. Even where they have been, they have generally avoided putting in personal and professional details such as religion, ethnic identity, profession and socio-economic status. Yet such data are all explicitly part of the information gathering exercise for the UID project.<br /><br />The incorporation of biometric data raises a further hornet's nest, since it is now widely recognised that biometric information is subject to significant errors in large populations. This is among the factors that led the government of China to shelve their own plan for such information to be stored in identity cards. The current evidence on the technological possibilities of biometric data use suggests that it is not a foolproof system for preventing identity theft. It is also increasingly accepted that, since fingerprints of a person (especially those engaged in manual labour) can change over time, they may be unreliable guides to identity. Ramakumar points out that ''according to some estimates, in developing countries like India, the share of persons with noisy or bad data could go up to 15 per cent'', or more than 150 million people!<br /><br />What is even more troubling is how the government plans to use the UID data. There are attempts to coerce wage workers in rural India to ''voluntarily'' enter the scheme by making it mandatory for the issue of job cards of NREGA. There are reports that UID can be used to ''solve'' the problem of leakages and misappropriation from what is likely to be an immensely convoluted targeted Public Distribution Scheme (TPDS) for food grain. Next UID may be introduced in health programmes and other forms of basic delivery, on the false presumption that this will do away with corruption.<br /><br />This is a very fundamental mistake, which misses out the basic elements of the power relations that enable and assist the pattern of corruption in India, or even the possible errors in targeting. How will a UID system ensure that complicated systems of defining the poor actually do capture the right group and do not have well-known errors of unfair exclusion and unwarranted inclusion? How will it prevent those who systematically engage in siphoning off either NREGA wages or TPDS food grains from the rightful targets from continuing to do so? It is a simple matter to ensure that the recipient of wages or grain or any other good or service puts her or his fingerprints in the required spot, even if they receive only a fraction of what is their right. Introducing such a requirement is likely to undermine the very functioning of such schemes, especially the flagship programmes like NREGS.<br /><br />Technology cannot be a substitute for social transformation. If it is introduced in social and economic contexts of greatly unequal and oppressive power relations, the outcomes are likely to be the opposite of those intended by the most well-meaning of planners and implementers. The important lesson is that purely technological fixes will not work: it is not possible to avoid the crucial political economy challenge of the need to change and overthrow existing power structures that prevent and constrain genuine development.<br /><br /></div>' $lang = 'English' $SITE_URL = 'https://im4change.in/' $site_title = 'im4change' $adminprix = 'admin'</pre><pre class="stack-trace">include - APP/Template/Layout/printlayout.ctp, line 8 Cake\View\View::_evaluate() - CORE/src/View/View.php, line 1413 Cake\View\View::_render() - CORE/src/View/View.php, line 1374 Cake\View\View::renderLayout() - CORE/src/View/View.php, line 927 Cake\View\View::render() - CORE/src/View/View.php, line 885 Cake\Controller\Controller::render() - CORE/src/Controller/Controller.php, line 791 Cake\Http\ActionDispatcher::_invoke() - CORE/src/Http/ActionDispatcher.php, line 126 Cake\Http\ActionDispatcher::dispatch() - CORE/src/Http/ActionDispatcher.php, line 94 Cake\Http\BaseApplication::__invoke() - CORE/src/Http/BaseApplication.php, line 235 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\RoutingMiddleware::__invoke() - CORE/src/Routing/Middleware/RoutingMiddleware.php, line 162 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\AssetMiddleware::__invoke() - CORE/src/Routing/Middleware/AssetMiddleware.php, line 88 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Error\Middleware\ErrorHandlerMiddleware::__invoke() - CORE/src/Error/Middleware/ErrorHandlerMiddleware.php, line 96 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Http\Runner::run() - CORE/src/Http/Runner.php, line 51</pre></div></pre>latest-news-updates/unique-identity-leakages-and-development-by-jayati-ghosh-5025.html"/> <meta http-equiv="Content-Type" content="text/html; charset=utf-8"/> <link href="https://im4change.in/css/control.css" rel="stylesheet" type="text/css" media="all"/> <title>LATEST NEWS UPDATES | Unique Identity, Leakages and Development by Jayati Ghosh | Im4change.org</title> <meta name="description" content=" For some reason, governments - as well as the development ''industry'' as a whole - have always had a tendency to look for universal panaceas, particular silver bullets that will solve all or most of their implementation problems and somehow..."/> <script src="https://im4change.in/js/jquery-1.10.2.js"></script> <script type="text/javascript" src="https://im4change.in/js/jquery-migrate.min.js"></script> <script language="javascript" type="text/javascript"> $(document).ready(function () { var img = $("img")[0]; // Get my img elem var pic_real_width, pic_real_height; $("<img/>") // Make in memory copy of image to avoid css issues .attr("src", $(img).attr("src")) .load(function () { pic_real_width = this.width; // Note: $(this).width() will not pic_real_height = this.height; // work for in memory images. }); }); </script> <style type="text/css"> @media screen { div.divFooter { display: block; } } @media print { .printbutton { display: none !important; } } </style> </head> <body> <table cellpadding="0" cellspacing="0" border="0" width="98%" align="center"> <tr> <td class="top_bg"> <div class="divFooter"> <img src="https://im4change.in/images/logo1.jpg" height="59" border="0" alt="Resource centre on India's rural distress" style="padding-top:14px;"/> </div> </td> </tr> <tr> <td id="topspace"> </td> </tr> <tr id="topspace"> <td> </td> </tr> <tr> <td height="50" style="border-bottom:1px solid #000; padding-top:10px;" class="printbutton"> <form><input type="button" value=" Print this page " onclick="window.print();return false;"/></form> </td> </tr> <tr> <td width="100%"> <h1 class="news_headlines" style="font-style:normal"> <strong>Unique Identity, Leakages and Development by Jayati Ghosh</strong></h1> </td> </tr> <tr> <td width="100%" style="font-family:Arial, 'Segoe Script', 'Segoe UI', sans-serif, serif"><font size="3"> <br /><div align="justify">For some reason, governments - as well as the development ''industry'' as a whole - have always had a tendency to look for universal panaceas, particular silver bullets that will solve all or most of their implementation problems and somehow achieve the development project for them. The latest such initiative bullet that seems to have been accepted as a silver bullet is the Unique Identification Project, which is now seen as the easy means to ensure no corruption and no leakages, and to ensure efficient access to what are going to be targeted systems of public delivery.<br /><br />On the face of it, the UID project appears to have many advantages for ordinary citizens, especially the poor. After all, the requirement of having multiple cards for particular kinds of access to public or other services, each of which is typically difficult to acquire, places disproportionate burdens on the poor. Anyone who has tried to get a ration card without some preferential access to lower level bureaucracy knows how prolonged and nightmarish the process can be. Even something like opening a bank account used to be a horrendously difficult and complicated process for those without masses of supporting documents. One of the great indirect benefits of the NREGA has been the system of payments through bank accounts, which has enabled many rural workers to access banks in a way that was simply denied to them earlier.<br /><br />All too often, acquiring any of these cards that provide access to some service requires not just lots of time and energy, but also the payment of bribes. So a system whereby the large transaction costs of acquiring different cards for different purposes are reduced and the entire process is simplified for the ordinary citizen is something that should be welcomed. In addition, it could be argued that having a single card for many different purposes would enable public service delivery to shift from its present form which is based entirely on residence, to a more flexible system that recognises the internal movement of people.<br /><br />But such attempts at simplifying life for those whose various socio-economic rights need to be met is rather different from creating and then enforcing a system that can lead not only to an invasion of basic privacy but also to possibly excessive and undesirable monitoring by the state.<br /><br />The UID project has already been devastatingly critiqued for its implications for privacy and civil liberties, by scholars such as R. Ramakumar and Jean Dreze. It is worth noting that in most developed countries, similar projects of governments have not been implemented after strong public pressure. Even where they have been, they have generally avoided putting in personal and professional details such as religion, ethnic identity, profession and socio-economic status. Yet such data are all explicitly part of the information gathering exercise for the UID project.<br /><br />The incorporation of biometric data raises a further hornet's nest, since it is now widely recognised that biometric information is subject to significant errors in large populations. This is among the factors that led the government of China to shelve their own plan for such information to be stored in identity cards. The current evidence on the technological possibilities of biometric data use suggests that it is not a foolproof system for preventing identity theft. It is also increasingly accepted that, since fingerprints of a person (especially those engaged in manual labour) can change over time, they may be unreliable guides to identity. Ramakumar points out that ''according to some estimates, in developing countries like India, the share of persons with noisy or bad data could go up to 15 per cent'', or more than 150 million people!<br /><br />What is even more troubling is how the government plans to use the UID data. There are attempts to coerce wage workers in rural India to ''voluntarily'' enter the scheme by making it mandatory for the issue of job cards of NREGA. There are reports that UID can be used to ''solve'' the problem of leakages and misappropriation from what is likely to be an immensely convoluted targeted Public Distribution Scheme (TPDS) for food grain. Next UID may be introduced in health programmes and other forms of basic delivery, on the false presumption that this will do away with corruption.<br /><br />This is a very fundamental mistake, which misses out the basic elements of the power relations that enable and assist the pattern of corruption in India, or even the possible errors in targeting. How will a UID system ensure that complicated systems of defining the poor actually do capture the right group and do not have well-known errors of unfair exclusion and unwarranted inclusion? How will it prevent those who systematically engage in siphoning off either NREGA wages or TPDS food grains from the rightful targets from continuing to do so? It is a simple matter to ensure that the recipient of wages or grain or any other good or service puts her or his fingerprints in the required spot, even if they receive only a fraction of what is their right. Introducing such a requirement is likely to undermine the very functioning of such schemes, especially the flagship programmes like NREGS.<br /><br />Technology cannot be a substitute for social transformation. If it is introduced in social and economic contexts of greatly unequal and oppressive power relations, the outcomes are likely to be the opposite of those intended by the most well-meaning of planners and implementers. The important lesson is that purely technological fixes will not work: it is not possible to avoid the crucial political economy challenge of the need to change and overthrow existing power structures that prevent and constrain genuine development.<br /><br /></div> </font> </td> </tr> <tr> <td> </td> </tr> <tr> <td height="50" style="border-top:1px solid #000; border-bottom:1px solid #000;padding-top:10px;"> <form><input type="button" value=" Print this page " onclick="window.print();return false;"/></form> </td> </tr> </table></body> </html>' } $reasonPhrase = 'OK'header - [internal], line ?? Cake\Http\ResponseEmitter::emitStatusLine() - CORE/src/Http/ResponseEmitter.php, line 148 Cake\Http\ResponseEmitter::emit() - CORE/src/Http/ResponseEmitter.php, line 54 Cake\Http\Server::emit() - CORE/src/Http/Server.php, line 141 [main] - ROOT/webroot/index.php, line 39
Warning (2): Cannot modify header information - headers already sent by (output started at /home/brlfuser/public_html/vendor/cakephp/cakephp/src/Error/Debugger.php:853) [CORE/src/Http/ResponseEmitter.php, line 181]Notice (8): Undefined variable: urlPrefix [APP/Template/Layout/printlayout.ctp, line 8]Code Context$value
), $first);
$first = false;
$response = object(Cake\Http\Response) { 'status' => (int) 200, 'contentType' => 'text/html', 'headers' => [ 'Content-Type' => [ [maximum depth reached] ] ], 'file' => null, 'fileRange' => [], 'cookies' => object(Cake\Http\Cookie\CookieCollection) {}, 'cacheDirectives' => [], 'body' => '<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <link rel="canonical" href="https://im4change.in/<pre class="cake-error"><a href="javascript:void(0);" onclick="document.getElementById('cakeErr67ea3c56b6c0b-trace').style.display = (document.getElementById('cakeErr67ea3c56b6c0b-trace').style.display == 'none' ? '' : 'none');"><b>Notice</b> (8)</a>: Undefined variable: urlPrefix [<b>APP/Template/Layout/printlayout.ctp</b>, line <b>8</b>]<div id="cakeErr67ea3c56b6c0b-trace" class="cake-stack-trace" style="display: none;"><a href="javascript:void(0);" onclick="document.getElementById('cakeErr67ea3c56b6c0b-code').style.display = (document.getElementById('cakeErr67ea3c56b6c0b-code').style.display == 'none' ? '' : 'none')">Code</a> <a href="javascript:void(0);" onclick="document.getElementById('cakeErr67ea3c56b6c0b-context').style.display = (document.getElementById('cakeErr67ea3c56b6c0b-context').style.display == 'none' ? '' : 'none')">Context</a><pre id="cakeErr67ea3c56b6c0b-code" class="cake-code-dump" style="display: none;"><code><span style="color: #000000"><span style="color: #0000BB"></span><span style="color: #007700"><</span><span style="color: #0000BB">head</span><span style="color: #007700">> </span></span></code> <span class="code-highlight"><code><span style="color: #000000"> <link rel="canonical" href="<span style="color: #0000BB"><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">Configure</span><span style="color: #007700">::</span><span style="color: #0000BB">read</span><span style="color: #007700">(</span><span style="color: #DD0000">'SITE_URL'</span><span style="color: #007700">); </span><span style="color: #0000BB">?><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">$urlPrefix</span><span style="color: #007700">;</span><span style="color: #0000BB">?><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">$article_current</span><span style="color: #007700">-></span><span style="color: #0000BB">category</span><span style="color: #007700">-></span><span style="color: #0000BB">slug</span><span style="color: #007700">; </span><span style="color: #0000BB">?></span>/<span style="color: #0000BB"><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">$article_current</span><span style="color: #007700">-></span><span style="color: #0000BB">seo_url</span><span style="color: #007700">; </span><span style="color: #0000BB">?></span>.html"/> </span></code></span> <code><span style="color: #000000"><span style="color: #0000BB"> </span><span style="color: #007700"><</span><span style="color: #0000BB">meta http</span><span style="color: #007700">-</span><span style="color: #0000BB">equiv</span><span style="color: #007700">=</span><span style="color: #DD0000">"Content-Type" </span><span style="color: #0000BB">content</span><span style="color: #007700">=</span><span style="color: #DD0000">"text/html; charset=utf-8"</span><span style="color: #007700">/> </span></span></code></pre><pre id="cakeErr67ea3c56b6c0b-context" class="cake-context" style="display: none;">$viewFile = '/home/brlfuser/public_html/src/Template/Layout/printlayout.ctp' $dataForView = [ 'article_current' => object(App\Model\Entity\Article) { 'id' => (int) 4933, 'title' => 'Unique Identity, Leakages and Development by Jayati Ghosh', 'subheading' => '', 'description' => '<br /> <div align="justify"> For some reason, governments - as well as the development ''industry'' as a whole - have always had a tendency to look for universal panaceas, particular silver bullets that will solve all or most of their implementation problems and somehow achieve the development project for them. The latest such initiative bullet that seems to have been accepted as a silver bullet is the Unique Identification Project, which is now seen as the easy means to ensure no corruption and no leakages, and to ensure efficient access to what are going to be targeted systems of public delivery.<br /> <br /> On the face of it, the UID project appears to have many advantages for ordinary citizens, especially the poor. After all, the requirement of having multiple cards for particular kinds of access to public or other services, each of which is typically difficult to acquire, places disproportionate burdens on the poor. Anyone who has tried to get a ration card without some preferential access to lower level bureaucracy knows how prolonged and nightmarish the process can be. Even something like opening a bank account used to be a horrendously difficult and complicated process for those without masses of supporting documents. One of the great indirect benefits of the NREGA has been the system of payments through bank accounts, which has enabled many rural workers to access banks in a way that was simply denied to them earlier.<br /> <br /> All too often, acquiring any of these cards that provide access to some service requires not just lots of time and energy, but also the payment of bribes. So a system whereby the large transaction costs of acquiring different cards for different purposes are reduced and the entire process is simplified for the ordinary citizen is something that should be welcomed. In addition, it could be argued that having a single card for many different purposes would enable public service delivery to shift from its present form which is based entirely on residence, to a more flexible system that recognises the internal movement of people.<br /> <br /> But such attempts at simplifying life for those whose various socio-economic rights need to be met is rather different from creating and then enforcing a system that can lead not only to an invasion of basic privacy but also to possibly excessive and undesirable monitoring by the state.<br /> <br /> The UID project has already been devastatingly critiqued for its implications for privacy and civil liberties, by scholars such as R. Ramakumar and Jean Dreze. It is worth noting that in most developed countries, similar projects of governments have not been implemented after strong public pressure. Even where they have been, they have generally avoided putting in personal and professional details such as religion, ethnic identity, profession and socio-economic status. Yet such data are all explicitly part of the information gathering exercise for the UID project.<br /> <br /> The incorporation of biometric data raises a further hornet's nest, since it is now widely recognised that biometric information is subject to significant errors in large populations. This is among the factors that led the government of China to shelve their own plan for such information to be stored in identity cards. The current evidence on the technological possibilities of biometric data use suggests that it is not a foolproof system for preventing identity theft. It is also increasingly accepted that, since fingerprints of a person (especially those engaged in manual labour) can change over time, they may be unreliable guides to identity. Ramakumar points out that ''according to some estimates, in developing countries like India, the share of persons with noisy or bad data could go up to 15 per cent'', or more than 150 million people!<br /> <br /> What is even more troubling is how the government plans to use the UID data. There are attempts to coerce wage workers in rural India to ''voluntarily'' enter the scheme by making it mandatory for the issue of job cards of NREGA. There are reports that UID can be used to ''solve'' the problem of leakages and misappropriation from what is likely to be an immensely convoluted targeted Public Distribution Scheme (TPDS) for food grain. Next UID may be introduced in health programmes and other forms of basic delivery, on the false presumption that this will do away with corruption.<br /> <br /> This is a very fundamental mistake, which misses out the basic elements of the power relations that enable and assist the pattern of corruption in India, or even the possible errors in targeting. How will a UID system ensure that complicated systems of defining the poor actually do capture the right group and do not have well-known errors of unfair exclusion and unwarranted inclusion? How will it prevent those who systematically engage in siphoning off either NREGA wages or TPDS food grains from the rightful targets from continuing to do so? It is a simple matter to ensure that the recipient of wages or grain or any other good or service puts her or his fingerprints in the required spot, even if they receive only a fraction of what is their right. Introducing such a requirement is likely to undermine the very functioning of such schemes, especially the flagship programmes like NREGS.