Recently, the government announced that it plans to transfer benefits under various schemes directly into the bank accounts of individual beneficiaries.  Benefits can be the Mahatma Gandhi National Rural Employment Guarantee Scheme (MNREGS) wages, scholarships, pensions and health benefits.  Beneficiaries shall be identified through the Aadhaar number (Aadhaar is an individual identification number linked to a person’s demographic and biometric information).  The direct cash transfer (DCT) system is going to be rolled out in 51 districts, starting January 1, 2013.  It will later be extended to 18 states by April 1, 2013 and the rest by April 1, 2014 (or earlier).  Presently, 34 schemes have been identified in 43 districts to implement the DCT programme. Currently, the government subsidises certain products (food grains, fertilizers, water, electricity) and services (education, healthcare) by providing them at a lower than market price to the beneficiaries.  This has led to problems such as high fiscal deficit, waste of scarce resources and operational inefficiencies.  The government is considering replacing this with an Aadhaar enabled DCT system.  It has claimed that the new system would ensure timely payment directly to intended beneficiaries, reduce transaction costs and leakages.  However, many experts have criticised both the concept of cash transfer as well as Aadhaar (see here, here, here and here). In this blog, we provide some background information about cash transfer, explain the concept of Aadhaar and examine the pros and cons of an Aadhaar enabled direct cash transfer system. Background on cash transfer Under the direct cash transfer (DCT) scheme, government subsidies will be given directly to the beneficiaries in the form of cash rather than goods.  DCTs can either be unconditional or conditional.  Under unconditional schemes, cash is directly transferred to eligible households with no conditions. For example, pension schemes.  Conditional cash transfers provide cash directly to poor households in response to the fulfillment of certain conditions such as minimum attendance of children in schools.  DCTs provide poor families the choice of using the cash as they wish.  Having access to cash also relieves some of their financial constraints.  Also, DCTs are simpler in design than other subsidy schemes.  Even though cash transfer schemes have a high fixed cost of administration when the programme is set up, running costs are far lower (see here, here and here). Presently, the government operates a number of DCT schemes.  For example, Janani Suraksha Yojana, Indira Awas Yojana and Dhanalaksmi scheme. In his 2011-12 Budget speech, the then Finance Minister, Pranab Mukherjee, had stated that the government plans to move towards direct transfer of cash subsidy for kerosene, Liquified Petroleum Gas (LPG), and fertilizers.  A task force headed by Nandan Nilekani was set up to work out the modalities of operationalising DCT for these items.  This task force submitted its report in February 2012. The National Food Security Bill, 2011, pending in Parliament, includes cash transfer and food coupons as possible alternative mechanisms to the Public Distribution System. Key features of Aadhaar The office of Unique Identification Authority of India (UIDAI) was set up in 2009 within the Planning Commission.  In 2010, the government later introduced the National Identification Authority of India Bill in Parliament to give statutory status to this office.

  • The Aadhaar number is a unique identification number that every resident of India (regardless of citizenship) is entitled to get after he furnishes his demographic and biometric information.  Demographic information shall include the name, age, gender and address.  Biometric information shall include some biological attributes of the individual (such as fingerprints and iris scan).  Collection of information pertaining to race, religion, caste, language, income or health is specifically prohibited.
  • The Aadhaar number shall serve as proof of identity, subject to authentication.  However, it should not be construed as proof of citizenship or domicile.
  • Process of issuing and authenticating Aadhaar number: First, information for each person shall be collected and verified after which an Aadhaar number shall be allotted.  Second, the collected information shall be stored in a database called the Central Identities Data Repository.  Finally, this repository shall be used to provide authentication services to service providers.

For a PRS analysis of the Bill, see here. Aadhaar enabled direct cash transfers Advantages Identification through Aadhaar number: Currently, the recipient has to establish his identity and eligibility many times by producing multiple documents for verification.  The verification of such documents is done by multiple authorities.  An Aadhaar enabled bank account can be used by the beneficiary to receive multiple welfare payments as opposed to the one scheme, one bank approach, followed by a number of state governments. Elimination of middlemen: The scheme reduces chances of rent-seeking by middlemen who siphon off part of the subsidy.  In the new system, the cash shall be transferred directly to individual bank accounts and the beneficiaries shall be identified through Aadhaar. Reduction in duplicate and ghost beneficiaries: The Aadhaar number is likely to help eliminate duplicate cards and cards for non-existent persons or ghost beneficiaries in schemes such as the PDS and MNREGS.     Disadvantages Lack of clarity on whether Aadhaar is mandatory:  According to UIDAI, it is not mandatory for individuals to get an Aadhaar number.  However, it does not prevent any service provider from prescribing Aadhaar as a mandatory requirement for availing services.  Therefore, beneficiaries may be denied a service if he does not have the Aadhaar number.  It is noteworthy that the new direct cash transfer policy requires beneficiaries to have an Aadhaar number and a bank account.  However, many beneficiaries do not yet have either.  (Presently, there are 229 million Aadhaar number holders and 147 million bank accounts). Targeting and identification of beneficiaries:  According to the government, one of the key reasons for changing to DCT system is to ensure better targeting of subsidies.  However, the success of Aadhaar in weeding out ‘ghost’ beneficiaries depends on mandatory enrollment.  If enrollment is not mandatory, both authentication systems (identity card based and Aadhaar based) must coexist.  In such a scenario, ‘ghost’ beneficiaries and people with multiple cards will choose to opt out of the Aadhaar system.  Furthermore, key schemes such as PDS suffer from large inclusion and exclusion errors.  However, Aadhaar cannot address errors in targeting of BPL families.  Also, it cannot address problems of MNREGS such as incorrect measurement of work and payment delays. Safeguard for maintaining privacy: Information collected when issuing Aadhaar may be misused if safeguards to maintain privacy are inadequate.  Though the Supreme Court has included privacy as part of the Right to Life, India does not have a specific law governing issues related to privacy.  Also, the authority is required to maintain details of every request for authentication and the response provided.  However, maximum duration for which such data has to be stored is not specified.  Authentication data provides insights into usage patterns of an Aadhaar number holder.  Data that has been recorded over a long duration of time may be misused for activities such as profiling an individual’s behaviour.

