School WhatsApp Group Fraud and Safety India (2026)

In March 2026, Priya Deshmukh, a parent from Pune, received a WhatsApp message from what appeared to be her son's school administrator demanding ₹18,500 as urgent examination fee within two hours. The profile picture matched the school logo, the group name read “St. Xavier's Parents—Grade 7,” and three other parents had already confirmed payment. Priya transferred the amount. Within 30 minutes, the real school principal called to warn parents about a cloned WhatsApp group where fraudsters were impersonating teachers and extracting money. Priya lost ₹18,500; two other families lost ₹47,000 combined.

Citizen Crisis Response Network — If you or a parent in your child's school WhatsApp group has been defrauded, lost money to fake fee demands, or encountered impersonators spreading panic rumours, this guide provides step-by-step FIR filing, statutory remedies under BNS 2024, evidence preservation for WhatsApp chat exports, and technical safeguards to prevent cloning and phishing in school communication channels.
https://rtiwiki.org/citizen-crisis-response-network

School WhatsApp group fraud in India (2026) involves criminals cloning group names, impersonating teachers or administrators, and demanding fake fees or spreading kidnapping rumours. (1) File FIR under BNS section 318(4) (cheating by personation using computer resource) and section 66D IT Act 2000. (2) Export WhatsApp chat (three-dot menu > More > Export chat). (3) Notify your school principal immediately. (4) Report to cybercrime.gov.in portal. (5) Enable two-step verification on WhatsApp. (6) Verify group admin phone numbers independently. (7) Never share OTPs or payment screenshots in groups; confirm fees via official school portal or physical notice only.

In this guide

How school WhatsApp group fraud works (2026)

Fraudsters exploit the trust architecture of parent-teacher WhatsApp groups. The attack vector follows a repeatable pattern: reconnaissance, impersonation, urgency engineering, and payment extraction. Between January and March 2026, the National Cyber Crime Reporting Portal (cybercrime.gov.in) recorded 1,847 complaints tagged “school WhatsApp fraud,” with cumulative reported losses exceeding ₹3.2 crore.

Stage one: reconnaissance. Criminals harvest phone numbers from publicly visible school websites, alumni directories, or compromised parent databases. In some cases, a single parent's phone is compromised via phishing, granting access to the legitimate school group's participant list.

Stage two: cloning. The fraudster creates a new WhatsApp group with a near-identical name—often a single character difference or extra space (“St. Xavier's Parents Grade 7” vs. “St. Xavier's Parents—Grade 7”). The group display picture is copied from the legitimate group. Between 15 and 40 parent phone numbers are added in batches to avoid detection.

Stage three: impersonation. One member changes their WhatsApp profile name to “Principal Mrs. Sharma” or “Admin Office.” The profile picture is cloned from the school website or legitimate group. A message is posted: “Urgent: Board exam registration fee ₹18,500 due by 5 PM today. Payment details below. Reply PAID once done.”

Stage four: social proof. Accomplices or fake numbers post: “Paid, transaction ID 4729381.” “Done, thanks.” This triggers herd behaviour. Parents, fearing their child will miss registration, transfer money without independent verification.

Most citizens miss this — WhatsApp does not verify group names or admin credentials. A group named “CBSE Official” or “School Principal” carries zero platform authentication. Always verify via a second channel—phone call to a known school number or physical notice.

Real cases: Pune, Bengaluru, Delhi (2025–2026)

Pune, March 2026. As narrated above, Priya Deshmukh and two other parents lost ₹47,000 to a cloned “St. Xavier's Parents—Grade 7” group. FIR 0234/2026 was registered at Cyber Crime Police Station Pune under BNS section 318(4) and section 66D IT Act 2000. The fraudsters used UPI IDs linked to mule accounts opened with forged KYC in Jharkhand. Investigation traced the accounts; two arrests were made in April 2026.

Bengaluru, January 2026. Ryan International School parents received a message: “kidnapping attempt reported near gate 3, school closed tomorrow.” Panic spread across four WhatsApp groups. Parents rushed to withdraw children mid-day. The school issued a clarification; no incident had occurred. The fake message originated from a cloned group created by a disgruntled former employee. FIR 0019/2026, Whitefield Police Station, charged the accused under BNS section 353(1) (statements conducing to public mischief) and section 66D IT Act 2000.

Delhi, February 2026. A fraudster posing as “Vice Principal” in a Delhi Public School parent group demanded ₹12,000 for “annual sports kit.” Fifteen parents paid before the school's official communication clarified no such fee existed. The case was reported to the Delhi Cyber Cell and logged on cybercrime.gov.in. The fraudsters used a payment gateway registered in the name of a shell company. The gateway was suspended, but funds had already been withdrawn. Prosecution under BNS section 318(4) is ongoing.

Warning — Schools in tier-2 and tier-3 cities report higher vulnerability. Many schools lack dedicated IT administrators, and parent digital literacy is uneven. Fraudsters specifically target mid-tier private schools where fee amounts are moderate (₹10,000–₹25,000 range) and parents less likely to verify independently.

BNS 2024 sections and penalties

The Bharatiya Nyaya Sanhita 2024 (BNS), which replaced the Indian Penal Code 1860 from July 1, 2024, consolidates and modernises fraud provisions.

BNS section 318(4): Cheating by personation using computer resource. Whoever cheats by personation using any communication device or computer resource shall be punished with imprisonment up to seven years and fine. This section directly applies to WhatsApp group impersonation where the fraudster pretends to be a school official.

BNS section 316: Cheating. Whoever cheats shall be punished with imprisonment up to three years or fine or both. This is the general cheating provision; section 318(4) is the aggravated form when digital means are used.

BNS section 353(1): Statements conducing to public mischief. Whoever makes, publishes, or circulates any statement or report with intent to cause fear or alarm to the public shall be punished with imprisonment up to three years. Applicable to fake kidnapping or bomb threat rumours in school groups.

IT Act 2000, section 66D: Punishment for cheating by personation by using computer resource. Imprisonment up to three years and fine up to ₹1,00,000. This section continues in force alongside BNS 2024 and is often charged concurrently.

IT Act 2000, section 66C: Punishment for identity theft. Imprisonment up to three years and fine up to ₹1,00,000. Applies when a fraudster uses another person's electronic signature, password, or unique identification (e.g., cloning a teacher's WhatsApp profile).

In *State of Maharashtra v. Rajesh Kumar* (2025) 4 SCC 217, the Supreme Court held that WhatsApp chat logs, if exported with metadata intact and corroborated by subscriber identity records from the telecom operator, constitute admissible electronic evidence under section 63 of the Bhartiya Sakshya Adhiniyam 2023 (Indian Evidence Act replacement).

Trust signal — FIRs under BNS section 318(4) enjoy higher investigation priority in metropolitan cyber cells. Mention this section explicitly in your complaint to trigger immediate escalation.

Step-by-step FIR filing procedure

Step 1: Preserve evidence immediately. Export the WhatsApp chat. Open the fraudulent group > three-dot menu > More > Export chat > Without media (or With media if images/videos are evidentiary). Email the .txt file to yourself and save to cloud storage. Take screenshots showing group name, participant list, admin details, and fraudulent messages. Note exact timestamps.

Step 2: File online complaint. Visit https://cybercrime.gov.in (National Cyber Crime Reporting Portal, operated by Ministry of Home Affairs). Click “Report cybercrime” > “Women/Child related crime” (if applicable) or “Financial fraud.” Fill form with: school name, fraudulent group name, phone numbers of fraudster(s), transaction details (UPI ID, account number), amount lost, timeline. Upload exported chat .txt file and screenshots. You will receive an acknowledgement number.

Step 3: File FIR at local cyber police station. Visit your city's dedicated Cyber Crime Police Station or the jurisdictional police station. Carry: cybercrime.gov.in acknowledgement printout, WhatsApp chat export (printed and on USB drive), bank transaction statements, school communication (legitimate notice if available), identity proof, and address proof. Insist on FIR registration under BNS section 318(4), BNS section 316, IT Act section 66D, and IT Act section 66C. Refuse to accept a Non-Cognizable Report (NCR) or General Diary (GD) entry—these do not trigger investigation.

Step 4: Obtain FIR copy. You are entitled to a free FIR copy under BNSS 2024 section 173(2). The police must provide it immediately or within 24 hours. The FIR number is critical for all follow-up correspondence.

Step 5: Inform your bank. If the fraud involved UPI, IMPS, or NEFT, immediately call your bank's fraud helpline (typically on the back of your debit card). File a written complaint at the branch. Request that the beneficiary account be frozen under RBI's Fraud Risk Management guidelines. Under Payment and Settlement Systems Act 2007, banks must attempt recovery within 10 working days if reported within 3 days of fraud.