<br /> <br /> Technology cannot be a substitute for social transformation. If it is introduced in social and economic contexts of greatly unequal and oppressive power relations, the outcomes are likely to be the opposite of those intended by the most well-meaning of planners and implementers. The important lesson is that purely technological fixes will not work: it is not possible to avoid the crucial political economy challenge of the need to change and overthrow existing power structures that prevent and constrain genuine development.<br /> <br /> </div>', 'credit_writer' => 'Macroscan.com, 16 December, 2010, http://macroscan.com/cur/dec10/cur161210Unique_Identity.htm', 'article_img' => '', 'article_img_thumb' => '', 'status' => (int) 1, 'show_on_home' => (int) 1, 'lang' => 'EN', 'category_id' => (int) 16, 'tag_keyword' => '', 'seo_url' => 'unique-identity-leakages-and-development-by-jayati-ghosh-5025', 'meta_title' => null, 'meta_keywords' => null, 'meta_description' => null, 'noindex' => (int) 0, 'publish_date' => object(Cake\I18n\FrozenDate) {}, 'most_visit_section_id' => null, 'article_big_img' => null, 'liveid' => (int) 5025, 'created' => object(Cake\I18n\FrozenTime) {}, 'modified' => object(Cake\I18n\FrozenTime) {}, 'edate' => '', 'tags' => [ [maximum depth reached] ], 'category' => object(App\Model\Entity\Category) {}, '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[hasErrors]' => false, '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'Articles' }, 'articleid' => (int) 4933, 'metaTitle' => 'LATEST NEWS UPDATES | Unique Identity, Leakages and Development by Jayati Ghosh', 'metaKeywords' => 'UIDAI,NREGS,PDS', 'metaDesc' => ' For some reason, governments - as well as the development ''industry'' as a whole - have always had a tendency to look for universal panaceas, particular silver bullets that will solve all or most of their implementation problems and somehow...', 'disp' => '<br /><div align="justify">For some reason, governments - as well as the development ''industry'' as a whole - have always had a tendency to look for universal panaceas, particular silver bullets that will solve all or most of their implementation problems and somehow achieve the development project for them. The latest such initiative bullet that seems to have been accepted as a silver bullet is the Unique Identification Project, which is now seen as the easy means to ensure no corruption and no leakages, and to ensure efficient access to what are going to be targeted systems of public delivery.<br /><br />On the face of it, the UID project appears to have many advantages for ordinary citizens, especially the poor. After all, the requirement of having multiple cards for particular kinds of access to public or other services, each of which is typically difficult to acquire, places disproportionate burdens on the poor. Anyone who has tried to get a ration card without some preferential access to lower level bureaucracy knows how prolonged and nightmarish the process can be. Even something like opening a bank account used to be a horrendously difficult and complicated process for those without masses of supporting documents. One of the great indirect benefits of the NREGA has been the system of payments through bank accounts, which has enabled many rural workers to access banks in a way that was simply denied to them earlier.<br /><br />All too often, acquiring any of these cards that provide access to some service requires not just lots of time and energy, but also the payment of bribes. So a system whereby the large transaction costs of acquiring different cards for different purposes are reduced and the entire process is simplified for the ordinary citizen is something that should be welcomed. In addition, it could be argued that having a single card for many different purposes would enable public service delivery to shift from its present form which is based entirely on residence, to a more flexible system that recognises the internal movement of people.<br /><br />But such attempts at simplifying life for those whose various socio-economic rights need to be met is rather different from creating and then enforcing a system that can lead not only to an invasion of basic privacy but also to possibly excessive and undesirable monitoring by the state.<br /><br />The UID project has already been devastatingly critiqued for its implications for privacy and civil liberties, by scholars such as R. Ramakumar and Jean Dreze. It is worth noting that in most developed countries, similar projects of governments have not been implemented after strong public pressure. Even where they have been, they have generally avoided putting in personal and professional details such as religion, ethnic identity, profession and socio-economic status. Yet such data are all explicitly part of the information gathering exercise for the UID project.<br /><br />The incorporation of biometric data raises a further hornet's nest, since it is now widely recognised that biometric information is subject to significant errors in large populations. This is among the factors that led the government of China to shelve their own plan for such information to be stored in identity cards. The current evidence on the technological possibilities of biometric data use suggests that it is not a foolproof system for preventing identity theft. It is also increasingly accepted that, since fingerprints of a person (especially those engaged in manual labour) can change over time, they may be unreliable guides to identity. Ramakumar points out that ''according to some estimates, in developing countries like India, the share of persons with noisy or bad data could go up to 15 per cent'', or more than 150 million people!<br /><br />What is even more troubling is how the government plans to use the UID data. There are attempts to coerce wage workers in rural India to ''voluntarily'' enter the scheme by making it mandatory for the issue of job cards of NREGA. There are reports that UID can be used to ''solve'' the problem of leakages and misappropriation from what is likely to be an immensely convoluted targeted Public Distribution Scheme (TPDS) for food grain. Next UID may be introduced in health programmes and other forms of basic delivery, on the false presumption that this will do away with corruption.<br /><br />This is a very fundamental mistake, which misses out the basic elements of the power relations that enable and assist the pattern of corruption in India, or even the possible errors in targeting. How will a UID system ensure that complicated systems of defining the poor actually do capture the right group and do not have well-known errors of unfair exclusion and unwarranted inclusion? How will it prevent those who systematically engage in siphoning off either NREGA wages or TPDS food grains from the rightful targets from continuing to do so? It is a simple matter to ensure that the recipient of wages or grain or any other good or service puts her or his fingerprints in the required spot, even if they receive only a fraction of what is their right. Introducing such a requirement is likely to undermine the very functioning of such schemes, especially the flagship programmes like NREGS.<br /><br />Technology cannot be a substitute for social transformation. If it is introduced in social and economic contexts of greatly unequal and oppressive power relations, the outcomes are likely to be the opposite of those intended by the most well-meaning of planners and implementers. The important lesson is that purely technological fixes will not work: it is not possible to avoid the crucial political economy challenge of the need to change and overthrow existing power structures that prevent and constrain genuine development.<br /><br /></div>', 'lang' => 'English', 'SITE_URL' => 'https://im4change.in/', 'site_title' => 'im4change', 'adminprix' => 'admin' ] $article_current = object(App\Model\Entity\Article) { 'id' => (int) 4933, 'title' => 'Unique Identity, Leakages and Development by Jayati Ghosh', 'subheading' => '', 'description' => '<br /> <div align="justify"> For some reason, governments - as well as the development ''industry'' as a whole - have always had a tendency to look for universal panaceas, particular silver bullets that will solve all or most of their implementation problems and somehow achieve the development project for them. The latest such initiative bullet that seems to have been accepted as a silver bullet is the Unique Identification Project, which is now seen as the easy means to ensure no corruption and no leakages, and to ensure efficient access to what are going to be targeted systems of public delivery.<br /> <br /> On the face of it, the UID project appears to have many advantages for ordinary citizens, especially the poor. After all, the requirement of having multiple cards for particular kinds of access to public or other services, each of which is typically difficult to acquire, places disproportionate burdens on the poor. Anyone who has tried to get a ration card without some preferential access to lower level bureaucracy knows how prolonged and nightmarish the process can be. Even something like opening a bank account used to be a horrendously difficult and complicated process for those without masses of supporting documents. One of the great indirect benefits of the NREGA has been the system of payments through bank accounts, which has enabled many rural workers to access banks in a way that was simply denied to them earlier.<br /> <br /> All too often, acquiring any of these cards that provide access to some service requires not just lots of time and energy, but also the payment of bribes. So a system whereby the large transaction costs of acquiring different cards for different purposes are reduced and the entire process is simplified for the ordinary citizen is something that should be welcomed. In addition, it could be argued that having a single card for many different purposes would enable public service delivery to shift from its present form which is based entirely on residence, to a more flexible system that recognises the internal movement of people.<br /> <br /> But such attempts at simplifying life for those whose various socio-economic rights need to be met is rather different from creating and then enforcing a system that can lead not only to an invasion of basic privacy but also to possibly excessive and undesirable monitoring by the state.<br /> <br /> The UID project has already been devastatingly critiqued for its implications for privacy and civil liberties, by scholars such as R. Ramakumar and Jean Dreze. It is worth noting that in most developed countries, similar projects of governments have not been implemented after strong public pressure. Even where they have been, they have generally avoided putting in personal and professional details such as religion, ethnic identity, profession and socio-economic status. Yet such data are all explicitly part of the information gathering exercise for the UID project.<br /> <br /> The incorporation of biometric data raises a further hornet's nest, since it is now widely recognised that biometric information is subject to significant errors in large populations. This is among the factors that led the government of China to shelve their own plan for such information to be stored in identity cards. The current evidence on the technological possibilities of biometric data use suggests that it is not a foolproof system for preventing identity theft. It is also increasingly accepted that, since fingerprints of a person (especially those engaged in manual labour) can change over time, they may be unreliable guides to identity. Ramakumar points out that ''according to some estimates, in developing countries like India, the share of persons with noisy or bad data could go up to 15 per cent'', or more than 150 million people!<br /> <br /> What is even more troubling is how the government plans to use the UID data. There are attempts to coerce wage workers in rural India to ''voluntarily'' enter the scheme by making it mandatory for the issue of job cards of NREGA. There are reports that UID can be used to ''solve'' the problem of leakages and misappropriation from what is likely to be an immensely convoluted targeted Public Distribution Scheme (TPDS) for food grain. Next UID may be introduced in health programmes and other forms of basic delivery, on the false presumption that this will do away with corruption.<br /> <br /> This is a very fundamental mistake, which misses out the basic elements of the power relations that enable and assist the pattern of corruption in India, or even the possible errors in targeting. How will a UID system ensure that complicated systems of defining the poor actually do capture the right group and do not have well-known errors of unfair exclusion and unwarranted inclusion? How will it prevent those who systematically engage in siphoning off either NREGA wages or TPDS food grains from the rightful targets from continuing to do so? It is a simple matter to ensure that the recipient of wages or grain or any other good or service puts her or his fingerprints in the required spot, even if they receive only a fraction of what is their right. Introducing such a requirement is likely to undermine the very functioning of such schemes, especially the flagship programmes like NREGS.<br /> <br /> Technology cannot be a substitute for social transformation. If it is introduced in social and economic contexts of greatly unequal and oppressive power relations, the outcomes are likely to be the opposite of those intended by the most well-meaning of planners and implementers. The important lesson is that purely technological fixes will not work: it is not possible to avoid the crucial political economy challenge of the need to change and overthrow existing power structures that prevent and constrain genuine development.<br /> <br /> </div>', 'credit_writer' => 'Macroscan.com, 16 December, 2010, http://macroscan.com/cur/dec10/cur161210Unique_Identity.htm', 'article_img' => '', 'article_img_thumb' => '', 'status' => (int) 1, 'show_on_home' => (int) 1, 'lang' => 'EN', 'category_id' => (int) 16, 'tag_keyword' => '', 'seo_url' => 'unique-identity-leakages-and-development-by-jayati-ghosh-5025', 'meta_title' => null, 'meta_keywords' => null, 'meta_description' => null, 'noindex' => (int) 0, 'publish_date' => object(Cake\I18n\FrozenDate) {}, 'most_visit_section_id' => null, 'article_big_img' => null, 'liveid' => (int) 5025, 'created' => object(Cake\I18n\FrozenTime) {}, 'modified' => object(Cake\I18n\FrozenTime) {}, 'edate' => '', 'tags' => [ (int) 0 => object(Cake\ORM\Entity) {}, (int) 1 => object(Cake\ORM\Entity) {}, (int) 2 => object(Cake\ORM\Entity) {} ], 'category' => object(App\Model\Entity\Category) {}, '[new]' => false, '[accessible]' => [ '*' => true, 'id' => false ], '[dirty]' => [], '[original]' => [], '[virtual]' => [], '[hasErrors]' => false, '[errors]' => [], '[invalid]' => [], '[repository]' => 'Articles' } $articleid = (int) 4933 $metaTitle = 'LATEST NEWS UPDATES | Unique Identity, Leakages and Development by Jayati Ghosh' $metaKeywords = 'UIDAI,NREGS,PDS' $metaDesc = ' For some reason, governments - as well as the development ''industry'' as a whole - have always had a tendency to look for universal panaceas, particular silver bullets that will solve all or most of their implementation problems and somehow...' $disp = '<br /><div align="justify">For some reason, governments - as well as the development ''industry'' as a whole - have always had a tendency to look for universal panaceas, particular silver bullets that will solve all or most of their implementation problems and somehow achieve the development project for them. The latest such initiative bullet that seems to have been accepted as a silver bullet is the Unique Identification Project, which is now seen as the easy means to ensure no corruption and no leakages, and to ensure efficient access to what are going to be targeted systems of public delivery.<br /><br />On the face of it, the UID project appears to have many advantages for ordinary citizens, especially the poor. After all, the requirement of having multiple cards for particular kinds of access to public or other services, each of which is typically difficult to acquire, places disproportionate burdens on the poor. Anyone who has tried to get a ration card without some preferential access to lower level bureaucracy knows how prolonged and nightmarish the process can be. Even something like opening a bank account used to be a horrendously difficult and complicated process for those without masses of supporting documents. One of the great indirect benefits of the NREGA has been the system of payments through bank accounts, which has enabled many rural workers to access banks in a way that was simply denied to them earlier.<br /><br />All too often, acquiring any of these cards that provide access to some service requires not just lots of time and energy, but also the payment of bribes. So a system whereby the large transaction costs of acquiring different cards for different purposes are reduced and the entire process is simplified for the ordinary citizen is something that should be welcomed. In addition, it could be argued that having a single card for many different purposes would enable public service delivery to shift from its present form which is based entirely on residence, to a more flexible system that recognises the internal movement of people.<br /><br />But such attempts at simplifying life for those whose various socio-economic rights need to be met is rather different from creating and then enforcing a system that can lead not only to an invasion of basic privacy but also to possibly excessive and undesirable monitoring by the state.<br /><br />The UID project has already been devastatingly critiqued for its implications for privacy and civil liberties, by scholars such as R. Ramakumar and Jean Dreze. It is worth noting that in most developed countries, similar projects of governments have not been implemented after strong public pressure. Even where they have been, they have generally avoided putting in personal and professional details such as religion, ethnic identity, profession and socio-economic status. Yet such data are all explicitly part of the information gathering exercise for the UID project.<br /><br />The incorporation of biometric data raises a further hornet's nest, since it is now widely recognised that biometric information is subject to significant errors in large populations. This is among the factors that led the government of China to shelve their own plan for such information to be stored in identity cards. The current evidence on the technological possibilities of biometric data use suggests that it is not a foolproof system for preventing identity theft. It is also increasingly accepted that, since fingerprints of a person (especially those engaged in manual labour) can change over time, they may be unreliable guides to identity. Ramakumar points out that ''according to some estimates, in developing countries like India, the share of persons with noisy or bad data could go up to 15 per cent'', or more than 150 million people!<br /><br />What is even more troubling is how the government plans to use the UID data. There are attempts to coerce wage workers in rural India to ''voluntarily'' enter the scheme by making it mandatory for the issue of job cards of NREGA. There are reports that UID can be used to ''solve'' the problem of leakages and misappropriation from what is likely to be an immensely convoluted targeted Public Distribution Scheme (TPDS) for food grain. Next UID may be introduced in health programmes and other forms of basic delivery, on the false presumption that this will do away with corruption.<br /><br />This is a very fundamental mistake, which misses out the basic elements of the power relations that enable and assist the pattern of corruption in India, or even the possible errors in targeting. How will a UID system ensure that complicated systems of defining the poor actually do capture the right group and do not have well-known errors of unfair exclusion and unwarranted inclusion? How will it prevent those who systematically engage in siphoning off either NREGA wages or TPDS food grains from the rightful targets from continuing to do so? It is a simple matter to ensure that the recipient of wages or grain or any other good or service puts her or his fingerprints in the required spot, even if they receive only a fraction of what is their right. Introducing such a requirement is likely to undermine the very functioning of such schemes, especially the flagship programmes like NREGS.<br /><br />Technology cannot be a substitute for social transformation. If it is introduced in social and economic contexts of greatly unequal and oppressive power relations, the outcomes are likely to be the opposite of those intended by the most well-meaning of planners and implementers. The important lesson is that purely technological fixes will not work: it is not possible to avoid the crucial political economy challenge of the need to change and overthrow existing power structures that prevent and constrain genuine development.<br /><br /></div>' $lang = 'English' $SITE_URL = 'https://im4change.in/' $site_title = 'im4change' $adminprix = 'admin'</pre><pre class="stack-trace">include - APP/Template/Layout/printlayout.ctp, line 8 Cake\View\View::_evaluate() - CORE/src/View/View.php, line 1413 Cake\View\View::_render() - CORE/src/View/View.php, line 1374 Cake\View\View::renderLayout() - CORE/src/View/View.php, line 927 Cake\View\View::render() - CORE/src/View/View.php, line 885 Cake\Controller\Controller::render() - CORE/src/Controller/Controller.php, line 791 Cake\Http\ActionDispatcher::_invoke() - CORE/src/Http/ActionDispatcher.php, line 126 Cake\Http\ActionDispatcher::dispatch() - CORE/src/Http/ActionDispatcher.php, line 94 Cake\Http\BaseApplication::__invoke() - CORE/src/Http/BaseApplication.php, line 235 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\RoutingMiddleware::__invoke() - CORE/src/Routing/Middleware/RoutingMiddleware.php, line 162 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\AssetMiddleware::__invoke() - CORE/src/Routing/Middleware/AssetMiddleware.php, line 88 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Error\Middleware\ErrorHandlerMiddleware::__invoke() - CORE/src/Error/Middleware/ErrorHandlerMiddleware.php, line 96 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Http\Runner::run() - CORE/src/Http/Runner.php, line 51</pre></div></pre>latest-news-updates/unique-identity-leakages-and-development-by-jayati-ghosh-5025.html"/> <meta http-equiv="Content-Type" content="text/html; charset=utf-8"/> <link href="https://im4change.in/css/control.css" rel="stylesheet" type="text/css" media="all"/> <title>LATEST NEWS UPDATES | Unique Identity, Leakages and Development by Jayati Ghosh | Im4change.org</title> <meta name="description" content=" For some reason, governments - as well as the development ''industry'' as a whole - have always had a tendency to look for universal panaceas, particular silver bullets that will solve all or most of their implementation problems and somehow..."/> <script src="https://im4change.in/js/jquery-1.10.2.js"></script> <script type="text/javascript" src="https://im4change.in/js/jquery-migrate.min.js"></script> <script language="javascript" type="text/javascript"> $(document).ready(function () { var img = $("img")[0]; // Get my img elem var pic_real_width, pic_real_height; $("<img/>") // Make in memory copy of image to avoid css issues .attr("src", $(img).attr("src")) .load(function () { pic_real_width = this.width; // Note: $(this).width() will not pic_real_height = this.height; // work for in memory images. }); }); </script> <style type="text/css"> @media screen { div.divFooter { display: block; } } @media print { .printbutton { display: none !important; } } </style> </head> <body> <table cellpadding="0" cellspacing="0" border="0" width="98%" align="center"> <tr> <td class="top_bg"> <div class="divFooter"> <img src="https://im4change.in/images/logo1.jpg" height="59" border="0" alt="Resource centre on India's rural distress" style="padding-top:14px;"/> </div> </td> </tr> <tr> <td id="topspace"> </td> </tr> <tr id="topspace"> <td> </td> </tr> <tr> <td height="50" style="border-bottom:1px solid #000; padding-top:10px;" class="printbutton"> <form><input type="button" value=" Print this page " onclick="window.print();return false;"/></form> </td> </tr> <tr> <td width="100%"> <h1 class="news_headlines" style="font-style:normal"> <strong>Unique Identity, Leakages and Development by Jayati Ghosh</strong></h1> </td> </tr> <tr> <td width="100%" style="font-family:Arial, 'Segoe Script', 'Segoe UI', sans-serif, serif"><font size="3"> <br /><div align="justify">For some reason, governments - as well as the development ''industry'' as a whole - have always had a tendency to look for universal panaceas, particular silver bullets that will solve all or most of their implementation problems and somehow achieve the development project for them. The latest such initiative bullet that seems to have been accepted as a silver bullet is the Unique Identification Project, which is now seen as the easy means to ensure no corruption and no leakages, and to ensure efficient access to what are going to be targeted systems of public delivery.<br /><br />On the face of it, the UID project appears to have many advantages for ordinary citizens, especially the poor. After all, the requirement of having multiple cards for particular kinds of access to public or other services, each of which is typically difficult to acquire, places disproportionate burdens on the poor. Anyone who has tried to get a ration card without some preferential access to lower level bureaucracy knows how prolonged and nightmarish the process can be. Even something like opening a bank account used to be a horrendously difficult and complicated process for those without masses of supporting documents. One of the great indirect benefits of the NREGA has been the system of payments through bank accounts, which has enabled many rural workers to access banks in a way that was simply denied to them earlier.<br /><br />All too often, acquiring any of these cards that provide access to some service requires not just lots of time and energy, but also the payment of bribes. So a system whereby the large transaction costs of acquiring different cards for different purposes are reduced and the entire process is simplified for the ordinary citizen is something that should be welcomed. In addition, it could be argued that having a single card for many different purposes would enable public service delivery to shift from its present form which is based entirely on residence, to a more flexible system that recognises the internal movement of people.<br /><br />But such attempts at simplifying life for those whose various socio-economic rights need to be met is rather different from creating and then enforcing a system that can lead not only to an invasion of basic privacy but also to possibly excessive and undesirable monitoring by the state.<br /><br />The UID project has already been devastatingly critiqued for its implications for privacy and civil liberties, by scholars such as R. Ramakumar and Jean Dreze. It is worth noting that in most developed countries, similar projects of governments have not been implemented after strong public pressure. Even where they have been, they have generally avoided putting in personal and professional details such as religion, ethnic identity, profession and socio-economic status. Yet such data are all explicitly part of the information gathering exercise for the UID project.<br /><br />The incorporation of biometric data raises a further hornet's nest, since it is now widely recognised that biometric information is subject to significant errors in large populations. This is among the factors that led the government of China to shelve their own plan for such information to be stored in identity cards. The current evidence on the technological possibilities of biometric data use suggests that it is not a foolproof system for preventing identity theft. It is also increasingly accepted that, since fingerprints of a person (especially those engaged in manual labour) can change over time, they may be unreliable guides to identity. Ramakumar points out that ''according to some estimates, in developing countries like India, the share of persons with noisy or bad data could go up to 15 per cent'', or more than 150 million people!<br /><br />What is even more troubling is how the government plans to use the UID data. There are attempts to coerce wage workers in rural India to ''voluntarily'' enter the scheme by making it mandatory for the issue of job cards of NREGA. There are reports that UID can be used to ''solve'' the problem of leakages and misappropriation from what is likely to be an immensely convoluted targeted Public Distribution Scheme (TPDS) for food grain. Next UID may be introduced in health programmes and other forms of basic delivery, on the false presumption that this will do away with corruption.<br /><br />This is a very fundamental mistake, which misses out the basic elements of the power relations that enable and assist the pattern of corruption in India, or even the possible errors in targeting. How will a UID system ensure that complicated systems of defining the poor actually do capture the right group and do not have well-known errors of unfair exclusion and unwarranted inclusion? How will it prevent those who systematically engage in siphoning off either NREGA wages or TPDS food grains from the rightful targets from continuing to do so? It is a simple matter to ensure that the recipient of wages or grain or any other good or service puts her or his fingerprints in the required spot, even if they receive only a fraction of what is their right. Introducing such a requirement is likely to undermine the very functioning of such schemes, especially the flagship programmes like NREGS.<br /><br />Technology cannot be a substitute for social transformation. If it is introduced in social and economic contexts of greatly unequal and oppressive power relations, the outcomes are likely to be the opposite of those intended by the most well-meaning of planners and implementers. The important lesson is that purely technological fixes will not work: it is not possible to avoid the crucial political economy challenge of the need to change and overthrow existing power structures that prevent and constrain genuine development.<br /><br /></div> </font> </td> </tr> <tr> <td> </td> </tr> <tr> <td height="50" style="border-top:1px solid #000; border-bottom:1px solid #000;padding-top:10px;"> <form><input type="button" value=" Print this page " onclick="window.print();return false;"/></form> </td> </tr> </table></body> </html>' } $cookies = [] $values = [ (int) 0 => 'text/html; charset=UTF-8' ] $name = 'Content-Type' $first = true $value = 'text/html; charset=UTF-8'header - [internal], line ?? Cake\Http\ResponseEmitter::emitHeaders() - CORE/src/Http/ResponseEmitter.php, line 181 Cake\Http\ResponseEmitter::emit() - CORE/src/Http/ResponseEmitter.php, line 55 Cake\Http\Server::emit() - CORE/src/Http/Server.php, line 141 [main] - ROOT/webroot/index.php, line 39
<head>
<link rel="canonical" href="<?php echo Configure::read('SITE_URL'); ?><?php echo $urlPrefix;?><?php echo $article_current->category->slug; ?>/<?php echo $article_current->seo_url; ?>.html"/>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8"/>
$viewFile = '/home/brlfuser/public_html/src/Template/Layout/printlayout.ctp' $dataForView = [ 'article_current' => object(App\Model\Entity\Article) { 'id' => (int) 4933, 'title' => 'Unique Identity, Leakages and Development by Jayati Ghosh', 'subheading' => '', 'description' => '<br /> <div align="justify"> For some reason, governments - as well as the development ''industry'' as a whole - have always had a tendency to look for universal panaceas, particular silver bullets that will solve all or most of their implementation problems and somehow achieve the development project for them. The latest such initiative bullet that seems to have been accepted as a silver bullet is the Unique Identification Project, which is now seen as the easy means to ensure no corruption and no leakages, and to ensure efficient access to what are going to be targeted systems of public delivery.<br /> <br /> On the face of it, the UID project appears to have many advantages for ordinary citizens, especially the poor. After all, the requirement of having multiple cards for particular kinds of access to public or other services, each of which is typically difficult to acquire, places disproportionate burdens on the poor. Anyone who has tried to get a ration card without some preferential access to lower level bureaucracy knows how prolonged and nightmarish the process can be. Even something like opening a bank account used to be a horrendously difficult and complicated process for those without masses of supporting documents. One of the great indirect benefits of the NREGA has been the system of payments through bank accounts, which has enabled many rural workers to access banks in a way that was simply denied to them earlier.<br /> <br /> All too often, acquiring any of these cards that provide access to some service requires not just lots of time and energy, but also the payment of bribes. So a system whereby the large transaction costs of acquiring different cards for different purposes are reduced and the entire process is simplified for the ordinary citizen is something that should be welcomed. In addition, it could be argued that having a single card for many different purposes would enable public service delivery to shift from its present form which is based entirely on residence, to a more flexible system that recognises the internal movement of people.<br /> <br /> But such attempts at simplifying life for those whose various socio-economic rights need to be met is rather different from creating and then enforcing a system that can lead not only to an invasion of basic privacy but also to possibly excessive and undesirable monitoring by the state.<br /> <br /> The UID project has already been devastatingly critiqued for its implications for privacy and civil liberties, by scholars such as R. Ramakumar and Jean Dreze. It is worth noting that in most developed countries, similar projects of governments have not been implemented after strong public pressure. Even where they have been, they have generally avoided putting in personal and professional details such as religion, ethnic identity, profession and socio-economic status. Yet such data are all explicitly part of the information gathering exercise for the UID project.<br /> <br /> The incorporation of biometric data raises a further hornet's nest, since it is now widely recognised that biometric information is subject to significant errors in large populations. This is among the factors that led the government of China to shelve their own plan for such information to be stored in identity cards. The current evidence on the technological possibilities of biometric data use suggests that it is not a foolproof system for preventing identity theft. It is also increasingly accepted that, since fingerprints of a person (especially those engaged in manual labour) can change over time, they may be unreliable guides to identity. Ramakumar points out that ''according to some estimates, in developing countries like India, the share of persons with noisy or bad data could go up to 15 per cent'', or more than 150 million people!<br /> <br /> What is even more troubling is how the government plans to use the UID data. There are attempts to coerce wage workers in rural India to ''voluntarily'' enter the scheme by making it mandatory for the issue of job cards of NREGA. There are reports that UID can be used to ''solve'' the problem of leakages and misappropriation from what is likely to be an immensely convoluted targeted Public Distribution Scheme (TPDS) for food grain. Next UID may be introduced in health programmes and other forms of basic delivery, on the false presumption that this will do away with corruption.<br /> <br /> This is a very fundamental mistake, which misses out the basic elements of the power relations that enable and assist the pattern of corruption in India, or even the possible errors in targeting. How will a UID system ensure that complicated systems of defining the poor actually do capture the right group and do not have well-known errors of unfair exclusion and unwarranted inclusion? How will it prevent those who systematically engage in siphoning off either NREGA wages or TPDS food grains from the rightful targets from continuing to do so? It is a simple matter to ensure that the recipient of wages or grain or any other good or service puts her or his fingerprints in the required spot, even if they receive only a fraction of what is their right. Introducing such a requirement is likely to undermine the very functioning of such schemes, especially the flagship programmes like NREGS.<br /> <br /> Technology cannot be a substitute for social transformation. If it is introduced in social and economic contexts of greatly unequal and oppressive power relations, the outcomes are likely to be the opposite of those intended by the most well-meaning of planners and implementers. The important lesson is that purely technological fixes will not work: it is not possible to avoid the crucial political economy challenge of the need to change and overthrow existing power structures that prevent and constrain genuine development.<br /> <br /> </div>', 'credit_writer' => 'Macroscan.com, 16 December, 2010, http://macroscan.com/cur/dec10/cur161210Unique_Identity.htm', 'article_img' => '', 'article_img_thumb' => '', 'status' => (int) 1, 'show_on_home' => (int) 1, 'lang' => 'EN', 'category_id' => (int) 16, 'tag_keyword' => '', 'seo_url' => 'unique-identity-leakages-and-development-by-jayati-ghosh-5025', 'meta_title' => null, 'meta_keywords' => null, 'meta_description' => null, 'noindex' => (int) 0, 'publish_date' => object(Cake\I18n\FrozenDate) {}, 'most_visit_section_id' => null, 'article_big_img' => null, 'liveid' => (int) 5025, 'created' => object(Cake\I18n\FrozenTime) {}, 'modified' => object(Cake\I18n\FrozenTime) {}, 'edate' => '', 'tags' => [ [maximum depth reached] ], 'category' => object(App\Model\Entity\Category) {}, '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[hasErrors]' => false, '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'Articles' }, 'articleid' => (int) 4933, 'metaTitle' => 'LATEST NEWS UPDATES | Unique Identity, Leakages and Development by Jayati Ghosh', 'metaKeywords' => 'UIDAI,NREGS,PDS', 'metaDesc' => ' For some reason, governments - as well as the development ''industry'' as a whole - have always had a tendency to look for universal panaceas, particular silver bullets that will solve all or most of their implementation problems and somehow...', 'disp' => '<br /><div align="justify">For some reason, governments - as well as the development ''industry'' as a whole - have always had a tendency to look for universal panaceas, particular silver bullets that will solve all or most of their implementation problems and somehow achieve the development project for them. The latest such initiative bullet that seems to have been accepted as a silver bullet is the Unique Identification Project, which is now seen as the easy means to ensure no corruption and no leakages, and to ensure efficient access to what are going to be targeted systems of public delivery.<br /><br />On the face of it, the UID project appears to have many advantages for ordinary citizens, especially the poor. After all, the requirement of having multiple cards for particular kinds of access to public or other services, each of which is typically difficult to acquire, places disproportionate burdens on the poor. Anyone who has tried to get a ration card without some preferential access to lower level bureaucracy knows how prolonged and nightmarish the process can be. Even something like opening a bank account used to be a horrendously difficult and complicated process for those without masses of supporting documents. One of the great indirect benefits of the NREGA has been the system of payments through bank accounts, which has enabled many rural workers to access banks in a way that was simply denied to them earlier.<br /><br />All too often, acquiring any of these cards that provide access to some service requires not just lots of time and energy, but also the payment of bribes. So a system whereby the large transaction costs of acquiring different cards for different purposes are reduced and the entire process is simplified for the ordinary citizen is something that should be welcomed. In addition, it could be argued that having a single card for many different purposes would enable public service delivery to shift from its present form which is based entirely on residence, to a more flexible system that recognises the internal movement of people.<br /><br />But such attempts at simplifying life for those whose various socio-economic rights need to be met is rather different from creating and then enforcing a system that can lead not only to an invasion of basic privacy but also to possibly excessive and undesirable monitoring by the state.<br /><br />The UID project has already been devastatingly critiqued for its implications for privacy and civil liberties, by scholars such as R. Ramakumar and Jean Dreze. It is worth noting that in most developed countries, similar projects of governments have not been implemented after strong public pressure. Even where they have been, they have generally avoided putting in personal and professional details such as religion, ethnic identity, profession and socio-economic status. Yet such data are all explicitly part of the information gathering exercise for the UID project.<br /><br />The incorporation of biometric data raises a further hornet's nest, since it is now widely recognised that biometric information is subject to significant errors in large populations. This is among the factors that led the government of China to shelve their own plan for such information to be stored in identity cards. The current evidence on the technological possibilities of biometric data use suggests that it is not a foolproof system for preventing identity theft. It is also increasingly accepted that, since fingerprints of a person (especially those engaged in manual labour) can change over time, they may be unreliable guides to identity. Ramakumar points out that ''according to some estimates, in developing countries like India, the share of persons with noisy or bad data could go up to 15 per cent'', or more than 150 million people!<br /><br />What is even more troubling is how the government plans to use the UID data. There are attempts to coerce wage workers in rural India to ''voluntarily'' enter the scheme by making it mandatory for the issue of job cards of NREGA. There are reports that UID can be used to ''solve'' the problem of leakages and misappropriation from what is likely to be an immensely convoluted targeted Public Distribution Scheme (TPDS) for food grain. Next UID may be introduced in health programmes and other forms of basic delivery, on the false presumption that this will do away with corruption.