Você está na página 1de 6

Project Management –

Contingency Plan
SUBMITTED BY – GROUP A5
NAME – NIPUN JAIN
TEJAVARDHAN
SAJAL GUPTA
ROMIL JAIN
ANURAG BAJPAI
Plan – B ( Contingency Plan )

 Contingency plans are alternative courses of action prepared before the


risk event occurs. The most common contingency plan is to set aside extra
money, a contingency fund, to draw on in the event of unforeseen cost
overruns
 Risk-Response plan or schedule
Aadhaar Card Project Challenges

 Legal Concerns - The Aadhaar Bill has been passed with no public
consultation about the privacy safeguards necessary for such a database
and no provision for public or independent oversight. The rights to liberty
and freedom of expression cannot survive if the right to privacy is
compromised
 Surveillance - What technology has broken cannot be fixed by the law.
Aadhaar is a broken technology; it is surveillance technology disguised as
developmental intervention that identifies people without their consent
and authenticates transactions on their behalf.”
Lack in Contingency Plan – Aadhaar
Project

 Budget Contingency - Due to the Legal concerns, Surveillance - Aadhaar


is a broken technology; (it is surveillance technology disguised as
developmental intervention that identifies people without their consent
and authenticates transactions on their behalf) has increased the budget
of the project and the government under consideration of these issues has
led to increase the annual budget of the project by the 23%, in year 2015.
According to the Budget document, the government has incurred an
expenditure Rs1617.73 crores as per the revised estimates for the current
fiscal
(Contd.)

 Technical Contingency - The Aadhaar data is also utilized for


authentication of citizens for services like passport application and cellular
mobile connections. Sometimes there might be an inaccurate biometrics
device carried by the service agent who is authenticating a citizen, this
should not hinder the process. This risk is handled by built-in multi-factor-
authentication. Multi-factor-authentication utilizes biometrics, PIN, OTP and
combinations to ensure security and unhindered services.
Thank You

Você também pode gostar