A few minutes ago, the Supreme Court delivered a  judgement striking down Section 66 A of the Information Technology Act, 2000.  This was in response to a PIL that challenged the constitutionality of this provision.  In light of this, we present a background to Section 66 A and the recent developments leading up to its challenge before the Court.  What does the Information Technology Act, 2000 provide for? The Information Technology (IT) Act, 2000 provides for legal recognition for transactions through electronic communication, also known as e-commerce.  The Act also penalizes various forms of cyber crime.  The Act was amended in 2009 to insert a new section, Section 66A which was said to address cases of cyber crime with the advent of technology and the internet. What does Section 66(A) of the IT Act say? Section 66(A) of the Act criminalises the sending of offensive messages through a computer or other communication devices.  Under this provision, any person who by means of a computer or communication device sends any information that is:

  1. grossly offensive;
  2. false and meant for the purpose of causing annoyance, inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred or ill will;
  3. meant to deceive or mislead the recipient about the origin of such messages, etc, shall be punishable with imprisonment up to three years and with fine

Over the past few years, incidents related to comments,  sharing of information, or thoughts expressed by an individual to a wider audience on the internet have attracted criminal penalties under Section 66(A).  This has led to discussion and debate on the ambit of the Section and its applicability to such actions. What have been the major developments in context of this Section? In the recent past, a few arrests were made under Section 66(A) on the basis of social media posts directed at notable personalities, including politicians.  These  were alleged to be offensive in nature.  In November 2012, there were various reports of alleged misuse of the law, and the penalties imposed were said to be disproportionate to the offence.  Thereafter, a Public Interest Litigation (PIL) was filed in the Supreme Court, challenging this provision on grounds of unconstitutionality.  It was said to impinge upon the freedom of speech and expression guaranteed by Article 19(1)(a) of the Constitution. How has the government responded so far? Subsequently, the central government issued guidelines for the purposes of Section 66(A).  These guidelines clarified that prior approval of the Deputy Commissioner or Inspector General of Police was required before a police officer or police station could register a complaint under Section 66(A).  In May 2013, the Supreme Court (in relation to the above PIL) also passed an order saying that such approval was necessary before any arrest is to be made.  Since matters related to police and public order are dealt with by respective state governments, a Supreme Court order was required for these guidelines to be applicable across the country.  However, no changes have been made to Section 66 A itself.  Has there been any legislative movement with regard to Section 66(A)? A Private Member Bill was introduced in Lok Sabha in 2013 to amend Section 66(A) of the IT Act.  The Statement of Objects and Reasons of the Bill stated that most of the offences that Section 66(A) dealt with were already covered by the Indian Penal Code (IPC), 1860. This had resulted in dual penalties for the same offence.  According to the Bill, there were also inconsistencies between the two laws in relation to the duration of imprisonment for the same offence.  The offence of threatening someone with injury through email attracts imprisonment of two years under the IPC and three years under the IT Act.  The Bill was eventually withdrawn. In the same year, a Private Members resolution was also moved in Parliament.  The resolution proposed to make four changes: (i) bring Section 66(A) in line with the Fundamental Rights of the Constitution; (ii) restrict the application of the provision to communication between two persons; (iii) precisely define the offence covered; and (iv) reduce the penalty and make the offence a non-cognizable one (which means no arrest could be made without a court order).  However, the resolution was also withdrawn. Meanwhile, how has the PIL proceeded? According to news reports, the Supreme Court  in February, 2015 had stated that the constitutional validity of the provision would be tested, in relation to the PIL before it.  The government argued that they were open to amend/change the provision as the intention was not to suppress freedom of speech and expression, but only deal with cyber crime.  The issues being examined by the Court relate to the powers of the police to decide what is abusive, causes annoyance, etc,. instead of the examination of the offence by the judiciary .  This is pertinent because this offence is a cognizable one, attracting a penalty of at least three years imprisonment.  The law is also said to be ambiguous on the issue of what would constitute information that is “grossly offensive,” as no guidelines have been provided for the same.  This lack of clarity could lead to increased litigation. The judgement is not available in the public domain yet. It remains to be seen on what the reasoning of the Supreme Court was, in its decision to strike down Section 66A, today.