Skip to main content
Telecom e-Services
Beta
DOT Mitra

The website will be audited by Cert-in impanelled auditor and all the vulnerabilities will be fixed before hosting in its data center. Upon completion, also get the security clearance certificate from the cert-in impanelled auditor.

a. Notice and Disclosures

DoT eServices Portal will not sell, trade, or disclose the personally identifiable information of its website users to any unauthorized third parties.

b. Data Quality and Access

DoT eServices Portal takes all steps possible to ensure that the data on the website is accurate. If something is found to be inaccurate DoT eServices Portal will make every effort to correct said information as quickly as possible. If it is found to be an inaccuracy with the entire system DoT eServices Portal will work swiftly to correct the problem so that your web experience is as trouble-free as possible. Any change to your user account will not be reflected on the website until the following business day. The information contained on the DoT eServices Portal website is subject to change without prior advance notice.

DoT eServices Portal uses cookies to enhance the website experience for its registered users. A cookie is a small file that is stored on the user’s hard drive. DoT eServices Portal uses this file to maintain certain information about the user as they move between pages. Upon closing your browser, the cookie becomes inactive and a new one will be created the next time you sign on to use one of the password-protected features on the DoT eServices Portal site. Most browsers are shipped to accept cookies, but this is a function that can be controlled by the user. However, many of the services offered on the website may not run optimally or at all without cookies enabled.

While using the DoT eServices Portal website certain information such as your IP Address and time spent on pages may be collected. This non-personal information is collected in order to monitor any unauthorized use or access to the DoT eServices Portal site. Anyone caught attempting to harm, steal information from, or otherwise damage the DoT eServices Portal website will be prosecuted to the full extent of the law.

c. Data Security and Back UP

DoT eServices Portal takes security very seriously and has therefore taken every precaution to secure our borrowers information. In order to secure the users information, DoT eServices Portal has implemented several security measures to prevent loss, theft, or misuse of any borrower data.

When borrowers use features on the DoT eServices Portal website that involves the transferring of personal information, DoT eServices Portal requires that a secure connection first be established using 128-bit Secure Socket Layer (SSL) technology. During a secure SSL session, data passed back and forth between the user's computer and DoT eServices Portal servers is secured through the use of public key cryptography. The user's computer exchanges key information with DoT eServices Portal computers to create a private conversation that only the user's computer and DoT eServices Portal systems may understand. The government regulates 128-bit encryption; it can only be used by citizens and permanent residents of the United States and Canada. To benefit from this security and to use many of the features on the DoT eServices Portal site you will need to download a 128-bit enabled browser from Google, Apple, Microsoft, Opera, Mozilla or another software company.

In addition to using 128-bit encryption in the browser, all user information like contact details, company CIN, PAN, TAN etc that are stored in DoT eServices Portal databases are encrypted.

Each time you enter a secure connection while using the DoT eServices Portal website your browser will notify you, unless the feature has been turned off. Please note that if you have left a secure connection all data sent to DoT eServices Portal is over an un-secure connection.

All data is located on secure servers that are continually monitored and maintained. All operating systems and applications are maintained at recommended patch levels for the highest level of operating system security possible. A full backup of all data automatically occurs on a nightly basis and a weekly data backup is stored off-site at a secure location.

d. Perimeter Defense

All servers are monitored around the clock for attempted network attacks. Industry-standard Intrusion Detection Systems (IDS Systems) are employed to ensure that any breach of the perimeter defense is detected and dealt with immediately.

Last updated on: