Here’s How to Verify If Someone Else Is Using Your Aadhaar-Linked Mobile Number

Published:

spot_img

The Department of Telecommunications (DoT) has launched a new website called Sanchar Saathi portal, which allows users to check all the mobile phone numbers associated with their Aadhaar number. The Telecom Analytics for Fraud Management and Consumer Protection (TAFCOP) portal is a part of this initiative, and it enables users to track the number of mobile connections linked to their Aadhaar number.

The TAFCOP portal offers a simple process for users to verify the phone numbers associated with their Aadhaar number. Users can visit the TAF-COP portal and enter their phone number. After selecting the ‘Request OTP’ tab, users will receive an OTP to validate the information. Once the OTP is entered, the website will display all the numbers associated with the Aadhaar number. Users can then report and block any numbers that are not in use or are no longer required.

According to DoT guidelines, individual mobile subscribers are allowed to register up to nine mobile connections in their name. If a subscriber has more than nine connections, they will receive an SMS notification and can take action through the TAFCOP portal.

This new initiative aims to provide users with greater control over their mobile connections and protect them from potential fraud or misuse of their documents. By utilizing the TAFCOP portal, subscribers can ensure that all the mobile connections linked to their Aadhaar number are legitimate and take necessary action to safeguard their information.

spot_img

Related articles

Recent articles

Microsoft Strengthens Security with Patches for SharePoint Zero-Day and 168 Additional Vulnerabilities

Microsoft Strengthens Security with Patches for SharePoint Zero-Day and 168 Additional Vulnerabilities On Tuesday, Microsoft announced a significant update aimed at addressing a record 169...

Ivanti Neurons ITSM Vulnerabilities Expose Session Persistence Risks

Ivanti Neurons ITSM Vulnerabilities Expose Session Persistence Risks A recently disclosed set of vulnerabilities in Ivanti Neurons for IT Service Management (ITSM) has raised significant...

Effective Data Protection: Vendor Support Strengthens Cybersecurity Implementation Success

Effective Data Protection: Vendor Support Strengthens cybersecurity Implementation Success In the rapidly evolving landscape of cybersecurity, organizations often find themselves grappling with the effective implementation...

South Africa’s AI Future Depends on Strengthening Network Foundations

South Africa's AI Future Depends on Strengthening Network Foundations As South African organizations increasingly adopt artificial intelligence (AI), the urgency to strengthen digital infrastructure has...