Ahmedabad
(Head Office)Address : 506, 3rd EYE THREE (III), Opp. Induben Khakhrawala, Girish Cold Drink Cross Road, CG Road, Navrangpura, Ahmedabad, 380009.
Mobile : 8469231587 / 9586028957
Telephone : 079-40098991
E-mail: dics.upsc@gmail.com

• Structured Cybersecurity Initiative: The Unique Identification Authority of India (UIDAI) has officially launched its first structured Bug Bounty Programme. This proactive measure aims to enhance the security architecture of the Aadhaar ecosystem by inviting external experts to identify and report potential technical vulnerabilities. • Engagement of Ethical Hackers: A high-level panel consisting of 20 experienced security researchers and ethical hackers has been curated for this initiative. These \'white-hat\' hackers are tasked with probing key digital assets, including the UIDAI official website, the myAadhaar portal, and the Secure QR Code application. • Risk-Based Reward Mechanism: Vulnerabilities discovered by researchers are classified into four tiers—Critical, High, Medium, and Low risk. Monetary rewards and professional recognition are granted based on the severity and potential impact of the reported gap, aligning India\'s security protocols with global tech standards. • Strategic Partnerships: The programme is being implemented in collaboration with M/s ComOlho IT Private Limited, a specialized cybersecurity solution provider. This partnership ensures a structured framework for \'Responsible Disclosure,\' preventing the misuse of discovered flaws. • Layered Defense Strategy: The Bug Bounty Programme functions as an additional tier in UIDAI’s \'Defense in Depth\' strategy, supplementing existing measures such as regular security audits, continuous monitoring, and penetration testing (VAPT). • Focus on Data Integrity: By stress-testing the world’s largest digital identity platform (covering over 1.3 billion residents), the initiative serves to safeguard sensitive biometric and demographic data against evolving cyber threats and identity fraud. Key Definitions and Cybersecurity Concepts • Bug Bounty Programme: A crowdsourcing initiative where an organization rewards individuals for finding and reporting software bugs or vulnerabilities before they can be exploited by malicious actors. • Ethical Hacker (White-Hat): A cybersecurity professional who uses their skills to find vulnerabilities in a system with the owner\'s permission, with the goal of improving security rather than causing harm. • Responsible Disclosure: A vulnerability disclosure model where a researcher reports a flaw to the organization and gives them a reasonable period to patch it before making the information public. • Vulnerability Assessment and Penetration Testing (VAPT): A comprehensive security testing process that identifies vulnerabilities in an IT environment (Assessment) and attempts to exploit them to test the effectiveness of defenses (Penetration). Constitutional and Legal Provisions • Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Act, 2016: The primary legislation governing the Aadhaar ecosystem. Section 28 specifically mandates UIDAI to ensure the security of identity information and authentication records. • Article 21 (Right to Privacy): Following the K.S. Puttaswamy v. Union of India (2017) judgment, the \'Right to Privacy\' is a fundamental right. Protecting Aadhaar data is a direct constitutional obligation of the state to ensure the privacy of its citizens. • Digital Personal Data Protection (DPDP) Act, 2023: This Act provides a comprehensive framework for the processing of digital personal data, emphasizing the \'Data Fiduciary\' (UIDAI in this case) responsibility to maintain high-fidelity security safeguards. • IT (Procedures and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009: Under the IT Act, 2000, these rules provide the legal basis for maintaining the security and integrity of critical digital infrastructure. Conclusion The launch of the Bug Bounty Programme signifies a strategic shift from a \'closed-door\' security model to a collaborative, community-supported defense mechanism. As Aadhaar underpins India’s Digital Public Infrastructure (DPI), maintaining its integrity is not just a technical requirement but a prerequisite for national security and public trust. This move positions UIDAI as a global leader in adapting to the \'Zero-Trust\' security paradigm required in the modern digital age. UPSC Relevance • General Studies II: Important aspects of governance, transparency, and accountability; e-governance applications and models; Role of statutory bodies (UIDAI). • General Studies III: Challenges to internal security through communication networks; Role of media and social networking sites in security challenges; Basics of cybersecurity; Awareness in the fields of IT and Computers. • Prelims: Nodal Ministry for UIDAI (MeitY), Statutory status of Aadhaar, DPDP Act 2023 provisions, and major cybersecurity terms.

Address : 506, 3rd EYE THREE (III), Opp. Induben Khakhrawala, Girish Cold Drink Cross Road, CG Road, Navrangpura, Ahmedabad, 380009.
Mobile : 8469231587 / 9586028957
Telephone : 079-40098991
E-mail: dics.upsc@gmail.com
Address: A-306, The Landmark, Urjanagar-1, Opp. Spicy Street, Kudasan – Por Road, Kudasan, Gandhinagar – 382421
Mobile : 9723832444 / 9723932444
E-mail: dics.gnagar@gmail.com
Address: 2nd Floor, 9 Shivali Society, L&T Circle, opp. Ratri Bazar, Karelibaugh, Vadodara, 390018
Mobile : 9725692037 / 9725692054
E-mail: dics.vadodara@gmail.com
Address: 403, Raj Victoria, Opp. Pal Walkway, Near Galaxy Circle, Pal, Surat-394510
Mobile : 8401031583 / 8401031587
E-mail: dics.surat@gmail.com
Address: 303,305 K 158 Complex Above Magson, Sindhubhavan Road Ahmedabad-380059
Mobile : 9974751177 / 8469231587
E-mail: dicssbr@gmail.com
Address: 57/17, 2nd Floor, Old Rajinder Nagar Market, Bada Bazaar Marg, Delhi-60
Mobile : 9104830862 / 9104830865
E-mail: dics.newdelhi@gmail.com