The Ministry of Health and Family Welfare has issued a press release declaring that the co-WIN portal of Health Ministry is Completely Safe with safeguards for Data Privacy. This press release was issued on 12th June, 2023 in the midst of media reports claiming breach of data of beneficiaries who have received COVID vaccination.

These reports allege breach of data from the Co-WIN portal of the Union health Ministry, which is repository of all data of beneficiaries who have been vaccinated against COVID19.

Certain posts on the social media platform Twitter have claimed using a Telegram (online messenger application) BOT, the personal data of individuals who have been vaccinated is being accessed. It is reported that the BOT has been able to pull individual data by simply passing the mobile number or Aadhaar number of a beneficiary.

The press release clarifies that all such reports are without any basis and mischievous in nature. It states that the co-WIN portal is completely safe with adequate safeguards for data privacy. Furthermore, security measures are in place on Co-WIN portal, with Web Application Firewall, Anti-DDoS, SSL/TLS, regular vulnerability assessment, Identity & Access Management etc. Only OTP authentication-based access of data is provided. All steps have been taken and are being taken to ensure security of the data in the CoWIN portal.

At present individual level vaccinated beneficiary data access is available at the following three levels:

Telegram BOT –

The development team of COWIN has confirmed that there are no public APIs where data can be pulled without an OTP. In addition to the above, there are some APIs which have been shared with third parties such as ICMR for sharing data. It is reported that one such API has a feature of sharing the data by calling using just a mobile number. However, even this API is very specific and the requests are only accepted from a trusted API which has been white-listed by the Co-WIN application.

Union Health Ministry has requested the Indian Computer Emergency Response Team (CERT-In) to look into this issue and submit a report. In addition, an internal exercise has been initiated to review the existing security measures of CoWIN.

CERT-In in its initial report has pointed out that backend database for Telegram bot was not directly accessing the APIs of CoWIN database.

Leave a Reply

Your email address will not be published. Required fields are marked *