Recently, the government announced that it plans to transfer benefits under various schemes directly into the bank accounts of individual beneficiaries.  Benefits can be the Mahatma Gandhi National Rural Employment Guarantee Scheme (MNREGS) wages, scholarships, pensions and health benefits.  Beneficiaries shall be identified through the Aadhaar number (Aadhaar is an individual identification number linked to a person’s demographic and biometric information).  The direct cash transfer (DCT) system is going to be rolled out in 51 districts, starting January 1, 2013.  It will later be extended to 18 states by April 1, 2013 and the rest by April 1, 2014 (or earlier).  Presently, 34 schemes have been identified in 43 districts to implement the DCT programme. Currently, the government subsidises certain products (food grains, fertilizers, water, electricity) and services (education, healthcare) by providing them at a lower than market price to the beneficiaries.  This has led to problems such as high fiscal deficit, waste of scarce resources and operational inefficiencies.  The government is considering replacing this with an Aadhaar enabled DCT system.  It has claimed that the new system would ensure timely payment directly to intended beneficiaries, reduce transaction costs and leakages.  However, many experts have criticised both the concept of cash transfer as well as Aadhaar (see here, here, here and here). In this blog, we provide some background information about cash transfer, explain the concept of Aadhaar and examine the pros and cons of an Aadhaar enabled direct cash transfer system. Background on cash transfer Under the direct cash transfer (DCT) scheme, government subsidies will be given directly to the beneficiaries in the form of cash rather than goods.  DCTs can either be unconditional or conditional.  Under unconditional schemes, cash is directly transferred to eligible households with no conditions. For example, pension schemes.  Conditional cash transfers provide cash directly to poor households in response to the fulfillment of certain conditions such as minimum attendance of children in schools.  DCTs provide poor families the choice of using the cash as they wish.  Having access to cash also relieves some of their financial constraints.  Also, DCTs are simpler in design than other subsidy schemes.  Even though cash transfer schemes have a high fixed cost of administration when the programme is set up, running costs are far lower (see here, here and here). Presently, the government operates a number of DCT schemes.  For example, Janani Suraksha Yojana, Indira Awas Yojana and Dhanalaksmi scheme. In his 2011-12 Budget speech, the then Finance Minister, Pranab Mukherjee, had stated that the government plans to move towards direct transfer of cash subsidy for kerosene, Liquified Petroleum Gas (LPG), and fertilizers.  A task force headed by Nandan Nilekani was set up to work out the modalities of operationalising DCT for these items.  This task force submitted its report in February 2012. The National Food Security Bill, 2011, pending in Parliament, includes cash transfer and food coupons as possible alternative mechanisms to the Public Distribution System. Key features of Aadhaar The office of Unique Identification Authority of India (UIDAI) was set up in 2009 within the Planning Commission.  In 2010, the government later introduced the National Identification Authority of India Bill in Parliament to give statutory status to this office.

  • The Aadhaar number is a unique identification number that every resident of India (regardless of citizenship) is entitled to get after he furnishes his demographic and biometric information.  Demographic information shall include the name, age, gender and address.  Biometric information shall include some biological attributes of the individual (such as fingerprints and iris scan).  Collection of information pertaining to race, religion, caste, language, income or health is specifically prohibited.
  • The Aadhaar number shall serve as proof of identity, subject to authentication.  However, it should not be construed as proof of citizenship or domicile.
  • Process of issuing and authenticating Aadhaar number: First, information for each person shall be collected and verified after which an Aadhaar number shall be allotted.  Second, the collected information shall be stored in a database called the Central Identities Data Repository.  Finally, this repository shall be used to provide authentication services to service providers.

