Vucense

India Bans Chinese CCTV Cameras From Today: Hikvision, Dahua, TP-Link Locked Out

Divya Prakash
AI Systems Architect & Founder Graduate in Computer Science | 12+ Years in Software Architecture | Full-Stack Development Lead | AI Infrastructure Specialist
Published
Reading Time 13 min read
Published: April 1, 2026
Updated: April 1, 2026
Recently Published Recently Updated
Verified by Editorial Team
CCTV security cameras on a building wall representing India's ban on Chinese surveillance cameras from Hikvision and Dahua effective April 1 2026
Article Roadmap

Key Takeaways

  • Effective today. India’s STQC certification mandate for internet-connected CCTV cameras came into force on April 1, 2026. Hikvision, Dahua, and TP-Link — the three largest Chinese surveillance brands — have been denied certification and cannot legally sell in India.
  • The mechanism is chipsets, not just brand names. MeitY requires manufacturers to declare the country of origin for the System-on-Chip (SoC) — the core processor. Any device with a Chinese-origin SoC is ineligible for certification, making compliance structurally impossible for Chinese brands without rebuilding their entire supply chain.
  • The market has already shifted. Indian brands now hold over 80% of the ₹15,000 crore surveillance market, up from roughly 65% a year ago. CP Plus alone controls approximately 50%.
  • 507 certified models available. The government has certified 507 CCTV models using Taiwanese and other non-Chinese chipsets that meet India’s IS 13252-1 cybersecurity standard.

What Happened Today

Starting April 1, 2026, it is illegal to sell any internet-connected CCTV camera in India without a mandatory STQC (Standardisation Testing and Quality Certification) security clearance issued by the Ministry of Electronics and Information Technology (MeitY).

This is not a sudden announcement — it is the end of a two-year transition period that began when India first introduced the certification framework in 2024. But the April 1 deadline is the enforcement date: from today, uncertified devices cannot be sold, manufactured, or imported.

The practical effect is a de facto ban on Hikvision, Dahua, and TP-Link — the three Chinese brands that together previously held approximately one-third of India’s surveillance camera market.

Direct Answer: Has India banned Chinese CCTV cameras? Yes. India effectively banned the sale of Hikvision, Dahua, and TP-Link internet-connected CCTV cameras from April 1, 2026, through new STQC certification rules implemented by MeitY (Ministry of Electronics and Information Technology). Manufacturers must now certify all internet-connected surveillance equipment against India’s IS 13252-1 cybersecurity standard and disclose the country of origin of critical components including the System-on-Chip (SoC). The government is refusing certification to any devices using Chinese-origin chipsets, which structurally excludes the major Chinese brands. Existing devices already in use are not confiscated — the rules apply to new sales only.


Why India Moved: The Security Case

The security concerns driving this ban are not theoretical. They are the same concerns that led the United States to add Hikvision and Dahua to its Federal Communications Commission (FCC) restricted list in 2022, and the United Kingdom to ban Chinese surveillance equipment from government buildings in 2022.

Backdoor access allegations. Security researchers and government agencies in multiple countries have documented hidden remote access capabilities in Hikvision and Dahua equipment. A 2021 IPVM investigation found that Hikvision cameras could be accessed by Hikvision’s servers regardless of the owner’s network configuration.

Data transmission to foreign servers. Multiple investigations found that Chinese CCTV cameras, even on isolated networks, continued transmitting data to servers in China — including motion detection logs, footage metadata, and in some cases compressed footage clips.

Deployment in sensitive locations. Chinese cameras had been installed in Indian defence facilities, government buildings, airports, and critical infrastructure — often procured at low cost through public tenders. The potential for intelligence gathering through these deployments became a national security concern.

The Galwan Valley context. India-China relations deteriorated sharply after the June 2020 Galwan Valley border clash. India subsequently banned hundreds of Chinese apps and began reviewing Chinese hardware in critical infrastructure. The CCTV certification framework is part of this broader digital sovereignty push.


The Certification Framework: How STQC Works

The STQC (Standardisation Testing and Quality Certification) scheme requires CCTV manufacturers to:

1. Declare SoC origin. Every manufacturer must disclose the country of origin of the System-on-Chip — the core processor that runs the camera’s firmware. Any Chinese-origin SoC triggers automatic rejection.

