Section 24(2)(iii) in The Information Techonolgy (Procedure and Safeguards for interception, Monitoring and Decryption of Information) Rules, 2009
(iii)installation of any communication link or software either at the end of the intermediary or subscriber, or installation of user account on the computer resource of intermediary and testing of the same for its functionality;