India is introducing new smartphone security measures that could make tech giants like Apple and Samsung uneasy. The government proposes that phone makers should share their source code and implement various software changes to enhance user data protection. This plan comes at a time when online fraud and data breaches are rising in India’s vast market, which boasts nearly 750 million smartphones.
According to IT Secretary S. Krishnan, the government is open to addressing industry concerns. However, the specifics of these 83 security standards have raised eyebrows. Companies argue that no other country has been asked to share source code in such a manner, making this a unique and controversial request.
These measures are part of Prime Minister Narendra Modi’s broader push for better security standards. A ministry spokesperson emphasized that discussions are ongoing to create a supportive regulatory framework. Yet, tech firms worry about protecting their proprietary information. Apple, for instance, previously declined requests from China for similar access to its source code.
Data from Counterpoint Research shows that Xiaomi holds a 19% share of India’s smartphone market, while Samsung has around 15%, and Apple trails with about 5%. The Indian government has already faced pushback from tech companies over security requirements in the past, such as when it rescinded an order for a state-operated cyber safety app due to privacy concerns.
One of the most contentious proposals is the call for access to the source code, which companies believe could expose sensitive information. Major players in the industry, like MAIT—a group representing tech firms—have raised concerns, stating that rigorous, government-mandated security protocols might not be feasible and could drain device resources.
The conversations around these security proposals are set to continue as both parties seek common ground. In an evolving digital landscape full of potential breaches, navigating the balance between security and privacy remains a pressing challenge.
For more on global technology policy and data security trends, you can check this report.
Source link
NRLPA:ODAT,RSBI:POLITICAL-LOBBYING,MTPIX,EREP,ANLINS,BACT,BIZ,CIV,CLJ,CMPNY,CPROD,CRIM,DIP,DLI,EXCLSV,FRAUD1,GEN,HACK,LOBBY,NETSV,NEWS1,POL,PUBL,REGS,SOCI,SRCHEN,SWIT,TECH,TMT,WWW,SASIA,EASIA,KR,AMERS,IN,US,NAMER,ASXPAC,EMRG,CN,ASIA,DEST:CSA,DEST:LBY,DEST:REULB,DEST:ABX,DEST:G,DEST:RAST,DEST:J,DEST:Z,DEST:E,DEST:ABN,DEST:AFA,DEST:BNX,DEST:PSC,DEST:SNS,DEST:U,DEST:FUN,DEST:UCDPTEST,DEST:RWSA,DEST:GNS,DEST:RWS,DEST:RBN,SUSTAINABLE-BUSINESS,DEST:NOINBSM,DEST:NOINTIM,DEST:OUSTCM,DEST:OUSBSM,TOPNWS,TOPCMB,LEGAL,REUTERS-LEGAL,DEST:LITA,DEST:ODAT