2. Security testing. Devices must be tested against India’s IS 13252-1 cybersecurity standard at government-accredited laboratories. Tests include:

  • Vulnerability scanning for known CVEs
  • Penetration testing for remote access pathways
  • Firmware analysis for obfuscated code or backdoors
  • Network traffic analysis to verify data transmission destinations

3. Firmware localisation. Firmware must not contain calls to foreign servers not explicitly authorised by the device owner. All default remote access capabilities must be disclosed and disableable.

Currently certified: 507 CCTV models have received STQC certification. These are predominantly from domestic Indian brands (CP Plus, Qubo, Prama, Matrix, Sparsh) and select Western manufacturers (Bosch, Honeywell, Axis).


Market Impact: Who Wins and Who Loses

Winners: Indian Domestic Manufacturers

The Indian surveillance market is estimated at ₹15,000 crore (~$1.8 billion / ~£1.4 billion) and growing rapidly, driven by urbanisation, smart city projects, and private security adoption.

CP Plus — Already controls approximately 50% of the market. Has been building supply chain independence from China since 2020, switching to Taiwanese chipsets (Ambarella, Novatek) and developing proprietary firmware. The April 1 ban effectively removes its largest competitor category.

Qubo (Hero Group) — Backed by the Hero MotoCorp conglomerate, Qubo has grown aggressively in the smart home camera segment. Already STQC-certified across its product range.

Prama, Matrix, Sparsh — Mid-tier domestic brands that have similarly pivoted supply chains toward compliant chipsets.

Western premium players (Bosch, Honeywell, Axis) — Already met the stringent requirements. Continue to serve enterprise and critical infrastructure segments where price sensitivity is lower.

Losers: Chinese Surveillance Giants

Hikvision — The world’s largest surveillance equipment company by revenue. Held significant Indian market share. Cannot comply with the SoC requirement without rebuilding its entire hardware architecture around non-Chinese chips — a multi-year, billion-dollar undertaking that makes Indian market re-entry unrealistic in the short term.

Dahua Technology — The world’s second-largest surveillance company. Same structural problem as Hikvision.

TP-Link — Best known for networking equipment but significant in the home CCTV segment. Also uses Chinese-origin SoCs across its camera product line.

Joint ventures and rebranded products. Some Chinese manufacturers attempted to circumvent the rules by establishing Indian joint ventures or rebranding products. The SoC origin disclosure requirement makes this approach ineffective — the chipset origin is disclosed regardless of the brand name on the box.


What This Means If You Already Own Chinese CCTV

You can continue using your existing cameras. The April 1 rules apply to new sales only. There is no confiscation or mandatory replacement programme.

However, you should be aware of:

No more software updates. As Hikvision, Dahua, and TP-Link exit the Indian market, firmware updates for Indian-market devices will likely cease. Unpatched cameras accumulate known vulnerabilities over time.

No warranty or after-sales support. With the companies withdrawing from India, warranty claims and repairs will become increasingly difficult to fulfil.

Ongoing security risk. The security concerns that motivated the ban do not go away because the camera is already installed. A Hikvision camera from 2023 still has the same firmware characteristics. The government recommendation is clear: replace with certified alternatives.

Practical replacement timeline. If you are a homeowner with one or two cameras, replace them when practical — within the next 12 months is a reasonable timeline. If you operate a business or manage critical infrastructure, replace immediately.


The Global Pattern: India Is Not Alone

India’s move follows an established international pattern:

United States (2022): FCC added Hikvision and Dahua to its Covered List, prohibiting federal procurement and restricting import authorisation.

United Kingdom (2022): Government departments banned Chinese surveillance cameras from “sensitive sites” following parliamentary pressure.

Australia (2023): Department of Home Affairs began removing Chinese cameras from government buildings.

European Union: Multiple member states have issued guidance restricting Chinese surveillance equipment in critical infrastructure, with formal EU-level rules under consideration.

Canada (2023): Treasury Board Secretariat directed removal of Hikvision and Dahua cameras from government buildings.

India’s April 1 ban is the most comprehensive of any country’s approach — it applies to all internet-connected CCTV sales nationwide, not just government procurement. This makes it a structurally more significant move than the US FCC restrictions.


