Sunday, May 09, 2010

India - Department of Telecommunication formulating security policy including the bans on importing Chinese equipment

[dna] The Department of Telecommunications (DoT) is gearing up for a security and network policy for the next 5 years, it is learnt.

A roadmap for the policy is expected to be ready by December, according to a proposal of the telecom enforcement, resource & monitoring (TERM) division of DoT.

Telecom network security is of paramount significance for the government, and the 'ban’ imposed on use of Chinese equipment by service providers only highlights that point. Indian government recently raised national security concerns over use of Chinese telecom equipment and networks.

Following that, Chinese telecom major Huawei has sought appointments with top government officials in the Prime Minister’s Office, National Security Council, Ministry of Home Affairs and DoT to try and resolve the security issue.

As private telecom and internet services grew in the country, there was an increase in illegal telecom operations too. That is when the government created four vigilance telecom monitoring (VTM) cells in 2004, and the number of such cells rose to 34 by 2007. In 2008, VTM cells were renamed as the TERM cells.

TERM is focused on vigilance, monitoring and security functions. Vigilance includes inspection of telcos’ premises, checking illegal activities of telecom networks, analysis of call and traffic data of licencees and technical arrangement for the lawful interception of communication on licensee’s network.

Monitoring functions of the Telecom Enforcement cells includes coordination with various network operators, scrutiny of compliance with licence conditions, disaster management of networks in times of natural calamities and other emergency situations and customer document verification before providing connections.

Security function of TERM is mainly to ensure technical interface between security agencies and telecom service providers.

Department of Telecommunication formulating security policy

No comments: