Judicial Trends
Judicial Trends
Judicial Trends
Judicial Trends
HOW COURTS LOOK
AT DIGITAL ID PROGRAMS
A project of the Centre for Internet and Society, India supported by Omidyar Network
→ digitalid.design ←
→ cis-india.org ←
introduction
The insurgence of technology in nearly all aspects of an individual’s life has
made its inevitable way to governance. National digital ID systems are being
adopted worldwide by governments as reliable means to identify residents and
provide them with services they are entitled to. This however, is also following
a noticeable pattern — developed liberal democracies have been rejecting such
systems as far back as the early 2000s,1 while developing nations are increasingly
embracing them in more recent years.2 Some among the latter have seen these
systems come to the forefront of their politics, with their apex courts determining
their constitutionality and future. These ID schemes have been challenged for the
various constitutional threats they posed to the users subjected to them. Although
varying in design and reach, they introduced similar risks in their populace, that
came only from replacing governance with invasive technology.
We have engaged in a study of the different issues that these courts were tasked
with adjudicating, in a hope that it will provide insight into the nature of Digital
ID systems and their interplay with constitutional protections. These courts
identified the risks of the system, the trade-offs they introduced, and how they
could be potentially altered to serve their purpose while limiting harm. In this
series, similarities, differences, patterns, and exceptions will be highlighted, with
the goal of understanding better how and why these ID systems were endorsed,
discontinued, or limited by courts. In the next few pieces, we will analyse the
final outcomes in the judicial challenges, and what factors were considered in the
privacy tests to arrive at such outcomes, as well as how technological issues were
handled by the courts.
We are looking at four Digital ID judgments here. While several cases have been
heard by courts on aspects of privacy and biometric databases worldwide, only
these four were about foundational national Digital ID systems. Foundational
systems are core identity systems catering to the general public, created to
provide identity proof for a variety of services.3 They differ from biometric
databases because they provide credentials to the ID holders to validate their
identity, and from other Digital ID systems because they are not limited to one
1 See the debates surrounding the National Identification Scheme in the U.S. and the Identity Card
Act, 2006 of the UK.
2 See upcoming ID systems in Nigeria, Pakistan, Thailand, Peru etc
3 “Core Concepts and Processes”, Digital Identities: Design and Uses, Centre for Internet and
Society, last accessed June 9, 2020, https://digitalid.design/core-concepts-processes.html
Judicial Trends: How Courts Look at Digital ID Programs 3
function or use.4 The national ID systems in India, Jamaica, Kenya, and Mauritius
sought to provide a digital identity to residents for a variety of purposes not
restricted to a single sector. * In all of these cases, privacy issues were enhanced
by the use of biometric factors and technology in the creation of
verifiable identities.
* Details of these ID systems and the litigation surrounding them can be found
on page 49.
At the outset, the following are the key factors we determined to affect the
outcome of the case:
1. The contours of the ID system and its legal framework
2. The Constitution and scope and substance of rights
3. The court in which it was adjudicated (High Courts/Supreme Courts) and
nature of the adjudication process
4. The petitioners, the claims, and the defence of the respondents (many issues
were expressly not adjudicated upon because the petitioners did not
make claims)
5. The judges, their experience with the subject matter, and prior similar cases
they might have heard
6. The stage of the digital ID project
7. The constitutional governance structure, separation of powers, judicial
deference, and power of judicial review.
8. The adversarial nature of the trial, evidence, use of expert testimony.
9. The existence of prior precedents (around the world)
4 “Core Concepts and Processes”, Digital Identities: Design and Uses, Centre for Internet and
Society, last accessed June 9, 2020, https://digitalid.design/core-concepts-processes.html
Judicial Trends: How Courts Look at Digital ID Programs 4
Contents
Informational Privacy 6
Autonomy of Choice 12
Anonymity 13
Bodily Privacy and Search of Home, Property and Body 14
Section I.
Privacy and Identity
Undoubtedly, the biggest risk of a national Digital ID program is its impact on the
privacy of citizens. Individuals are coerced into parting with their privacy, right
from divulging personal information to get enrolled into the program, to being
monitored at their every interaction with the ID. While some of these concerns
may be termed only “risks,” because of the plausibility of their occurrence — such
as the collected data being hacked by third parties — other concerns are certain,
such as the State having access to personal and biometric data. It also becomes
important to note that the privacy risk in question far surpasses that of such
personal data being shared with the State; in the use of a nation-wide pervasive
digital ID scheme, privacy violations can occur in several other ways: by keeping
records of every instance of authentication of ID by the user, the State is able
to monitor the ID holder’s every transaction and action: this is a disclosure of
(personal) information that is made without the consent, and often the knowledge,
of the individual; by enabling linking of various databases through a unique
ID, the State, or any private actor accessing such information, can identify new
information about the interests, personality, actions, political leanings etc of
the individual, which they did not consent to share; by not providing sufficient
security measures for the data collected when in storage, the individual can no
longer adequately ensure control over the personal information they shared
while obtaining the ID, which they only consented to share with the State; by
allowing easy legal access of the collected information, or frequent disclosures
to State bodies, the individual entirely loses control over their own data. In this
way, Digital ID programs pose several privacy risks of differing severity and
plausibility, all in all making them dangerous tools of governance unless
properly regulated.
An examination of the cases shows that the courts’ adjudication of privacy issues
can be categorised into: the collection of biometric information, the collection of
authentication/transaction information, the design or architecture of the system,
and the legal framework of the system governing the use and further disclosure
of data. Due to the varying stages of development and implementation of the ID
systems in the States selected for this study, some of the privacy issues were not
decided upon by the courts, as they were deemed to be premature. Eventually,
the final outcome was largely a determination of whether the ID system’s benefits
and/or purposes were proportional to its infringement of constitutional rights.
Judicial Trends: How Courts Look at Digital ID Programs 6
Informational Privacy
The Indian Supreme Court, in K.S Puttaswamy v. UoI (“Aadhaar Case”), was tasked
with determining whether the national digital ID project, titled Aadhaar, was
unconstitutional. To do this, they had to first establish a fundamental right to
privacy in the Indian Constitution. The fundamental right to privacy was found
to be ingrained in all the fundamental rights accorded by the Constitution, and
particularly the right to life. It was held to comprise primarily three aspects - (i)
intrusion with an individual’s physical body, (ii) informational privacy, and (iii)
privacy of choice.
Justice Chandrachud perhaps best defined informational privacy as “control a
person has over dissemination of information that is personal to them.” 7 He identified
the harm caused by a disclosure of information, one that is distinct from the other
aspects of privacy, when he described the impact of the electronic trail left behind
by users of the internet 8 — the information contained in these tracks allow an
observation of the sort of the person that the user is, and their interests.9
When aggregated, such information is a powerful indication of their personality,
even when it is not explicitly disclosed and may better remain hidden. Oftentimes
this leads to the creation of new information about an individual that was never
revealed. Perhaps even more concerning is the creation of “big data” comprising
many data sets that are capable of being searched and linked to
one another.