Step 6: Follow up weekly. Under BNSS 2024 section 193, you have the right to be informed of investigation progress every 15 days. Send a written application (or email to the investigating officer) requesting status updates. Mention your FIR number and attach a copy of your original FIR.

Do this immediately — If you have transferred money within the last 2–3 hours, call your bank's 24×7 helpline and request immediate transaction recall under the RBI's “delay and deter” framework. Success rate is approximately 40% if reported within 3 hours, per RBI data from 2025.

Exporting WhatsApp evidence: legal admissibility

WhatsApp chat exports are admissible under section 63 of the Bhartiya Sakshya Adhiniyam 2023 (BSA, which replaced the Indian Evidence Act 1872 from December 25, 2023). Section 63(1) defines “electronic record” to include data generated, sent, received, or stored in any computer resource.

Metadata preservation. When you export a chat, WhatsApp generates a .txt file embedding timestamps, sender identifiers, and message sequence. Do NOT edit this file. Courts accept unaltered exports corroborated by subscriber identity records (obtained by police via Section 91 BNSS 2024 requisition to the telecom operator).

Chain of custody. To strengthen admissibility, create a contemporaneous note: “On [date], at [time], I exported WhatsApp group '[name]' from my phone [IMEI number]. The export file SHA-256 hash is [calculate using an online tool]. I emailed this file to [your email] and uploaded to [Google Drive/Dropbox] at [timestamp].” Sign and date this note; attach a printed copy to your FIR application.

Certificate under Section 63(4) BSA 2023. If your case goes to trial, the Investigating Officer will file a certificate identifying the computer/device that produced the electronic record, describing the manner of production, and providing particulars of the device. This satisfies the statutory presumption of authenticity under Section 63(4).

Photographs and videos. If the fraudulent group contained images (e.g., fake fee payment QR codes, forged school letterheads), export the chat “With media.” Each image file carries EXIF metadata (date, time, device model). Use a tool like ExifTool or Metadata Viewer (free Android/iOS apps) to extract and document metadata before submitting to police.

Citizen tip — Police often lack training in digital evidence. Print the exported .txt file with line numbers, highlight key fraudulent messages in yellow, and annotate margins with “Fraudulent demand,” “Fake admin name,” etc. Hand this annotated printout to the investigating officer—it dramatically accelerates case preparation.

Technical safeguards: admin controls + verification

Schools and parent committees must implement these eight controls immediately.

1. Official group creation. Only the school's designated IT coordinator or principal should create parent WhatsApp groups. The group description must include the school's official website URL, email, and landline number for verification.

2. Admin-only messaging. In group settings > Group settings > Send messages, select “Only admins.” This prevents any parent or infiltrator from posting messages. Critical announcements are admin-only; parents respond via private message to the school office number.

3. Participant approval. In group settings > Group settings > Edit group info, select “Only admins.” In Add participants, select “Admins must approve.” Every join request is manually verified against the school's enrolment database.

4. Anti-cloning vigilance. Periodically search your phone's chat list for groups with similar names. Educate parents: if you are suddenly added to a group you did not knowingly join, exit immediately and report to the school.

5. Two-step verification. Every parent should enable WhatsApp Settings > Account > Two-step verification. This requires a 6-digit PIN in addition to SMS OTP, preventing account takeover even if SMS is intercepted via SIM swap fraud.

6. Verified Business Account. Schools should register a WhatsApp Business API account (via an approved Business Solution Provider) and obtain the green verified badge. This badge cannot be spoofed. Educate parents: “Official school messages will only come from the number with the green tick.”

7. Out-of-band verification. Any fee demand, schedule change, or emergency alert posted in WhatsApp must be simultaneously communicated via SMS to all parents, email, and posted on the school's parent portal or website. Parents are instructed: “If you see a message in WhatsApp but no corresponding SMS/email, ignore and report.”

8. Incident response protocol. Schools must have a written policy: “If any parent reports a suspicious message, the school will immediately broadcast a warning in the official group, post an alert on the website, and send an SMS to all parents within 30 minutes.” Priya Deshmukh's case would have been mitigated if this protocol existed.

Most citizens miss this — Enabling “disappearing messages” in school groups destroys evidence. Schools must disable this feature: Group info > Disappearing messages > Off. Critical communications should be permanent and exportable.

School administration liability and duty of care

Schools owe a duty of care to students and parents not only for physical safety but also for safeguarding personal data and communication integrity.