The Data Sovereignty Angle

This story connects directly to the broader data sovereignty conversation that Vucense covers.

A CCTV camera is not just a recording device. It is a networked sensor with persistent access to physical spaces. In the context of a home, it sees when you are in and when you are out, who visits, and what your daily patterns are. In a business, it documents operations, security practices, and personnel movements. In critical infrastructure, it is a potential intelligence vector.

The concerns about Chinese surveillance hardware are structurally the same as the concerns about Chinese apps (TikTok, WeChat) and Chinese networking equipment (Huawei 5G): when the company that manufactured the hardware is subject to China’s national security laws, which can compel cooperation with Chinese intelligence services, the question of who the hardware ultimately serves is legitimate.

This is not a hypothetical risk. It is the documented basis for government actions across five countries.

The sovereign alternative — cameras running open firmware, self-hosted recording software (like Frigate + Home Assistant), and hardware from vendors with no intelligence-sharing obligations — exists and is increasingly accessible. For high-sensitivity deployments, this is the appropriate stack.


Practical Guide: What to Buy Now

If you need to replace Chinese cameras or install new surveillance, here are certified options at different price points:

Budget (₹2,000–5,000 / ~$25–60):

  • CP Plus CP-UNC series (STQC certified)
  • Qubo Smart Cam series (certified, app available)
  • Sparsh G-Series

Mid-range (₹5,000–15,000 / ~$60–180):

  • CP Plus full HD PTZ cameras
  • Matrix Cosec series
  • Prama Hikvision-equivalent specifications with certified chipsets

Enterprise / Critical Infrastructure (₹15,000+ / $180+):

  • Axis Communications (Swedish, globally trusted)
  • Bosch FLEXIDOME series
  • Honeywell Performance Series

Open-source / sovereign stack:

  • Any ONVIF-compatible certified camera + Frigate NVR (open-source AI-powered NVR) + Home Assistant integration
  • All recording stays local, no cloud dependency, no vendor lock-in

FAQ

Are analog (non-internet-connected) Chinese cameras also banned? No. The STQC certification requirement applies specifically to internet-connected cameras. Non-smart analog CCTV systems that do not connect to the internet are not covered by the new rules.

Can I still use my existing Hikvision NVR (network video recorder)? Your existing NVR is not subject to the sales ban. However, as Hikvision exits the Indian market, firmware updates will cease, creating growing security vulnerabilities over time. For critical deployments, replacement is advisable.

Will this make CCTV cameras more expensive in India? Yes, in the short term. Taiwanese chipsets (Ambarella, Novatek) cost 15–20% more than equivalent Chinese alternatives. Manufacturing costs have increased. However, as domestic production scales, prices are expected to stabilise. The entry-level certified camera range from Indian brands is currently ₹2,500–4,000 — not dramatically more expensive than pre-ban Chinese products.

What about Xiaomi smart home cameras? Xiaomi cameras use Chinese-origin SoCs and have not received STQC certification. They are covered by the ban for new sales. Existing devices continue to function but will not receive software updates from the Indian market operations.

Is this ban permanent? The certification framework is permanent, but the specific brands excluded are determined by whether they can meet the SoC origin requirements. If Hikvision or Dahua were to rebuild their camera product lines around non-Chinese chipsets, they could theoretically apply for certification. This is considered commercially implausible in the near term given the cost and complexity involved.


Divya Prakash

About the Author

Divya Prakash

AI Systems Architect & Founder

Graduate in Computer Science | 12+ Years in Software Architecture | Full-Stack Development Lead | AI Infrastructure Specialist

Divya Prakash is the founder and principal architect at Vucense, leading the vision for sovereign, local-first AI infrastructure. With 12+ years designing complex distributed systems, full-stack development, and AI/ML architecture, Divya specializes in building agentic AI systems that maintain user control and privacy. Her expertise spans language model deployment, multi-agent orchestration, inference optimization, and designing AI systems that operate without cloud dependencies. Divya has architected systems serving millions of requests and leads technical strategy around building sustainable, sovereign AI infrastructure. At Vucense, Divya writes in-depth technical analysis of AI trends, agentic systems, and infrastructure patterns that enable developers to build smarter, more independent AI applications.

View Profile

You Might Also Like

Cross-Category Discovery

Comments