In the aftermath of the Mahua Moitra controversy, wherein the Trinamool Congress (TMC) lawmaker shared her login details, leading to unauthorized posts on the Digital Sansad portal, the Lok Sabha secretariat has introduced significant protocol changes.
Previously, personal assistants (PAs) of lawmakers had access to a tab named “E-Notice” for filing legislative documents. This included parliament questions, requests for discussions, draft bills, and more. However, the protocol now restricts PAs to saving notices as drafts, necessitating lawmakers to submit and file them directly.
The Times of India first reported these alterations, highlighting the adjustment to OTP (one-time password) procedures. PAs and staff, who previously could post notices on the Digital Sansad portal, now find this option blocked on their accounts. Only lawmakers can post notices, and OTPs for filing are sent directly to their mobile numbers.
Further modifications involve the disappearance of the “Messages” tab from PAs’ Sansad Portal accounts. Previously synced with lawmakers’ Sansad email addresses, this tab no longer requires OTP authentication. PAs and staff can still access OTPs sent to lawmakers’ mobile numbers and registered email addresses, including non-governmental addresses.
To access the Sansad email address, MPs now use Kavach, an authenticator app similar to Google Authenticator. The new protocol aims to enhance security by introducing an additional layer of oversight, requiring lawmakers to validate actions with an OTP.
Despite these changes, concerns linger about the potential for MPs to share OTPs or delegate responsibilities to staff. Delegation, however, remains crucial due to MPs’ time constraints, as acknowledged by sources.
The revised protocol aligns with a bulletin released on November 10 by Lok Sabha Secretary General Utpal Kumar Singh, emphasizing the confidentiality of replies to questions during the Question Hour.
As the controversy unfolds, these measures aim to secure the integrity of Digital Sansad access while addressing potential vulnerabilities highlighted by the Moitra case.