In the Aadhaar case, petitioners claimed that informational privacy was
being severely breached in two respects. First, in the identification stage, when
collecting large amounts of demographic and biometric information from
residents, and from mandating the linking of an Aadhaar number holder’s
bank account, sim card, PAN number etc. Second, at every authentication
by the Aadhaar holder, for every transaction they enter into, the following
information was collected: 10 Aadhaar number, name of Aadhaar holder, whether
authentication failed or was successful, reason for such failure, requesting
entities’ Internet Protocol (IP) address, date and time of authentication, device
ID and its unique ID of authentication device which can be used to locate the
individual. The information created at every authentication also has the effect of
reporting to the government the actions of the Aadhaar holder (where Aadhaar
is involved). J. Chandrachud captured the apprehension of this with what he
identified as “’veillant panoptic assemblage’ — where data gathered through
citizens’ ordinary practises, especially using something that had become as
ubiquitous as Aadhaar, finds its way to State surveillance mechanisms.11
The Aadhaar case resulted in a majority opinion, and a dissent by
J. Chandrachud. The majority held that while informational privacy formed an
important part of the constitutional right of privacy, the extent of privacy that
warranted protection depends on an individual’s “reasonable expectation of
privacy”. This, in turn, requires the individual to show a “likely and real” harm
that may be inflicted on them on account of the alleged privacy-impacting act,
that is not “flimsy or trivial” but reasonable.12 For Aadhaar, they held that the
demographic and photographic information collected in the issue of the ID are
widely collected by many other governmental bodies, and thus do not accord
special privacy protection in this case. Even the core biometric information
comprising fingerprints and iris scans are the minimal data collected for
enrolment; thus, as per their balancing test, this sacrifice to their right to privacy
is balanced against the purpose for the disclosure of information (and the data
subject’s right to seek benefits of the welfare scheme). The intent of the judges
here is unclear, but implicitly it would seem they recognised that the sharing of
core biometric data is an infringement of informational privacy, albeit one that
10 Justice K.S. Puttuswamy (Retd.) v. Union of India, 1 SCC 1 (2019), 170 (Sikri, J.)
11 Justice K.S. Puttuswamy (Retd.) v. Union of India, 1 SCC 1 (2019), ¶ 305.
12 Justice K.S. Puttuswamy (Retd.) v. Union of India, 1 SCC 1 (2019), 359 ¶ 289.
Judicial Trends: How Courts Look at Digital ID Programs 8
13 Justice K.S. Puttuswamy (Retd.) v. Union of India, 1 SCC 1 (2019), ¶¶ 297 onwards.
14 Article 13(3)(j), The Constitution of Jamaica, 1962.
15 Julian J. Robinson v. The Attorney General of Jamaica, [2019] JMFC Full 04, 184, ¶ 10.
Judicial Trends: How Courts Look at Digital ID Programs 9
Aadhaar majority, as the court recognised that it was not individual categories of
data that had to be examined for a privacy claim over it, but the aggregation of all
such categories of data that posed the real privacy harm.16
Eventually, on completing the proportionality test, the court held that the entire
scheme ought to be shut down for its unconstitutionality because the current
governing framework does not accord sufficient protection to the data collected
through the scheme.
In Kenya, the High Court of Kenya decided on the constitutionality of their
digital ID scheme titled Huduma Namba. Although currently being appealed, the
judgment provides important insight into how the use of Huduma Namba is likely
to lead to breaches of privacy of residents. The court held that a right to privacy
envisages the right to “live one’s life with minimum interference.” 17 What is important
to note is that this court categorically recognised that the right to privacy does not
pertain merely to information that could be damaging to the dignity or reputation
of an individual if revealed, or in any manner cause harm on disclosure, but
accords protection to all private information so as to allow the individual to
retain control over its dissemination.18 This, once again, is a departure from the
Aadhaar majority’s interpretation. “Private information”, in turn, is not merely
information that is considered intimate, that the individual would rather shroud
in secrecy, but other information that they consider private, even if pertaining
to their presence or actions in a public place.19 However, since the petitioners
only brought claims regarding biometric and GPS data, both of which would be
considered private information according protection even by the Aadhaar court’s
test, the court’s conviction in protecting all private information was never really
put to test.
The right to privacy is codified in Article 31 of the Kenyan Constitution and
comprises, inter alia, a right “not to have information relating to their family or
private affairs unnecessarily required or revealed.” 20 This right can be abrogated if
done by law, and to the extent the limitation is “reasonable and justifiable in an
open and democratic society based on human dignity, equality and freedom.” 21 This, in
the court’s assessment, constituted the right to informational privacy. Thus, it
had to consider 2 aspects: first, if the collection of data entailed in the Huduma
16 Julian J. Robinson v. The Attorney General of Jamaica, [2019] JMFC Full 04, ¶ 36 of (B) of 247 (Sykes,
J.)
17 Nubian Rights Foundation & Ors. v. Attorney General of Kenya & Ors. [2020] eKLR (Kenya), ¶ 750.
18 Nubian Rights Foundation & Ors. v. Attorney General of Kenya & Ors. [2020] eKLR (Kenya), ¶¶ 749-750.
19 Nubian Rights Foundation & Ors. v. Attorney General of Kenya & Ors. [2020] eKLR (Kenya), ¶ 750.
20 Article 31(c), The Constitution of Kenya, 2010.
21 Article 24(1), The Constitution of Kenya, 2010.
Judicial Trends: How Courts Look at Digital ID Programs 10
22 Nubian Rights Foundation & Ors. v. Attorney General of Kenya & Ors. [2020] eKLR (Kenya), ¶ 750.
23 Nubian Rights Foundation & Ors. v. Attorney General of Kenya & Ors. [2020] eKLR (Kenya), ¶ 758.
24 Article 31(c), The Constitution of Kenya, 2010.
25 Nubian Rights Foundation & Ors. v. Attorney General of Kenya & Ors. [2020] eKLR (Kenya), ¶ 774.
26 Nubian Rights Foundation & Ors. v. Attorney General of Kenya & Ors. [2020] eKLR (Kenya), ¶ 775.
27 Nubian Rights Foundation & Ors. v. Attorney General of Kenya & Ors. [2020] eKLR (Kenya), ¶ 786.
28 Nubian Rights Foundation & Ors. v. Attorney General of Kenya & Ors. [2020] eKLR (Kenya), ¶ 778.
Judicial Trends: How Courts Look at Digital ID Programs 11
29 Nubian Rights Foundation & Ors. v. Attorney General of Kenya & Ors. [2020] eKLR (Kenya), ¶ 781.
30 Nubian Rights Foundation & Ors. v. Attorney General of Kenya & Ors. [2020] eKLR (Kenya), ¶ 781.
31 Nubian Rights Foundation & Ors. v. Attorney General of Kenya & Ors. [2020] eKLR (Kenya), ¶ 782.
32 Nubian Rights Foundation & Ors. v. Attorney General of Kenya & Ors. [2020] eKLR (Kenya), ¶ 785.
Judicial Trends: How Courts Look at Digital ID Programs 12
unnecessary and posed an additional privacy risk.33 However, the court refused
to engage on issues that it considered were policy decisions or about the
technological design of the system. It restricted itself to an assessment of the legal
data protection framework governing NIIMS. It held that while a data protection
framework was in place, data protection principles and standards should be
categorically provided in regulations governing NIIMS, and adequately actualized
in its operation.34 To that extent, it found the legal framework lacking and posing
serious risk to the security of data in NIIMS. Thus, in light of the risk it invites for
data breaches and unauthorized access, it was a limitation to the right to privacy
found in Article 31(c).35 The constitutionality of the scheme therefore hinged on
whether such a limitation was justifiable in a democratic society.
In Mauritius, the only private information that was considered, in the petition
and in the judgment, was that of the biometric data extracted. The court only
looked into its impact on bodily privacy, and did not consider informational
privacy an issue.
Autonomy of Choice
In Jamaica, the fundamental right to privacy is contained in Article 13(3)(j) of
the Constitution. It comprises a right to be protected from “search of the person
and property”, a respect for “private and family life” and a protection of privacy
of other property.36 Here, while examining the impact of NIRA on this right,
they found that it was the mandatory collection of data, along with inadequate
protection of such data, that impacted their privacy rights. However, in addition
to this right, the court leveraged principles embedded in the constitution such
as the obligation to respect the inherent dignity of individuals,37 and respect
them as “citizens of a free and democratic society” 38 to interpret a right to have
“privacy of choice”. Even notwithstanding the right to privacy they held that a
right of individuals to “decide what to do with their own privacy” inhered in the
fundamental right to life, liberty, and security found in 13(3)(a) of the Constitution
33 Third party access could be entirely removed by instead requiring direct authentication from
the central NIIMS database. See Nubian Rights Foundation & Ors. v. Attorney General of Kenya & Ors.
[2020] eKLR (Kenya), ¶ 859.
