Govt authorises 10 central agencies to monitor, decrypt ‘any’ computer system

  • The Union Home Ministry on December 20, 2018 through its order, has authorised ten central agencies to intercept, monitor and decrypt the data contained in any computer system and asserted that this was being done to prevent any unauthorised use of these powers.
  • In a statement, Home Ministry said its order in this regard does not confer any new powers to any security or law enforcement agency.
  • The Ministry said the new order is to ensure that any interception, monitoring or decryption of any information through any computer resource is done as per the law.
  • It said the order will also ensure that provisions of law relating to lawful interception or monitoring of computer resource are followed and if any interception, monitoring or decryption is required for purposes.
  • The agencies are the Intelligence Bureau, Narcotics Control Bureau, Enforcement Directorate, Central Board of Direct Taxes, Directorate of Revenue Intelligence, Central Bureau of Investigation; National Investigation Agency, Cabinet Secretariat (R&AW), Directorate of Signal Intelligence (For service areas of Jammu & Kashmir, North-East and Assam only) and Commissioner of Police, Delhi.
  • As per the Union Home Ministry, Rule 4 of the IT (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules 2009 provides that ‘the competent authority may authorise an agency of the Government to intercept, monitor or decrypt information generated, transmitted, received or stored in any computer resource for the purpose specified in sub-section (1) of Section 69 of the Act’. The Statutory order (S.O.) dated 20.12.2018 has been issued in accordance with rules framed in year 2009 and in vogue since then.
  • Each case of interception, monitoring, decryption is to be approved by the competent authority i.e. Union Home secretary. These powers are also available to the competent authority in the State governments as per IT (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules 2009.

Written by 

Leave a Reply

Your email address will not be published. Required fields are marked *