<br /><br />This is a very fundamental mistake, which misses out the basic elements of the power relations that enable and assist the pattern of corruption in India, or even the possible errors in targeting. How will a UID system ensure that complicated systems of defining the poor actually do capture the right group and do not have well-known errors of unfair exclusion and unwarranted inclusion? How will it prevent those who systematically engage in siphoning off either NREGA wages or TPDS food grains from the rightful targets from continuing to do so? It is a simple matter to ensure that the recipient of wages or grain or any other good or service puts her or his fingerprints in the required spot, even if they receive only a fraction of what is their right. Introducing such a requirement is likely to undermine the very functioning of such schemes, especially the flagship programmes like NREGS.<br /><br />Technology cannot be a substitute for social transformation. If it is introduced in social and economic contexts of greatly unequal and oppressive power relations, the outcomes are likely to be the opposite of those intended by the most well-meaning of planners and implementers. The important lesson is that purely technological fixes will not work: it is not possible to avoid the crucial political economy challenge of the need to change and overthrow existing power structures that prevent and constrain genuine development.<br /><br /></div>', 'lang' => 'English', 'SITE_URL' => 'https://im4change.in/', 'site_title' => 'im4change', 'adminprix' => 'admin' ] $article_current = object(App\Model\Entity\Article) { 'id' => (int) 4933, 'title' => 'Unique Identity, Leakages and Development by Jayati Ghosh', 'subheading' => '', 'description' => '<br /> <div align="justify"> For some reason, governments - as well as the development ''industry'' as a whole - have always had a tendency to look for universal panaceas, particular silver bullets that will solve all or most of their implementation problems and somehow achieve the development project for them. The latest such initiative bullet that seems to have been accepted as a silver bullet is the Unique Identification Project, which is now seen as the easy means to ensure no corruption and no leakages, and to ensure efficient access to what are going to be targeted systems of public delivery.<br /> <br /> On the face of it, the UID project appears to have many advantages for ordinary citizens, especially the poor. After all, the requirement of having multiple cards for particular kinds of access to public or other services, each of which is typically difficult to acquire, places disproportionate burdens on the poor. Anyone who has tried to get a ration card without some preferential access to lower level bureaucracy knows how prolonged and nightmarish the process can be. Even something like opening a bank account used to be a horrendously difficult and complicated process for those without masses of supporting documents. One of the great indirect benefits of the NREGA has been the system of payments through bank accounts, which has enabled many rural workers to access banks in a way that was simply denied to them earlier.<br /> <br /> All too often, acquiring any of these cards that provide access to some service requires not just lots of time and energy, but also the payment of bribes. So a system whereby the large transaction costs of acquiring different cards for different purposes are reduced and the entire process is simplified for the ordinary citizen is something that should be welcomed. In addition, it could be argued that having a single card for many different purposes would enable public service delivery to shift from its present form which is based entirely on residence, to a more flexible system that recognises the internal movement of people.<br /> <br /> But such attempts at simplifying life for those whose various socio-economic rights need to be met is rather different from creating and then enforcing a system that can lead not only to an invasion of basic privacy but also to possibly excessive and undesirable monitoring by the state.<br /> <br /> The UID project has already been devastatingly critiqued for its implications for privacy and civil liberties, by scholars such as R. Ramakumar and Jean Dreze. It is worth noting that in most developed countries, similar projects of governments have not been implemented after strong public pressure. Even where they have been, they have generally avoided putting in personal and professional details such as religion, ethnic identity, profession and socio-economic status. Yet such data are all explicitly part of the information gathering exercise for the UID project.<br /> <br /> The incorporation of biometric data raises a further hornet's nest, since it is now widely recognised that biometric information is subject to significant errors in large populations. This is among the factors that led the government of China to shelve their own plan for such information to be stored in identity cards. The current evidence on the technological possibilities of biometric data use suggests that it is not a foolproof system for preventing identity theft. It is also increasingly accepted that, since fingerprints of a person (especially those engaged in manual labour) can change over time, they may be unreliable guides to identity. Ramakumar points out that ''according to some estimates, in developing countries like India, the share of persons with noisy or bad data could go up to 15 per cent'', or more than 150 million people!<br /> <br /> What is even more troubling is how the government plans to use the UID data. There are attempts to coerce wage workers in rural India to ''voluntarily'' enter the scheme by making it mandatory for the issue of job cards of NREGA. There are reports that UID can be used to ''solve'' the problem of leakages and misappropriation from what is likely to be an immensely convoluted targeted Public Distribution Scheme (TPDS) for food grain. Next UID may be introduced in health programmes and other forms of basic delivery, on the false presumption that this will do away with corruption.<br /> <br /> This is a very fundamental mistake, which misses out the basic elements of the power relations that enable and assist the pattern of corruption in India, or even the possible errors in targeting. How will a UID system ensure that complicated systems of defining the poor actually do capture the right group and do not have well-known errors of unfair exclusion and unwarranted inclusion? How will it prevent those who systematically engage in siphoning off either NREGA wages or TPDS food grains from the rightful targets from continuing to do so? It is a simple matter to ensure that the recipient of wages or grain or any other good or service puts her or his fingerprints in the required spot, even if they receive only a fraction of what is their right. Introducing such a requirement is likely to undermine the very functioning of such schemes, especially the flagship programmes like NREGS.<br /> <br /> Technology cannot be a substitute for social transformation. If it is introduced in social and economic contexts of greatly unequal and oppressive power relations, the outcomes are likely to be the opposite of those intended by the most well-meaning of planners and implementers. The important lesson is that purely technological fixes will not work: it is not possible to avoid the crucial political economy challenge of the need to change and overthrow existing power structures that prevent and constrain genuine development.<br /> <br /> </div>', 'credit_writer' => 'Macroscan.com, 16 December, 2010, http://macroscan.com/cur/dec10/cur161210Unique_Identity.htm', 'article_img' => '', 'article_img_thumb' => '', 'status' => (int) 1, 'show_on_home' => (int) 1, 'lang' => 'EN', 'category_id' => (int) 16, 'tag_keyword' => '', 'seo_url' => 'unique-identity-leakages-and-development-by-jayati-ghosh-5025', 'meta_title' => null, 'meta_keywords' => null, 'meta_description' => null, 'noindex' => (int) 0, 'publish_date' => object(Cake\I18n\FrozenDate) {}, 'most_visit_section_id' => null, 'article_big_img' => null, 'liveid' => (int) 5025, 'created' => object(Cake\I18n\FrozenTime) {}, 'modified' => object(Cake\I18n\FrozenTime) {}, 'edate' => '', 'tags' => [ (int) 0 => object(Cake\ORM\Entity) {}, (int) 1 => object(Cake\ORM\Entity) {}, (int) 2 => object(Cake\ORM\Entity) {} ], 'category' => object(App\Model\Entity\Category) {}, '[new]' => false, '[accessible]' => [ '*' => true, 'id' => false ], '[dirty]' => [], '[original]' => [], '[virtual]' => [], '[hasErrors]' => false, '[errors]' => [], '[invalid]' => [], '[repository]' => 'Articles' } $articleid = (int) 4933 $metaTitle = 'LATEST NEWS UPDATES | Unique Identity, Leakages and Development by Jayati Ghosh' $metaKeywords = 'UIDAI,NREGS,PDS' $metaDesc = ' For some reason, governments - as well as the development ''industry'' as a whole - have always had a tendency to look for universal panaceas, particular silver bullets that will solve all or most of their implementation problems and somehow...' $disp = '<br /><div align="justify">For some reason, governments - as well as the development ''industry'' as a whole - have always had a tendency to look for universal panaceas, particular silver bullets that will solve all or most of their implementation problems and somehow achieve the development project for them. The latest such initiative bullet that seems to have been accepted as a silver bullet is the Unique Identification Project, which is now seen as the easy means to ensure no corruption and no leakages, and to ensure efficient access to what are going to be targeted systems of public delivery.<br /><br />On the face of it, the UID project appears to have many advantages for ordinary citizens, especially the poor. After all, the requirement of having multiple cards for particular kinds of access to public or other services, each of which is typically difficult to acquire, places disproportionate burdens on the poor. Anyone who has tried to get a ration card without some preferential access to lower level bureaucracy knows how prolonged and nightmarish the process can be. Even something like opening a bank account used to be a horrendously difficult and complicated process for those without masses of supporting documents. One of the great indirect benefits of the NREGA has been the system of payments through bank accounts, which has enabled many rural workers to access banks in a way that was simply denied to them earlier.<br /><br />All too often, acquiring any of these cards that provide access to some service requires not just lots of time and energy, but also the payment of bribes. So a system whereby the large transaction costs of acquiring different cards for different purposes are reduced and the entire process is simplified for the ordinary citizen is something that should be welcomed. In addition, it could be argued that having a single card for many different purposes would enable public service delivery to shift from its present form which is based entirely on residence, to a more flexible system that recognises the internal movement of people.<br /><br />But such attempts at simplifying life for those whose various socio-economic rights need to be met is rather different from creating and then enforcing a system that can lead not only to an invasion of basic privacy but also to possibly excessive and undesirable monitoring by the state.<br /><br />The UID project has already been devastatingly critiqued for its implications for privacy and civil liberties, by scholars such as R. Ramakumar and Jean Dreze. It is worth noting that in most developed countries, similar projects of governments have not been implemented after strong public pressure. Even where they have been, they have generally avoided putting in personal and professional details such as religion, ethnic identity, profession and socio-economic status. Yet such data are all explicitly part of the information gathering exercise for the UID project.<br /><br />The incorporation of biometric data raises a further hornet's nest, since it is now widely recognised that biometric information is subject to significant errors in large populations. This is among the factors that led the government of China to shelve their own plan for such information to be stored in identity cards. The current evidence on the technological possibilities of biometric data use suggests that it is not a foolproof system for preventing identity theft. It is also increasingly accepted that, since fingerprints of a person (especially those engaged in manual labour) can change over time, they may be unreliable guides to identity. Ramakumar points out that ''according to some estimates, in developing countries like India, the share of persons with noisy or bad data could go up to 15 per cent'', or more than 150 million people!<br /><br />What is even more troubling is how the government plans to use the UID data. There are attempts to coerce wage workers in rural India to ''voluntarily'' enter the scheme by making it mandatory for the issue of job cards of NREGA. There are reports that UID can be used to ''solve'' the problem of leakages and misappropriation from what is likely to be an immensely convoluted targeted Public Distribution Scheme (TPDS) for food grain. Next UID may be introduced in health programmes and other forms of basic delivery, on the false presumption that this will do away with corruption.<br /><br />This is a very fundamental mistake, which misses out the basic elements of the power relations that enable and assist the pattern of corruption in India, or even the possible errors in targeting. How will a UID system ensure that complicated systems of defining the poor actually do capture the right group and do not have well-known errors of unfair exclusion and unwarranted inclusion? How will it prevent those who systematically engage in siphoning off either NREGA wages or TPDS food grains from the rightful targets from continuing to do so? It is a simple matter to ensure that the recipient of wages or grain or any other good or service puts her or his fingerprints in the required spot, even if they receive only a fraction of what is their right. Introducing such a requirement is likely to undermine the very functioning of such schemes, especially the flagship programmes like NREGS.<br /><br />Technology cannot be a substitute for social transformation. If it is introduced in social and economic contexts of greatly unequal and oppressive power relations, the outcomes are likely to be the opposite of those intended by the most well-meaning of planners and implementers. The important lesson is that purely technological fixes will not work: it is not possible to avoid the crucial political economy challenge of the need to change and overthrow existing power structures that prevent and constrain genuine development.<br /><br /></div>' $lang = 'English' $SITE_URL = 'https://im4change.in/' $site_title = 'im4change' $adminprix = 'admin'
include - APP/Template/Layout/printlayout.ctp, line 8 Cake\View\View::_evaluate() - CORE/src/View/View.php, line 1413 Cake\View\View::_render() - CORE/src/View/View.php, line 1374 Cake\View\View::renderLayout() - CORE/src/View/View.php, line 927 Cake\View\View::render() - CORE/src/View/View.php, line 885 Cake\Controller\Controller::render() - CORE/src/Controller/Controller.php, line 791 Cake\Http\ActionDispatcher::_invoke() - CORE/src/Http/ActionDispatcher.php, line 126 Cake\Http\ActionDispatcher::dispatch() - CORE/src/Http/ActionDispatcher.php, line 94 Cake\Http\BaseApplication::__invoke() - CORE/src/Http/BaseApplication.php, line 235 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\RoutingMiddleware::__invoke() - CORE/src/Routing/Middleware/RoutingMiddleware.php, line 162 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\AssetMiddleware::__invoke() - CORE/src/Routing/Middleware/AssetMiddleware.php, line 88 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Error\Middleware\ErrorHandlerMiddleware::__invoke() - CORE/src/Error/Middleware/ErrorHandlerMiddleware.php, line 96 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Http\Runner::run() - CORE/src/Http/Runner.php, line 51
![]() |
Unique Identity, Leakages and Development by Jayati Ghosh |
For some reason, governments - as well as the development ''industry'' as a whole - have always had a tendency to look for universal panaceas, particular silver bullets that will solve all or most of their implementation problems and somehow achieve the development project for them. The latest such initiative bullet that seems to have been accepted as a silver bullet is the Unique Identification Project, which is now seen as the easy means to ensure no corruption and no leakages, and to ensure efficient access to what are going to be targeted systems of public delivery.
On the face of it, the UID project appears to have many advantages for ordinary citizens, especially the poor. After all, the requirement of having multiple cards for particular kinds of access to public or other services, each of which is typically difficult to acquire, places disproportionate burdens on the poor. Anyone who has tried to get a ration card without some preferential access to lower level bureaucracy knows how prolonged and nightmarish the process can be. Even something like opening a bank account used to be a horrendously difficult and complicated process for those without masses of supporting documents. One of the great indirect benefits of the NREGA has been the system of payments through bank accounts, which has enabled many rural workers to access banks in a way that was simply denied to them earlier. All too often, acquiring any of these cards that provide access to some service requires not just lots of time and energy, but also the payment of bribes. So a system whereby the large transaction costs of acquiring different cards for different purposes are reduced and the entire process is simplified for the ordinary citizen is something that should be welcomed. In addition, it could be argued that having a single card for many different purposes would enable public service delivery to shift from its present form which is based entirely on residence, to a more flexible system that recognises the internal movement of people. But such attempts at simplifying life for those whose various socio-economic rights need to be met is rather different from creating and then enforcing a system that can lead not only to an invasion of basic privacy but also to possibly excessive and undesirable monitoring by the state. The UID project has already been devastatingly critiqued for its implications for privacy and civil liberties, by scholars such as R. Ramakumar and Jean Dreze. It is worth noting that in most developed countries, similar projects of governments have not been implemented after strong public pressure. Even where they have been, they have generally avoided putting in personal and professional details such as religion, ethnic identity, profession and socio-economic status. Yet such data are all explicitly part of the information gathering exercise for the UID project. The incorporation of biometric data raises a further hornet's nest, since it is now widely recognised that biometric information is subject to significant errors in large populations. This is among the factors that led the government of China to shelve their own plan for such information to be stored in identity cards. The current evidence on the technological possibilities of biometric data use suggests that it is not a foolproof system for preventing identity theft. It is also increasingly accepted that, since fingerprints of a person (especially those engaged in manual labour) can change over time, they may be unreliable guides to identity. Ramakumar points out that ''according to some estimates, in developing countries like India, the share of persons with noisy or bad data could go up to 15 per cent'', or more than 150 million people! What is even more troubling is how the government plans to use the UID data. There are attempts to coerce wage workers in rural India to ''voluntarily'' enter the scheme by making it mandatory for the issue of job cards of NREGA. There are reports that UID can be used to ''solve'' the problem of leakages and misappropriation from what is likely to be an immensely convoluted targeted Public Distribution Scheme (TPDS) for food grain. Next UID may be introduced in health programmes and other forms of basic delivery, on the false presumption that this will do away with corruption. This is a very fundamental mistake, which misses out the basic elements of the power relations that enable and assist the pattern of corruption in India, or even the possible errors in targeting. How will a UID system ensure that complicated systems of defining the poor actually do capture the right group and do not have well-known errors of unfair exclusion and unwarranted inclusion? How will it prevent those who systematically engage in siphoning off either NREGA wages or TPDS food grains from the rightful targets from continuing to do so? It is a simple matter to ensure that the recipient of wages or grain or any other good or service puts her or his fingerprints in the required spot, even if they receive only a fraction of what is their right. Introducing such a requirement is likely to undermine the very functioning of such schemes, especially the flagship programmes like NREGS. Technology cannot be a substitute for social transformation. If it is introduced in social and economic contexts of greatly unequal and oppressive power relations, the outcomes are likely to be the opposite of those intended by the most well-meaning of planners and implementers. The important lesson is that purely technological fixes will not work: it is not possible to avoid the crucial political economy challenge of the need to change and overthrow existing power structures that prevent and constrain genuine development. |