34 Nubian Rights Foundation & Ors. v. Attorney General of Kenya & Ors. [2020] eKLR (Kenya), ¶ 884.
35 Nubian Rights Foundation & Ors. v. Attorney General of Kenya & Ors. [2020] eKLR (Kenya), ¶ 920.
36 Article 13(3)(j), The Constitution of Jamaica, 1962.
37 Article 13(1)(a), The Constitution of Jamaica, 1962.
38 Article 13(1)(b), The Constitution of Jamaica, 1962.
Judicial Trends: How Courts Look at Digital ID Programs 13
Anonymity
Anonymity may not seem like a particularly essential right to accord to
individuals, but its significance is heightened because of the nature of digital
ID programs. The collection of large swathes of demographic and biometric
information, along with records of ID holders’ actions and transactions, all
linked to each other by a unique number, essentially strip away any semblance
of anonymity of an ordinary individual. An actor with access to any part of
this system and armed with limited information about the ID holder can easily
find them and generate new information about them without their knowledge.
However, this did not form a substantial part of the claims or the judgments in
these cases, with the exception of Jamaica.
The Jamaican Supreme Court, in Robinson, included the right to anonymity
in their description of privacy.43 J. Sykes identified as a feature of free
39 Julian J. Robinson v. The Attorney General of Jamaica, [2019] JMFC Full 04, 189, ¶ 18 (Sykes, J.).
40 Julian J. Robinson v. The Attorney General of Jamaica, [2019] JMFC Full 04, 189, ¶ 19.
41 Julian J. Robinson v. The Attorney General of Jamaica, [2019] JMFC Full 04, 190, ¶ 20.
42 Julian J. Robinson v. The Attorney General of Jamaica, [2019] JMFC Full 04, 200, ¶ 116.
43 Julian J. Robinson v. The Attorney General of Jamaica, [2019] JMFC Full 04, 184, ¶ 10 (Sykes, J.).
Judicial Trends: How Courts Look at Digital ID Programs 14
44 Julian J. Robinson v. The Attorney General of Jamaica, [2019] JMFC Full 04, 184, ¶ 11 (Sykes, J.).
45 Article 13(3)(j), The Constitution of Jamaica, 1962.
46 Article 8, The Canadian Charter of Rights and Freedoms, 1982.
47 R v. Spence [2014] 2 SCR 212.
48 R v. Spence, [2014] 2 SCR 212.
49 Julian J. Robinson v. The Attorney General of Jamaica, [2019] JMFC Full 04, 201, ¶ 38.
50 Article 13(3)(j), The Constitution of Jamaica, 1962.
51 R v. Plant [1993] 3 SCR 281.
52 Article 8, The Canadian Charter of Rights and Freedoms, 1982.
53 R v. Plant, [1993] 3 SCR 281.
54 Julian J. Robinson v. The Attorney General of Jamaica, [2019] JMFC Full 04, 201, ¶ 38.
Judicial Trends: How Courts Look at Digital ID Programs 15
55 Julian J. Robinson v. The Attorney General of Jamaica, [2019] JMFC Full 04, 209, ¶ 61.
56 Madhewoo M v. The State of Mauritius, 2015 SCJ 177.
57 Section 9(1), The Constitution of the Republic of Mauritius, 1968.
58 Madhewoo M v. The State of Mauritius, 2015 SCJ 177, 22.
59 Madhewoo M v. The State of Mauritius, 2015 SCJ 177, 22.
60 Madhewoo M v. The State of Mauritius, 2015 SCJ 177, 23.
61 Madhewoo M v. The State of Mauritius, 2015 SCJ 177, 22.
Judicial Trends: How Courts Look at Digital ID Programs 16
triggered such privacy claims. An examination of this will comprise all those
elements that threatened to impact privacy rights, regardless of whether they
were eventually held unconstitutional (based on a proportionality analysis or a
consideration of the surrounding legal framework). We have only included within
each section those cases that considered the particular aspect highlighted to be a
potential privacy violation.
67 Julian J. Robinson v. The Attorney General of Jamaica, [2019] JMFC Full 04, ¶ 38.
68 Madhewoo M v. The State of Mauritius, 2015 SCJ 177, 23.
69 Nubian Rights Foundation & Ors. v. Attorney General of Kenya & Ors. [2020] eKLR (Kenya), ¶ 765.
70 Nubian Rights Forum & Ors v. Attorney General of Kenya & Ors. [2019] High Court of Kenya, Ruling No.
3, available at http://kenyalaw.org/caselaw/cases/export/172447/pdf.
71 See ‘Informational Privacy’ section above.
Judicial Trends: How Courts Look at Digital ID Programs 18
and easily allowed Aadhaar seeding into several service provider databases.72 The
court, agreeing with the severe privacy harms that such a system entails, held that
the provision fails the proportionality test and is consequently unconstitutional.73
In Jamaica, the court held that Section 39 of NIRA, which permits third
parties to have access to the Database for verification purposes, violates the
right to privacy found in section 13 (3) (j) (ii). It also observed that there were
no justifiable reasons tendered for why third parties must have access to the
database for authentication, when the purpose of the Act was for accessing
government services.
Additionally, the complete lack of safeguards or governance for use by third
parties alarmed the court. Sec 39 allows requesting entities to use authentication
services of the authority, without specifying what information can be shared
and/or recorded by the RE. There is no prohibition on storing data by Requesting
Entities. There is also no need to get the consent of the individual before verifying
their identity. By failing to address matters of data retention periods and
treatment of authentication records, NIRA violated the privacy rights of
Jamaican residents.74
In Mauritius, access to data collected under the NIC Act is governed by the
Data Protection Act (“DPA”). Under the DPA, data can be processed only subject
to express consent of the data subject.75 This does not in any manner restrict
third party access to data, provided the data subject consents to such access.
Express consent need not be sought, however, when processing is needed “for the
performance of a contract to which the data subject is a party”, “for compliance
with any legal obligation to which the data controller is subject” and “in the public
interest”.76 This easy access to personal data collected under the Act was held to
be a violation of privacy that is not “reasonably justifiable in a
democratic society.” 77
Disclosures
Most Digital ID schemes permit disclosures of personal data collected under it, for
several reasons, typically associated with national security, prevention of crime,
compliance with judicial orders, etc. These are reasons often entirely detached
from the purpose of the ID system itself. Disclosures are usually managed by the
administrator of the system, without the consent (or often participation) of the
ID holder.
In Jamaica, section 43 of the Act allows the authority to disclose identity
information in the database in the following circumstances:
a. Pursuant to a request of the individual whose identification is
being disclosed;
b. To facilitate the identification of the bodies of unknown deceased persons;
c. To facilitate the finding or identification of missing persons; or
d. Where the Act authorizes the disclosure
The court held that these vague provisions facilitated violation of individuals’
privacy because of the broad terms for allowing disclosures, with little or no
oversight. Specification of terms for these disclosures are also left to regulations,
which have not (yet) been made. This was held to be an unconstitutional
infringement of individuals’ privacy rights.78
The court in Mauritius analysed the disclosures permitted under the Data
Protection Act, applicable to the data collected under the NIC Act. Disclosures are
easily allowed under the DPA, for reasons ranging from national security,79 to the
prevention of crime and the assessment of tax,80 in relation to the health of the
78 Julian J. Robinson v. The Attorney General of Jamaica, [2019] JMFC Full 04, ¶ 367.
79 Section 45, Data Protection Act, 2017.
80 Section 46, Data Protection Act, 2017.
Judicial Trends: How Courts Look at Digital ID Programs 20
individual,81 to if the disclosure is necessary for obtaining legal advice.82 The low
threshold for permitting disclosures, together with the complete lack of judicial
oversight to monitor such disclosures, was concerning to the court, prompting
them to hold that such uncontrolled access without sufficient safeguards was an
unjustifiable violation of citizens’ right to privacy.83
In India, the Aadhaar court looked at the constitutionality of the Aadhaar Act
which allowed identity information and authentication records to be disclosed
to relevant authorities on judicial orders, or in the interest of national security.84
While ultimately declaring the provision constitutional as it was a legitimate
exception under the fundamental right to privacy, the court identified the privacy
harms involved in such disclosures by limiting the scope of the provisions, and
ensuring more judicial oversight and control by the data subject.85
The Aadhaar bench in India was tasked with determining whether the seeding
of Aadhaar in the Permanent Account Number (“PAN”) database — ergo a linking
of the two databases — was constitutional. The court held that in a social welfare
State, ensuring optimum distribution of scarce public resources was a legitimate
aim of the State and fulfils the proportionality test for a violation of the right to
privacy.86 However, they held that a mandatory linking of the Aadhaar number
with bank accounts,87 and with mobile numbers,88 was unconstitutional as it
failed the proportionality test. Here, the court did recognise the privacy threat
introduced by linking databases, but perhaps not as clearly as the petitioners, for
whom the issue of Aadhaar seeding took almost the forefront of their case.
