Centre Proposes Mandatory Source Code Access for Smartphones as Security Measure

Context:
The Union Government is considering new security norms under the proposed Indian Telecom Security Assurance Requirements (ITSAR) framework, mandating smartphone manufacturers to provide source code access for vulnerability testing, triggering concerns among global tech companies.

Key Highlights:

  • Proposed Security Measures
  • Mandatory compliance with 83 security standards.
  • Requirement for:
    • Source code submission for vulnerability analysis.
    • Malware scanning of devices.
    • Alerts before major software updates.
  • Testing of software updates and security patches by the National Centre for Communication Security (NCCS) before release.
  • Data & User Protection Provisions
  • Storage of phone activity records for one year.
  • Mandatory option for users to uninstall pre-installed apps (bloatware).
  • Aim: Strengthen protection in a market of nearly 750 million smartphone users.
  • Industry Concerns
  • Tech giants (e.g., Apple, Samsung) oppose:
    • Sharing of proprietary source code.
    • Potential exposure of trade secrets.
  • Manufacturers’ Association for Information Technology (MAIT) urged withdrawal.
  • Concerns over:
    • Privacy risks.
    • Lack of global precedent.
    • Practical implementation challenges.
  • Earlier controversy over mandatory Sanchar Saathi app, later revoked due to surveillance concerns.

Relevant Prelims Points:

  • Source Code:
    • Human-readable programming instructions of software.
  • Vulnerability Analysis:
    • Process of identifying system weaknesses exploitable by attackers.
  • Malware:
    • Malicious software (virus, spyware, ransomware).
  • National Centre for Communication Security (NCCS):
    • Under Department of Telecommunications (DoT).
    • Responsible for telecom equipment security testing.
  • India is the second-largest smartphone market globally.

Relevant Mains Points:

GS 3 – Science & Technology

  • Cybersecurity framework for digital infrastructure.
  • Need for:
    • Secure software supply chains.
    • Indigenous testing capabilities.
  • Risk of innovation deterrence if compliance burdens are excessive.

GS 3 – Internal Security

  • Rising digital fraud and cyber threats necessitate stronger safeguards.
  • Smartphones as critical nodes in:
    • Financial transactions (UPI).
    • E-governance services.
  • Balancing national security with economic openness.

GS 2 – Governance

  • Data protection vs state surveillance debate.
  • Regulatory overreach vs legitimate security concerns.
  • Need for transparent rule-making and stakeholder consultation.
  • Alignment with Digital Personal Data Protection Act, 2023 principles.

Way Forward

  • Develop secure “black box” testing models to protect proprietary code.
  • Establish independent, transparent audit mechanisms.
  • Harmonize standards with global cybersecurity frameworks.
  • Strengthen domestic cyber labs without compromising privacy.
  • Ensure proportionality and minimal data retention requirements.

UPSC Relevance:
Cybersecurity regulation, Data governance, National security vs privacy debate, Digital economy regulation, Technology policy and state oversight.

« Prev May 2026 Next »
SunMonTueWedThuFriSat
12
3456789
10111213141516
17181920212223
24252627282930
31