The Indian government has issued strict instructions to all messaging and calling apps, mandating that they implement SIM Binding technology within the next 90 days. Under this rule, an app will function only if the registered SIM is present in the phone. If the SIM is removed, the app must immediately shut down.
Why the Rule Was Introduced
The Department of Telecommunications (DoT) stated that foreign cybercriminals have been using inactive or old Indian mobile numbers to log into messaging apps. Since the SIM was not physically present in the phone during these logins:
The user’s location could not be tracked
Fraudsters could operate from outside India while appearing as Indian users
Detecting and investigating scams became difficult
The government believes that forcing apps to shut when the SIM is removed will close this loophole and make it easier to trace cybercriminals.
Changes Required for Apps
According to telecom authorities:
Apps must continuously verify whether the correct SIM is present in the device, not just during the initial installation.
If the SIM is removed, the app should automatically shut down.
Services like WhatsApp Web must auto-log out every six hours.
App companies must report to the government within 120 days confirming implementation.
Impact on Users
Most users will not experience significant changes. However:
Users running an app on a different device than the SIM may face issues
Those using old or inactive numbers may be unable to access their apps
Repeated SIM checks could require more frequent logins
Will It Stop Fraud?
Experts are divided:
Some argue that fraudsters already obtain SIMs using fake documents, so this rule may have limited impact
Others believe linking each app account to an active SIM will make tracing easier and strengthen security
India already uses video KYC and AI verification, but SIM Binding is expected to add another layer of protection.
The Takeaway
The government aims to ensure that every messaging app account is linked to an active SIM, allowing authorities to trace the user and location if needed. Supporters say the rule is crucial for cybersecurity, while critics warn it may cause inconvenience for regular users.