89 Julian J. Robinson v. The Attorney General of Jamaica, [2019] JMFC Full 04, 189, ¶ 20.
90 Julian J. Robinson v. The Attorney General of Jamaica, [2019] JMFC Full 04, 224, ¶ 101.
91 Section 17(e), National Identification and Registration Act, 2017.
92 Julian J. Robinson v. The Attorney General of Jamaica, [2019] JMFC Full 04, ¶ 56.
93 Nubian Rights Foundation & Ors. v. Attorney General of Kenya & Ors. [2020] eKLR (Kenya), ¶ 855.
94 Nubian Rights Foundation & Ors. v. Attorney General of Kenya & Ors. [2020] eKLR (Kenya), ¶ 882.
95 Nubian Rights Foundation & Ors. v. Attorney General of Kenya & Ors. [2020] eKLR (Kenya), ¶ 875.
Judicial Trends: How Courts Look at Digital ID Programs 22
In Jamaica, the court was quick to recognise the many dangers associated
with the vast collection and storage of personal data. They observed that due
to the nonrivalrous nature of data, its misuse and abuse is easy and can often
go undetected.96 Hacking is typically not disclosed by the hacked entity, and
once stolen the data is difficult to trace and retrieve.97 Although they spoke at
length about requiring robust and deterrent systems to minimize data theft, the
court recognised that regardless of protection offered by a strong statute, it is
insufficient to comprehensively secure data proposed to be collected and stored,
of an entire nation, for generations to come. Thus, the court determined that the
threat of hacks and unauthorised access was so severe when the data collected
is vast and pervasive, as is in a national digital ID program, that it warranted its
complete upheaval.98 Thus, the threat of unauthorised access was held to put data
subjects at the risk of a violation of their privacy.
In Kenya, the court observed that the storage of biometric information in the
absence of a strong legal framework put data subjects at the risk of “attack or
unauthorized access”, and therefore impacted their privacy rights.99 This was
enhanced by the centralised storage of such data, since it had the added effect of
the data subjects having no information or control over their own data, and often
no knowledge of its access.100
A chief criticism of the Aadhaar judgment in India was how callously the
court treated the risk of hacking and unauthorised access of the ID system,
despite much evidence of its repeated instances. In spite of referencing several
newspaper reports of unauthorised access of the Central Identities Data
Repository (“CIDR”) — all of which were denied by the UIDAI — the court did not
hear parties on the subject 101 and relied on an assurance of the respondent to
ensure the security of the CIDR.102 However perhaps even this small exchange is
indicative of the court's fears associated with the risk that unauthorised access
imposes on the privacy of data subjects.
96 Julian J. Robinson v. The Attorney General of Jamaica, [2019] JMFC Full 04, ¶ 247(A)(80).
97 Julian J. Robinson v. The Attorney General of Jamaica, [2019] JMFC Full 04, ¶ 247(A)(79).
98 Julian J. Robinson v. The Attorney General of Jamaica, [2019] JMFC Full 04, ¶ 247(A)(123).
99 Nubian Rights Foundation & Ors. v. Attorney General of Kenya & Ors. [2020] eKLR (Kenya), ¶ 880.
100 Nubian Rights Foundation & Ors. v. Attorney General of Kenya & Ors. [2020] eKLR (Kenya), ¶ 880.
101 This issue of the court’s engagement with technological evidence will be explored in greater
detail in a subsequent post in this series.
102 Justice K.S. Puttuswamy (Retd.) v. Union of India, 1 SCC 1 (2019), ¶ 212 (Sikri, J.).
Judicial Trends: How Courts Look at Digital ID Programs 23
Accountability of Administrator
In Jamaica, the court held that a lack of provisions for auditing the Authority, or
otherwise holding it accountable, to see if it is complying with the law, put at risk
the privacy of ID holders.103
In Kenya, the court observed that the Accountability principle, under the
OECD privacy Principles,104 required the data controller to be accountable for
complying with measures that enhance privacy.105 The Data Protection Act, that
is applicable to the Huduma Namba framework, provides for an independent Data
Commissioner to oversee the implementation of the Act. It was held that until all
aspects of the Data Protection Act were operationalised, including by codifying
circumstances in which the Data Commissioner might exempt the operation of
the Act, or by appointing the Data Commissioner and registering data controllers
and processors, the lack of accountable administration of the system puts at risk
the privacy of data subjects.106
Storage of Data
The court in Jamaica held in its assessment of the privacy claim, that regardless
of whether the Digital ID scheme was voluntary, the storage of the data collected
in the scheme itself would run afoul of the constitution, because of the privacy
risks it exposes data subjects to.107
In Mauritius, the retention and storage of the biometric data collected for the
103 Julian J. Robinson v. The Attorney General of Jamaica, [2019] JMFC Full 04, ¶ 247(A)(82).
104 “OECD Privacy Principles”, Organisation for Economic Co-operation and Development, last
accessed June 9, 2020, http://oecdprivacy.org/.
105 Nubian Rights Foundation & Ors. v. Attorney General of Kenya & Ors. [2020] eKLR (Kenya), ¶ 850.
106 Nubian Rights Foundation & Ors. v. Attorney General of Kenya & Ors. [2020] eKLR (Kenya), ¶¶ 852-
853.
107 Julian J. Robinson v. The Attorney General of Jamaica, [2019] JMFC Full 04, ¶ 247(A)(51).
Judicial Trends: How Courts Look at Digital ID Programs 24
issue of the ID card was of particular import to the Supreme Court.108 The NIC Act
provides that a register will record all the data collected of every citizen,109 and
will include other “reasonable or necessary information as may be prescribed.” 110 The
court held that the storage and retention of personal information for an indefinite
period violates citizens’ fundamental right to privacy, and is a disproportionate
action to be exempted as a “justifiable” aim to pursue.111
In Kenya, the court observed that the centralized storage of biometric
data subjects ID holders to unauthorized access or attacks, perhaps without
even their knowledge, entailing irreversible risks of misuse of the data for
discrimination, profiling, surveillance, etc.112 They concluded that this is the
nature of all biometric systems, whether centralised or not, and therefore
required a secure legal framework with detailed regulations and procedures,
all of which the current legal framework did not satisfy.113 Thus, the storage of
biometric information, particularly in the absence of a sufficient legal framework,
threatened the privacy rights of individuals.
data being disclosed and/or recorded is the “yes” or “no” response, along with the
Aadhaar number and the requesting entity’s identity. The Authority would only
be privy to information about the identity of the Aadhaar User Agency, and the
device used for authentication, without any information about the location of the
transaction, the IP address, its operator, the purpose of authentication, etc.116 They
concluded that it would be difficult to profile a data subject based merely on the
basis of their biometric and demographic information stored in the CIDR, and to
that extent there was no privacy risk caused by the amount of data collected
for Aadhaar.117
Authentication of ID
In Jamaica, the NIRA has not yet operationalised the authentication mechanism
for the use of the Digital ID, and to that extent does not have a governance
framework for authentication. Accordingly, it does not in any manner prevent the
Authority from storing data regarding the purpose for which the requesting entity
is seeking authentication. The storing of metadata, apart from that regarding
authentication transactions, is also not expressly prohibited. The court, justifiably
concerned about the implications of all these failures, registered its fears about
the use of Digital IDs for authentication purposes.
In India, a key privacy concern of the petitioners in the Aadhaar litigation was
that of the data collected at every authentication of the Digital ID. Since a primary
mode of authentication was by using fingerprints, data subjects were parting
with their biometric data at every use of Aadhaar, and with several different
actors (who are permitted to leverage the Aadhaar authentication mechanism).
Keeping records of every authentication also facilitates a monitoring of the
transactions of the data subject in manner that resembles real-time surveillance,
and could therefore easily be misused. However, the court held that while such
concerns exist in principle, the Aadhaar framework has effectively eliminated
such an occurrence.118 The Aadhaar Act and its adjoining regulations prohibit the
authority from collecting and storing any information about the purpose of the
authentication.119 Even data concerning the location is not determinable by the
116 Justice K.S. Puttuswamy (Retd.) v. Union of India, 1 SCC 1 (2019), ¶¶ 151-152.
117 Justice K.S. Puttuswamy (Retd.) v. Union of India, 1 SCC 1 (2019), ¶ 153.
118 Justice K.S. Puttuswamy (Retd.) v. Union of India, 1 SCC 1 (2019), ¶ 297 (Sikri, J.).
119 Section 32(3), Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and
Services) Act, 2016; Regulation 26, Aadhaar (Authentication) Regulations, 2016.
Judicial Trends: How Courts Look at Digital ID Programs 26
120 Justice K.S. Puttuswamy (Retd.) v. Union of India, 1 SCC 1 (2019), ¶ 197 (Sikri, J.).
121 Section 2(d), Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and
Services) Act, 2016.
122 Justice K.S. Puttuswamy (Retd.) v. Union of India, 1 SCC 1 (2019), ¶ 197 (Sikri, J).
123 Justice K.S. Puttuswamy (Retd.) v. Union of India, 1 SCC 1 (2019), ¶ 199 (Sikri, J.).
124 Justice K.S. Puttuswamy (Retd.) v. Union of India, 1 SCC 1 (2019), ¶ 201 (Sikri, J.).
Judicial Trends: How Courts Look at Digital ID Programs 27
Section II.
Surveillance
The court in Jamaica saw the mass storage of identity information, including
biometric information, of all its residents in the NCID as enabling surveillance.
The embedding of residents’ registration numbers, together with the linking
of all government databases through this number, made tracking of resident
behaviour easy.125 They recognise that although this may not be the intention of
the government, it is a possibility created solely by the NIRA legislation, and this
risk alone warrants careful consideration. J. Sykes’ observed that “History has
taught us that once the power is available and there is no constraint, governments will use
that power.” 126
One of the grounds on which the court eventually struck down NIRA was that
it did not adequately prevent the use of data obtained from the program for the
creation of profiles, and eventually for the creation of a “Surveillance State.” 127
The broad scope allowed for information sharing and verification, along with the
use of the system for identity verification by the public and private sector with
little control, contributes to the creation of easy surveillance by the State.128
The court in Kenya largely looked at surveillance on the basis of the GPS
information that the Huduma Namba scheme sought from ID applicants. It held
that GPS coordinates are satellite based, and with information taken from
providers of internet and telecommunication services, real time tracking of
people without their knowledge can be undertaken.129 Accordingly, without
125 Julian J. Robinson v. The Attorney General of Jamaica, [2019] JMFC Full 04, ¶ 30.
126 Julian J. Robinson v. The Attorney General of Jamaica, [2019] JMFC Full 04, ¶ 30.
127 Julian J. Robinson v. The Attorney General of Jamaica, [2019] JMFC Full 04, ¶ 375.
128 Julian J. Robinson v. The Attorney General of Jamaica, [2019] JMFC Full 04, ¶ 375.
129 Nubian Rights Foundation & Ors. v. Attorney General of Kenya & Ors. [2020] eKLR (Kenya), ¶ 768.
Judicial Trends: How Courts Look at Digital ID Programs 29
130 Nubian Rights Foundation & Ors. v. Attorney General of Kenya & Ors. [2020] eKLR (Kenya), ¶ 771-773.
131 Nubian Rights Foundation & Ors. v. Attorney General of Kenya & Ors. [2020] eKLR (Kenya), ¶ 880.
132 Nubian Rights Foundation & Ors. v. Attorney General of Kenya & Ors. [2020] eKLR (Kenya), ¶¶ 883-
884.
133 Nubian Rights Foundation & Ors. v. Attorney General of Kenya & Ors. [2020] eKLR (Kenya), ¶ 786.
134 Justice K.S. Puttuswamy (Retd.) v. Union of India, 1 SCC 1 (2019), 219, ¶ 130.
135 Justice K.S. Puttuswamy (Retd.) v. Union of India, 1 SCC 1 (2019), 219, ¶ 130.
136 Regulations 20, 26-27, Aadhaar (Authentication) Regulations, 2016.
Judicial Trends: How Courts Look at Digital ID Programs 30
137 “Aadhaar Registered Devices – Technical Specification – Version 2.0”, Unique Identification
Authority of India, last accessed June 9, 2020, https://uidai.gov.in/images/resource/aadhaar_registered_
devices_2_0_09112016.pdf; Justice K.S. Puttuswamy (Retd.) v. Union of India, 1 SCC 1 (2019), ¶ 131.
138 Justice K.S. Puttuswamy (Retd.) v. Union of India, 1 SCC 1 (2019), 232, ¶ 144.
139 Section 2(k), Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and
Services) Act, 2016.
140 Justice K.S. Puttuswamy (Retd.) v. Union of India, 1 SCC 1 (2019), 234, ¶ 147.
141 Justice K.S. Puttuswamy (Retd.) v. Union of India, 1 SCC 1 (2019), 236, ¶ 151.
142 Justice K.S. Puttuswamy (Retd.) v. Union of India, 1 SCC 1 (2019), 242, ¶ 152.
Judicial Trends: How Courts Look at Digital ID Programs 31
surveillance State.143
Though inherently enhanced by the very existence of a national digital ID
program, the risk of surveillance was quite easily dismissed by courts. Some
factors of an ID system that increase the surveillance capability of a State are:
lack of a legal limitation on uses of the ID system; inadequate oversight by an
independent body; the collections of wide varieties of data; the use of a unique
identifier to integrate different silos of information; and the lack of a data
protection law that applies to the State. India, though meeting nearly all of these
criteria, only put in place some limitations pertaining to the period of storage
of authentication information and metadata. The court reposed faith in the
government to bring out a data protection law that adequately addresses the
remaining concerns, which hasn’t yet been actualized nearly two years later. In
the absence of this law, India does not have any data protection framework that
applies to the government. What such a framework would also have ensured
is the operation of an independent data protection authority, who would be
able to oversee the actions of the administrator of the ID system. Without this,
there is no scope of oversight to actualize the measures the Aadhaar court or
the ID law implements. The Kenyan court was also dismissive of the danger of
surveillance — one that it was certain could be avoided by a rigorous digital ID
framework — although it refused to allow the project to continue until all aspects
of its governance were properly codified and all oversight mechanisms in the data
protection law actualised. Nonetheless, the integration of the national database
with all functional government databases as envisioned by the program — thereby
linking various categories of information about individual ID holders — is a
precursor to State surveillance. Only Jamaica considered this issue as it deserved,
and held that merely the existence of so much data with the State created the
possibility of pervasive surveillance that could not be ignored.
143 These provisions include reducing the period of retention of authentication records,
prohibiting the storing of metadata, disallowing the participation of private parties, etc. See Justice
K.S. Puttuswamy (Retd.) v. Union of India, 1 SCC 1 (2019), 301, ¶ 230; 293, ¶ 219.
Judicial Trends: How Courts Look at Digital ID Programs 32
Section III.
Impact on changing
Citizen-State relations
The position of a citizen qua the State is often cemented by the Constitution of
a country, and the power it allows the State to have over individual citizens. The
existence of a national digital ID program has the potential to fundamentally
alter this: by collecting vast biometric and demographic information on a
national scale; making it easily accessible through a unique ID; and by tracking
the transactions an ID holder does using the ID, the State is now equipped with
enough information to change this power balance.
In India, the Aadhaar project was challenged on this ground in K.S Puttaswamy
v. UOI, and Binoy Viswam v. UOI.144 Petitioners argued that a fundamental feature
of the Constitution is the sovereignty of the people with limited government
authority.145 “Limited government” is integrated into the Constitution in many
ways: by the distribution of power among State organs and checks on the exercise
of such power; by Fundamental Rights that limit the encroachment of State into
the liberty of citizens; by the Preamble to the Constitution, that entitles citizens
to live without being under the constant gaze of the State; by the interplay of
Fundamental Rights and Directive Principles of State Policy, etc. Attempting to
find respite in principles of Constitutional Trust and constitutional morality,
they argued that although not codified as such, the requirement of a “limited
government” has always been a key feature and goal of the Constitution of
India. The Aadhaar project threatens to completely overhaul this, with the State
d. The pervasiveness of Aadhaar, and therefore the State, limits the personal
autonomy of individuals.
e. Where otherwise accountability and transparency is being demanded
by citizens from the State, in the case of Aadhaar this is being entirely
overturned and extreme transparency in a citizen’s everyday life is being
demanded by the State.
The court, on its part, agreed with this argument in principle. It held that the
Supreme Court’s interpretation of Constitutionalism has always been that there is
no room for anarchy or absolutism.146 However, it disagreed on two main counts:
a. Principles of limited government applicable to democratically elected
government are part of the Constitution in the form of delineation of powers
of each wing of the government, oversight by the Judiciary, constitutionally
allotted responsibilities for the Federal and State governments.147 The claim
that this principle also proscribes the State from collecting and storing
Aadhaar data such that it might put the State in a dominant position, does not
squarely fall within this. However, the court did not address this in enough
detail so as to discern whether or not they disputed this understanding of
“limited constitution”.
b. As to the factual aspects of the Aadhaar project, the court disagreed with the
claim that it threatened constitutional trust and morality. They held that with
the legal framework that will now govern the project, after some provisions
were amended or read down, there is no danger of creating a surveillance
146 Justice K.S. Puttuswamy (Retd.) v. Union of India, 1 SCC 1 (2019), ¶ 384; Manoj Narula v. Union of
India 9 SCC 1 (2014); Govt. of NCT of Delhi v. Union of India SCC Online SC 661 (2018).
147 Justice K.S. Puttuswamy (Retd.) v. Union of India, 1 SCC 1 (2019), ¶ 386; Binoy Viswam v. Union of
India, 7 SCC 59 (2017), ¶ 85.
Judicial Trends: How Courts Look at Digital ID Programs 34
In its assessment, this court did not give due attention to the idea that merely the
existence of such information with the State — even if it does not actively engage
in surveillance — creates a chilling effect on the speech and behaviour of its
citizens, which in turn fundamentally alters Citizen-State relations.
In Jamaica, the court recognised the dominant effect the accumulation of
such data would have, without this argument explicitly being brought by the
plaintiffs. It observed that the collection of biometric and biographic information
of the entire citizenry, together with the use of technology and automation, put
great powers over the lives of persons in the hands of the possessors of such
data, particularly when it is already powerful actors like the State.149 The use of
a unique ID across different databases only increases the possibility of profiling
of data subjects, and when combined with the use of an algorithm to analyse the
data, can generate new information about them.150 As a result, there is a lot more
power accumulated with the State.
However, NIRA’s effect on the change in citizen-State relations did not play
a bigger role in the court’s final assessment of the claim, as the operative part
of the judgment failed to address whether this would be unconstitutional, and
focused entirely on its effect on privacy and surveillance. Nonetheless, this court’s
recognition of the power that such a pervasive digital ID program gives a State,
and its impact on creating a chilling effect on its citizens, was heartening.
This was not recognised as an issue in Kenya and Mauritius, neither by the
petitioners nor by the court.
148 Justice K.S. Puttuswamy (Retd.) v. Union of India, 1 SCC 1 (2019), ¶ 388.
149 Julian J. Robinson v. The Attorney General of Jamaica, [2019] JMFC Full 04, ¶ 237.
150 Julian J. Robinson v. The Attorney General of Jamaica, [2019] JMFC Full 04, 190 ¶ 20.
Judicial Trends: How Courts Look at Digital ID Programs 35
Section IV.
Impact on Discrimination
and Exclusion
In Jamaica, the primary argument on NIRA’s discriminatory impact was that
by requiring only Jamaican residents to enrol into NIRA and possess the ID
to access the same goods and services that non-residents are accessing, their
right to equality under Section 13(3)(g) was being violated. Only Residents
are required to enrol (at the risk of criminal sanction) 151 and to mandatorily
produce their ID while accessing goods and services provided by public bodies,152
effectively putting them at risk of being treated unfavourably qua foreigners.
Put another way, Jamaican residents had to undergo a rigorous identification
process (including parting with biographical and biometric information) while
non-residents had no identical requirement to access the same goods/services.
The court observed that if the purpose of the requirement of NIN while accessing
goods and services of a public body is to verify their identity, there is no rational
reason to exclude all other forms of identification, and no justification why the
same is not applicable to foreigners.153 Accordingly, the court held that Section
20, that mandates enrolment from Jamaican nationals, is unconstitutional
because it has the effect of putting Jamaican residents in a worse position to their
foreign counterparts when accessing the same goods and services from the same
government entities. Since no reasonable justification has been tendered for this
154 Julian J. Robinson v. The Attorney General of Jamaica, [2019] JMFC Full 04, 179, ¶ 20.
155 Article 27, The Constitution of Kenya, 2010.
156 Article 27, The Constitution of Kenya, 2010.
157 Nubian Rights Foundation & Ors. v. Attorney General of Kenya & Ors. [2020] eKLR (Kenya), ¶ 995.
Judicial Trends: How Courts Look at Digital ID Programs 37
biometric data, etc, and to address that, asked for there to be clearly identified
a regulatory framework to deal with exclusion. However, it did not find that the
possibility of exclusion was sufficient reason to find NIIMS unconstitutional.158
In the Aadhaar case in India, Section 7 of the Aadhaar Act was challenged for its
exclusionary effect on individuals. Section 7 allowed authentication of identity
by Aadhaar to be made mandatory to access government “subsidies, benefits,
or services.” 159 The petitioners argued that since biometrics are inherently
probabilistic in nature, using it as a process for authentication will undeniably
result in exclusion of genuine persons.160 Accuracy cannot be guaranteed
in biometric technology, and combined with the likelihood of fingerprints
(the primary mode of authentication) wearing out or changing with age, or
being impacted by accidents, there is a possibility of failure in authentication
ultimately leading to exclusion. Even where the projected accuracy of biometric
authentication technology is 99.76%,161 that amounts to about 27.60 lakh
individuals excluded in India. Several studies were referred to by the petitioners,
to highlight the real-life incidents of exclusion in India by the use of Aadhaar.
The court recognised that such incidents could occur during the
implementation of Aadhaar, which is a “work in progress”,162 but refused to
acknowledge the studies highlighted claiming they were “disputed questions
of fact” whose credence could not be tested.163 It held that the larger goal of the
project was to ensure that the fruits of welfare schemes reached its deserving
beneficiaries; thus when it was benefitting millions of Indians, it cannot be
invalidated on the mere possibility of the exclusion of some.164 In their assessment
allowing the exclusion of 99.76% of the population by reverting to a pre- Aadhaar
stage is considerably worse than allowing 0.232% to be excluded with Aadhaar.
This was based on evidence by the Respondents that prior to linking the Aadhaar
scheme with public distribution services, widespread identity frauds pervaded
the system and prevented deserving beneficiaries from accessing public services.
Incidentally, while relying heavily on this evidence, the court refused to hear
evidence from the Petitioners on the current exclusionary impact of making
Aadhaar mandatory.
158 Nubian Rights Foundation & Ors. v. Attorney General of Kenya & Ors. [2020] eKLR (Kenya), ¶ 1012.
159 Section 7, Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services)
Act, 2016.
