The Sanchar Saathi portal is a government initiative by the Department of Telecommunications aimed at empowering mobile users, enhancing their security, and promoting awareness of citizen-focused programs offered by the Government.
The Department of Telecommunications (DoT) has created the Sanchar Saathi portal (www.sancharsaathi.gov.in) to empower citizens, which includes the Chakshu feature for reporting suspected fraudulent communications and Unsolicited Commercial Communications (UCC).
Based on the reports of suspected fraud communications, DoT acts on mobile connections, mobile handsets, bulk SMS senders, and WhatsApp accounts. UCC reports are sent to telecom operators to act as per Telecom Commercial Communications Customer’s Preference Regulations (TCCCPR-2018).
The Department of Telecommunications (DoT) and Telecom Service Providers (TSPs) have implemented a mechanism to detect and prevent spoofed international calls that display fake Indian numbers, effectively tackling scams such as false digital arrests and impersonations.
To address Unsolicited Commercial Communications (UCC), TRAI implements the TCCCPR-2018 framework, which enables subscribers to block or report spam via apps, SMS, or helplines. Breaches of these regulations result in the blacklisting of telemarketers, penalties for unregistered entities, disconnection of telecom services, and financial penalties for access providers that do not manage UCC effectively.
The Department of Telecommunications (DoT) announced the Telecom Cyber Security Rules, 2024, on November 21, 2024. These rules include stipulations stating that individuals must not compromise telecommunications cybersecurity, including but not limited to actions such as fraud, deception, or impersonation; sending fraudulent messages; or engaging in or planning any security breaches.
This information was provided by Dr. Pemmasani Chandra Sekhar, the Minister of State for Communications, in a written response to an inquiry in the Lok Sabha on December 4, 2024.
Sanchar Saathi empowers citizens by allowing them to view the mobile connections issued in their name, disconnect connections that they have not taken or do not require, block and trace stolen/lost mobile phones, and verify the authenticity of devices when purchasing a new or used mobile phone.
Disclaimer: This blog has been written exclusively for educational purposes. The securities mentioned are only examples and not recommendations. It is based on several secondary sources on the internet and is subject to changes. Please consult an expert before making related decisions.
We're Live on WhatsApp! Join our channel for market insights & updates