For a PRS analysis of the Bill, see here. Aadhaar enabled direct cash transfers Advantages Identification through Aadhaar number: Currently, the recipient has to establish his identity and eligibility many times by producing multiple documents for verification.  The verification of such documents is done by multiple authorities.  An Aadhaar enabled bank account can be used by the beneficiary to receive multiple welfare payments as opposed to the one scheme, one bank approach, followed by a number of state governments. Elimination of middlemen: The scheme reduces chances of rent-seeking by middlemen who siphon off part of the subsidy.  In the new system, the cash shall be transferred directly to individual bank accounts and the beneficiaries shall be identified through Aadhaar. Reduction in duplicate and ghost beneficiaries: The Aadhaar number is likely to help eliminate duplicate cards and cards for non-existent persons or ghost beneficiaries in schemes such as the PDS and MNREGS.     Disadvantages Lack of clarity on whether Aadhaar is mandatory:  According to UIDAI, it is not mandatory for individuals to get an Aadhaar number.  However, it does not prevent any service provider from prescribing Aadhaar as a mandatory requirement for availing services.  Therefore, beneficiaries may be denied a service if he does not have the Aadhaar number.  It is noteworthy that the new direct cash transfer policy requires beneficiaries to have an Aadhaar number and a bank account.  However, many beneficiaries do not yet have either.  (Presently, there are 229 million Aadhaar number holders and 147 million bank accounts). Targeting and identification of beneficiaries:  According to the government, one of the key reasons for changing to DCT system is to ensure better targeting of subsidies.  However, the success of Aadhaar in weeding out ‘ghost’ beneficiaries depends on mandatory enrollment.  If enrollment is not mandatory, both authentication systems (identity card based and Aadhaar based) must coexist.  In such a scenario, ‘ghost’ beneficiaries and people with multiple cards will choose to opt out of the Aadhaar system.  Furthermore, key schemes such as PDS suffer from large inclusion and exclusion errors.  However, Aadhaar cannot address errors in targeting of BPL families.  Also, it cannot address problems of MNREGS such as incorrect measurement of work and payment delays. Safeguard for maintaining privacy: Information collected when issuing Aadhaar may be misused if safeguards to maintain privacy are inadequate.  Though the Supreme Court has included privacy as part of the Right to Life, India does not have a specific law governing issues related to privacy.  Also, the authority is required to maintain details of every request for authentication and the response provided.  However, maximum duration for which such data has to be stored is not specified.  Authentication data provides insights into usage patterns of an Aadhaar number holder.  Data that has been recorded over a long duration of time may be misused for activities such as profiling an individual’s behaviour.

In April last year the government had notified the Information Technology (Intermediary Guidelines) Rules, 2011  (IT Rules) under the Information Technology Act, 2000.  The IT Rules are listed for discussion in Rajya Sabha today in pursuance of a motion moved by Mr.  P. Rajeeve [CPI(M)].  The motion seeks to annul these Rules and recommends that Lok Sabha also concur with the motion. The IT Rules require intermediaries (internet service providers, blogging sites like Blogger and Wordpress, and cyber cafés) to take certain action.  Intermediaries are required to enter into agreements with their users prohibiting publication of certain content.  Content that cannot be published includes anything that is ‘harmful to minors in any way’, ‘blasphemous’, ‘encouraging money laundering’ etc.  This raises three issues. Some of the categories of content prohibited for publication are ambiguous and undefined.  For instance, ‘grossly harmful’ and ‘blasphemous’ content are not defined. Publication of certain content prohibited under the IT Rules, is currently not an offences under other laws.  Their publication is in fact allowed in other forms of media, such as newspapers.  Newspapers are bound by Press Council Norms.  These Norms do not prohibit publication of all the content specified under the IT Rules.  For instance, while these Norms require newspapers to show respect to all religions and their gods, they do not prohibit publication of blasphemy.  However, under the IT Rules blasphemy is prohibited.  This might lead to a situation, where articles that may be published in newspapers legally, may not be reproduced on the internet for example in the e-paper or on the newspaper’s website. Prohibition of publication of certain content under the IT Rules may also violate the right to freedom of speech.  Under Article 19(2) of the Constitution restrictions on the right to freedom of speech may be imposed in the interest of the State’s sovereignty, integrity, security and friendly relations with other States, public order, morality, decency, contempt of court, and for protection against defamation.  The content prohibited under the IT Rules may not meet the requirement of Article 19(2).  This may impinge on the right to freedom of speech and expression. Further, anyone can complain against such content to the intermediary.  The intermediary is required to remove content if it falls within the description specified in the IT Rules.  In the event the intermediary decides not to remove the content, it may be held liable.   This could lead to a situation where, in order to minimise the risk of liability, the intermediary may block more content than it is required.  This may imply adverse consequences for freedom of expression on the internet. PRS’s detailed analysis of the IT Rules may be accessed here.