160 Justice K.S. Puttuswamy (Retd.) v. Union of India, 1 SCC 1 (2019), ¶ 314.
161 As was claimed by the UIDAI in the proceedings of the case.
162 Justice K.S. Puttuswamy (Retd.) v. Union of India, 1 SCC 1 (2019), ¶ 316.
163 Justice K.S. Puttuswamy (Retd.) v. Union of India, 1 SCC 1 (2019), ¶ 317
164 Justice K.S. Puttuswamy (Retd.) v. Union of India, 1 SCC 1 (2019), ¶ 318.
Judicial Trends: How Courts Look at Digital ID Programs 38
The court noted that these exclusions could be remedied, and that the
government is making sincere efforts to that end.165 Relying on a circular issued
by the UIDAI that allowed individuals to establish their identity by other means
in case of authentication failures, the court held that suitable provisions for
allowing alternate means of authentication should be included into the governing
regulations.166 The court also held that the terms “benefits” and “services” in
Section 7 can only be those that resemble subsidies and welfare schemes, and
cannot include other aspects of entitlements, education, etc.167
It is notable that the court did not hinge the constitutionality of Section 7 on
the inclusion of alternate means of identification; it merely stated that “it would
be appropriate if a suitable provision be made...” and took “on record” the statement of
the Attorney General that deserving persons would not be denied benefits due to
failure of authentication.168
165 Justice K.S. Puttuswamy (Retd.) v. Union of India, 1 SCC 1 (2019), ¶ 318.
166 Justice K.S. Puttuswamy (Retd.) v. Union of India, 1 SCC 1 (2019), ¶ 319.
167 Justice K.S. Puttuswamy (Retd.) v. Union of India, 1 SCC 1 (2019), ¶ 322.
168 Justice K.S. Puttuswamy (Retd.) v. Union of India, 1 SCC 1 (2019), ¶¶ 447(l)(i)-(ii).
Judicial Trends: How Courts Look at Digital ID Programs 39
Section V.
The Purpose of a
Digital ID Program
A key focus of discussions surrounding Digital ID programs are its intended
purpose — in the absence of a stated and specific purpose, the ID program
serves simply as a central registry that can be used for verifying the identity
of individuals. This is dangerous for many reasons, not least because there is
no delineated scope of use in such a case, and can be leveraged by actors for
purposes not intended or foreseen by those subject to it.
In India, this issue came into the limelight when the Income Tax Act was
amended to mandate the linking of individuals’ Aadhaar number with their
income tax returns (and their Permanent Account Number). The Aadhaar ID was
intended simply as a means to access subsidies and benefits (evinced by the long
title of the Act itself), and therefore allowing this additional use was challenged
before this court in two cases.169 An additional concern is the manner in which
this use was brought about: the Aadhaar Act was not amended to reflect this
change, but an entirely different legislation was modified to use the Aadhaar ID.
This effectively eliminates any purpose limitation instituted in the Aadhaar Act
itself. Notably, while the Aadhaar Act (and the judgment) make possession of
Aadhaar ID voluntary — except to avail benefits/services under Section 7 — the
169 Justice K.S. Puttuswamy (Retd.) v. Union of India, 1 SCC 1 (2019); Binoy Viswam v. Union of India,
7 SCC 59 (2017).
Judicial Trends: How Courts Look at Digital ID Programs 40
Income Tax Act amendment makes it mandatory for all tax paying citizens.
This court held similarly in both cases. They found that there was no
conflict between the Aadhaar Act and the amended Income Tax Act as “when
interpreted harmoniously, they operate in distinct fields.” 170 The majority measured
the amendment for its violation of individuals’ fundamental rights using the
proportionality test,171 and on finding that protection of the interests of revenue
was a legitimate interest of the State, held that the seeding of Aadhaar numbers
to ensure deduplication and eliminate fraud passed the proportionality test.
On the issue of the IT Act making mandatory what the Aadhaar Act didn’t, the
court held that since this was not a case of a parent legislation and subsidiary
legislation, the court will not question “the prerogative of the Parliament in making
a provision directory in one statute and mandatory in another.” 172 This is contrary to J.
Chadrachud’s dissent, where he recognised that the Aadhaar Act, by establishing
the Aadhaar system, functions as a parent legislation to any other legislation that
were to leverage the Aadhaar system.173 As a result, therefore, of the majority’s
opinion, the governance established by the Aadhaar Act is diluted, as it has
limited efficacy on uses of the Aadhaar system endorsed by any other law in
India. To put into perspective, this means that the entire process of obtaining
an Aadhaar ID, along with the risks involved in storing it, and the privacy harms
arising from allowing disclosures and third party access, can be made mandatory
for a purpose not even envisioned by the Aadhaar Act.
In Kenya, the issue of a purpose limitation to the ID project was brought up
in court, during the assessment of whether information taken under the ID law
was “necessary” for its stated purpose. It was argued that the project itself was
“purpose free,” and therefore it could not be shown the extraction of biometrics
was necessary for the goal of the project.174 The court, on assessing provisions
of the NIIMS Act, held that NIIMS is primarily an identification and verification
system. Its purpose is to create a national population register, assign unique IDs,
and verify and authenticate identities of persons.175 For this, it is necessary to
have a database with biometric data, for comparison.176 In this way, the court held
that the purpose of NIIMS, of creating an identification system that would serve as
177 Nubian Rights Foundation & Ors. v. Attorney General of Kenya & Ors. [2020] eKLR (Kenya), ¶ 790.
178 Nubian Rights Foundation & Ors. v. Attorney General of Kenya & Ors. [2020] eKLR (Kenya), ¶ 411.
179 Julian J. Robinson v. The Attorney General of Jamaica, [2019] JMFC Full 04, ¶ 29.
180 Section 41, National Identification and Registration Act, 2017.
181 Julian J. Robinson v. The Attorney General of Jamaica, [2019] JMFC Full 04, ¶ 309.
182 Julian J. Robinson v. The Attorney General of Jamaica, [2019] JMFC Full 04, ¶ 309.
183 Julian J. Robinson v. The Attorney General of Jamaica, [2019] JMFC Full 04, ¶ 335.
184 Julian J. Robinson v. The Attorney General of Jamaica, [2019] JMFC Full 04, ¶ 355.
Judicial Trends: How Courts Look at Digital ID Programs 42
was not tailored to the ID project itself. Thus, the project did not come with
an intended use or purpose, but was simply to function as an identity card for
any situation that may require a verification of identity. The court analysed the
intention of the Act as that of “establishing a sound and secure identity protection
system” to protect against identity fraud, and held it to constitute a
legitimate purpose.185
While nearly equal concern was assigned to the first and last points, all the
instances of shutting down or temporarily stalling the project was because of the
inadequate legal framework. Thus, the collection of vast amounts of information
from citizens was not considered to pose sufficient threat to users’ constitutional
rights. In the court’s consideration, the existence of an intrusive and integrated
Digital ID system, that potentially impacted the power States had over its citizens,
was not unconstitutional so long as there was a legal framework that sufficiently
controlled this power. More concerning was possibly the dismissal of the threat
caused by the recording of authentication logs, facilitating the creation of a
surveillance State. Although a major concern in the Aadhaar case in India, it was
merely identified by the court in Jamaica — without forming a substantial part
of its order — and was entirely ignored in Kenya and Mauritius. Even the aspect
of consent in the collection of data was treated differently by different courts: in
India, Jamaica, and Mauritius, it was only the mandatory parting with personal
information that was considered for its privacy implications. In Kenya, the court
acknowledged that persons were not being coerced to part with their personal
information, and assessed the privacy impacts of collection of this data on other
grounds. Perhaps in the case of Jamaica and Mauritius the courts had no reason
to assess the impact of collection of data with consent, but in India, where most
of the uses of Aadhaar were voluntary, the court had the opportunity to assess
privacy implications of the collection of such data even with consent. However,
they restricted their assessment to sections 7 and 8 of the Aadhaar Act, which
made the possession of Aadhaar mandatory.
