logo
logo
Sign in

What are the security conditions you have to follow to run ISPs in India?

avatar
Vicky Kumar
What are the security conditions you have to follow to run ISPs in India?

Internet services aren’t new in India. However, it’s for the first time that we have seen so much growth in the number of ISP consumers. That’s why, it’s necessary to follow the necessary security conditions if you want your ISP to be a long running business.

Through this article we are going to discuss the security conditions you need to follow to run ISPs in India?

Security conditions for those with ISP Licenses

All the following information about security conditions is given in the very document for ISP License. However, we have made it simpler for your understanding.

  1. The officers that oversee technical network operations and security of the company should be Indians.
  2. Only provide infrastructure details to telecom equipment suppliers and other necessary individuals, and that too on need to know basis.
  3. Remember that the domestic traffic of your subscribers will be monitored.
  4. Those with ISP License have to make sure that all information that their subscribers share with them is secure.
  5. In case you’re intercepting the messages of your subscribers, you should be from India.
  6. All the necessary officials in your ISP company including CEO, chairman, CFO have to be assessed by Ministry of Home ministry first.
  7. The ISP license holding company isn’t allowed to give out accounting details of the subscribers.
  8. The ISP license holding company isn’t allowed to give out accounting details of the subscribers.
  9. As one with the ISP registration, it’s your responsibility to provide a way to trace your subscribers.
  10. You should be able to provide the geographical location of your subscriber if the competent authorities ask you for it.
  11. You’re only allowed to have remote access on specific locations.
  12. You’re not allowed to give your telecom suppliers or other individuals access to lawful interception systems.
  13. You can’t use remote access to oversee the content of your subscribers.
  14. Maintain the audit trail of all the remote access activities.
  15. Ensure that you have necessary technology for conducting lawful interceptions and place that technology at a centralized location.
  16. Train the vigilance and security officers in taking heed to the various aspects of the system.
  17. To ensure maximum privacy for Voice and Data, only give access to monitor them to Union Home Ministry.
  18. If a security agency asks you the access of the traffic of your subscribers, provide them with the same.

Conclusion

To run a business as complex as providing internet access, you need to follow a specific set of rules. Following the security conditions make sure that you get to hold on to your internet business for a long time. Furthermore, it also makes sure that in an event of a data breach, the nation and the users are protected.

                                                 Other Related Articles

·         How to increase domain authority

·         IP1 License

·         How to add sitemap in blogger

·         SEO and SEM

·         Google Search Removal Tool

·         How to increase organic traffic

·         VNO License Cost

·         How to create backlinks

·         Adsense Alternatives For Low Traffic

·         Boost your ctr

collect
0
avatar
Vicky Kumar
guide
Zupyak is the world’s largest content marketing community, with over 400 000 members and 3 million articles. Explore and get your content discovered.
Read more