of National ID Schemes
The potential of national ID schemes to exclude entitled users from accessing
services and benefits was a key concern in the pushback against their
implementation. However, engagement on this issue by the courts was dismal;
in Jamaica and Mauritius, the petitioners failed to sufficiently challenge this
aspect in their case; in Kenya and India, although it formed a substantial part
of the claims, the courts reposed trust in the government to protect users from
exclusion, without requiring any actions or halting the project on the contingency
of the fulfilment of the government’s guarantee. In India, where the use of
Aadhaar for accessing important government services is already in play, it was
a particularly dangerous outcome. The court also arrived at its decision in a
questionable manner; it pit an individual’s right to privacy against their right to
food, which it assumed was only obtainable by having the Aadhaar identification
system be linked with public distribution schemes. By doing this, it was able to
hold that the absence of the Aadhaar scheme would have a far wider exclusionary
effect than any similar impact the presence of Aadhaar would. This is curious, as
the contention in question was not merely the existence of the Aadhaar scheme,
but the act of making Aadhaar authentication mandatory to access public
services. The court failed to show why it would need to be mandatory, when it was
a question of an individual’s right to food versus their right to privacy, as ideally
the individual must be permitted to choose what they would prioritise (if it was a
trade-off at all).
taxpayer money had already been consumed.186 Thus, the best route it found was
to mitigate damage caused by the project, by reading down or nullifying some of
its more treacherous features. This was not a factor that other courts had to take
into consideration, since the national ID projects in those jurisdictions were still
in its infancy, with minimal damage done and money spent, and few users. Thus,
the stage of implementation of the project has played a crucial role in ultimately
determining its validity.
186 Justice K.S. Puttuswamy (Retd.) v. Union of India, 1 SCC 1 (2019), 44, 296 ¶ 220; 387 ¶ 319.
187 “Take me as I am – subject to Aadhaar-Based Biometric Authentication: An Overview of the
Aadhaar Judgement”, Indian Constitutional Law and Philosophy (blog post), last accessed June
9, 2020, https://indconlawphil.wordpress.com/2018/09/26/take-me-as-i-am-subject-to-aadhaar-based-
biometric-authentication-an-overview-of-the-aadhaar-judgment/.
Judicial Trends: How Courts Look at Digital ID Programs 46
190 Justice K.S. Puttuswamy (Retd.) v. Union of India, 1 SCC 1 (2019), ¶¶ 193-196 (Bhushan, J.).
191 Madhewoo M v. The State of Mauritius, 2015 SCJ 177. The Privy Council of Mauritius, on appeal
from the Supreme Court, held that the taking of biometric data from the petitioner does not in itself
lead to a presumption of criminality, even though it might be used in a criminal investigation. J.
Bhushan relied on this point while holding that an apprehension of insecurity of data stored in the
CIDR is not grounds for unconstitutionality.
Judicial Trends: How Courts Look at Digital ID Programs 48
Appendix A.
Comparison Chart
NAME OF PROJECT Aadhaar National Identification and Registration NIIMS or Huduma Namba National Identity Card,
Act, or NIRA or NID
LEGISLATION BEING Aadhaar (Targeted delivery of National Identification and Statute Law (Miscellaneous National Identity Card (Miscellaneous
CHALLENGED & KEY FEATURES Financial and other subsidies, benefits, Registration Act. Amendment) Act No. 18 of 2018. Provisions) Act of 2013.
and services) Act, 2016 and other
It assigns a unique National It amends the Registration of Persons This Act amends the National Identity
allied regulations; Section 139AA,
Identification Number (NIN) and a Act to establish a national Integrated Card Act 1985, which issues to citizens
Income Tax Act 1961; Prevention of
National Identification Card (NIC) to Identity Management System (NIIMS). a national ID, to mandate all citizens of
Money Laundering (Maintenance of
every enrolee. The uses of the ID are not NIIMS was to be a single source of Mauritius to register for a new biometric
Records) Rules, 2005.
yet fully specified. personal information, with each identity card. All the information
These Acts cumulatively assign unique individual being assigned a unique collected under this scheme will be kept
identity numbers to residents, mandate number and information being in a central register by the Registrar of
the authentication of this number to collected/ incorporated from other Civil Status.
receive certain government services, government agency databases.
and require them to be linked to other
IDs and bank accounts to prevent tax
fraud and money laundering.
STATUS (AS OF MAY 2020) Nearly 90% of the population of India NIRA was enacted in December 2017, The Act became operative on 18th The NID Act was passed in July 2013,
has been enrolled,1 an authentication but is yet to be operational. January 2019. Enrolments have and its implementation began in October
mechanism is in play, and Aadhaar is begun, but uses of the ID have not been 2013. It was less than 2 years old when
currently being used for a variety formally determined. Post the 2020 the Court passed this order stalling
of cases. judgment, the project has been stalled the program.
until a data protection framework had
been properly actualized.
1 198 “State/UT wise Aadhaar Saturation”, Unique Identification Authority of India, last accessed June 9, 2020, https://uidai.gov.in/images/state-wise-aadhaar-saturation.pdf.
Judicial Trends: How Courts Look at Digital ID Programs 50
APPLICABLE TO All residents of India All citizens of Jamaica and individuals All Kenyan citizens and registered All adult citizens of Mauritius
ordinarily resident in Jamaica foreigners resident in Kenya
MANDATORY/VOLUNTARY Section 7 and 8 of the Act make Aadhaar Section 20 of the Act mandates every Currently, the Huduma Namba is The NIC Act allows any person (under
authentication mandatory for access registerable individual to enrol, and has not mandatory for access to any reasonable circumstances or when
to certain schemes/ benefits. It is also made it a punishable criminal offence to government services, but the Huduma authorized by law) to require the
mandatory for tax payers to link their fail to enrol. Bill 2019 (only a draft, yet to be passed) authentication of a citizen by their
Aadhaar ID to their Permanent Account envisions mandating it to access all biometric ID. It also mandates all adult
Number (that is used to identify persons public services citizens to replace their earlier identity
paying income tax) card with this one (and thus, there is a
legal obligation to posses this card).
INFORMATION COLLECTED Demographic information, including Biographic information including Demographic information Biometric Biometric information including all
name, date of birth, gender, name, date of birth, place of birth, information (including fingerprints, 10 fingerprints and photograph, and
residential address, and biometric names of parents, gender, height, Hand geometry, earlobe geometry, demographic information including
data including facial image, all 10 place of residence, nationality, retina and iris patterns, voice waves name and sex.
fingerprints, scans of both irises. period of residence in Jamaica and DNA), GPS coordinates.
(if not citizen), marital status and
Mobile number and email address
name of spouse, date and place of
are collected at option of the
marriage, Date of divorce. Enrolees
applicant.
can also share data about their
employment status, their race,
religion, education, occupation,
mobile number, etc on a
voluntary basis.
Biometric information including
photograph, fingerprint, eye colour,
manual signature (for non- minors).
Optional biometric information
includes retina/ iris scan, vein
patters, footprint, etc.
The database will also include
various reference numbers of the
enrolee, including their passport
number, driver’s license number,
taxpayer registration number,
electoral identification number etc.,
as well as the registration history of
the enrolee.
Judicial Trends: How Courts Look at Digital ID Programs 51
TIMELINE OF LITIGATION The petition contesting Aadhaar was The case began in early 2018 and A petition was filed in February Implementation of the project began
originally filed in 2012, the case was the final judgment was delivered 2019, and the court issued an in October 2013. The Supreme
decided in September 2018. in 2019. interim order in April 2019 Court of Mauritius decided the
allowing registration for the ID to case in 2015, and the Privy Council
continue (until the case is finally of Mauritius upheld the court’s
settled) provided it was not made judgment in appeal in 2016.
mandatory, access to services did
not depend on enrolment, DNA and
GPS data would not be collected,
data would not be shared with
third parties, and there was no
deadline for enrolment. The High
Court passed its final judgment in
February of 2020.
COURT Supreme Court of India Supreme Court of Judicature High Court of Nairobi Supreme Court of Mauritius
of Jamaica