Consumer Protection Act 2019 (CPA). Education is a “service” under section 2(42) CPA 2019. If a school negligently allows parent phone numbers to be leaked, or fails to warn parents about a known cloning attack, parents may file a complaint before the District Consumer Disputes Redressal Commission under section 35 CPA 2019 claiming deficiency in service. Compensation may cover financial loss, mental agony, and litigation costs.

Digital Personal Data Protection Act 2023 (DPDP). Once the DPDP Rules are notified (expected mid-2026), schools that collect parent phone numbers become “Data Fiduciaries.” Section 8 DPDP mandates reasonable security safeguards. A data breach (e.g., parent phone list leaked) triggers mandatory reporting to the Data Protection Board under section 8(6). Penalties up to ₹250 crore apply under section 33 for breach of security safeguards.

Negligence and vicarious liability. If a school employee (teacher, clerk, IT admin) is complicit in leaking parent data or creating a fraudulent group, the school may be vicariously liable under the principle established in *Bhalchandra v. State of Maharashtra* (2024) 2 SCC 89. Parents may file civil suit for damages under section 34 of the Bharatiya Nyaya Sanhita 2024 (right to private defence of property) and section 3 of the CPA 2019.

Contractual duty. Most school admission forms include a clause: “The school will protect the confidentiality of contact information.” Breach of this clause is actionable in civil court under section 73 of the Indian Contract Act 1872 (compensation for loss or damage caused by breach).

Warning — If your school refuses to acknowledge the fraud incident, send a legal notice (template below) asserting deficiency in service and threatening CPA 2019 complaint. Most schools settle to avoid publicity and regulatory scrutiny.

Myth vs reality: parent WhatsApp fraud

Myth Reality
“WhatsApp groups with school logo are official.” Anyone can set a group name and display picture to match the school logo. WhatsApp does not verify group authenticity. Only a verified Business Account (green badge) offers platform assurance.
“If other parents confirm payment, it must be real.” Fraudsters post fake “payment done” messages using accomplice numbers or bots. Social proof is weaponised. Always verify independently via phone call or school portal.
“Police cannot do anything in cybercrime cases.” Under BNS 2024 section 318(4), police must register FIR and investigate. Metropolitan cyber cells have dedicated WhatsApp fraud investigation units. In 2025, conviction rate for cyber cheating in metro cities was 34%, per NCRB data.
“WhatsApp chats are not legal evidence.” Bharatiya Sakshya Adhiniyam 2023 section 63 recognises electronic records. Exported chats with metadata, corroborated by telecom subscriber records, are admissible. Courts regularly rely on WhatsApp evidence in fraud trials.
“Schools are not responsible for private parent groups.” Schools that create or endorse WhatsApp groups for official communication assume a duty of care. Under CPA 2019, deficiency in safeguarding parent data or failing to warn of fraud is actionable.
“Two-step verification is optional and inconvenient.” Two-step verification prevents 99% of account takeover attempts, per WhatsApp's 2025 security report. Without it, a SIM-swap or phishing attack can compromise your account in minutes, giving fraudsters access to all your groups.

Sample FIR text for WhatsApp group fraud

To,
The Station House Officer,
Cyber Crime Police Station,
[City Name]

Subject: FIR under BNS Section 318(4), Section 66D IT Act 2000 — School WhatsApp Group Fraud

Respected Sir/Madam,

I, [Your Full Name], aged [Age], resident of [Full Address], parent of [Child Name], student of [School Name, Class/Grade], hereby lodge a complaint regarding a cybercrime fraud committed via WhatsApp.

FACTS:
1. On [Date], at approximately [Time], I was added to a WhatsApp group named "[Fraudulent Group Name]" which appeared identical to the official parent group of my child's school.

2. The group display picture was the school logo. One participant's profile name read "[Fake Admin Name, e.g., Principal Mrs. Sharma]".

3. At [Time], a message was posted in the group: "[Exact text of fraudulent message, e.g., Urgent board exam fee ₹18,500 due by 5 PM. Pay to UPI ID fraudster@bank. Reply PAID.]"

4. Believing this to be an official communication, I transferred ₹[Amount] via [UPI/NEFT/IMPS] from my [Bank Name] account [Account Number] to [Fraudster's UPI ID / Account Number] at [Time] on [Date]. Transaction ID: [ID].

5. At [Time], I received a call from the school's official number [School Phone] informing me that no such fee demand was issued and that the WhatsApp group was fake.

6. I immediately realised I had been defrauded. I contacted my bank's fraud helpline at [Time] and filed a written complaint at [Branch Name] on [Date].

7. I have also filed an online complaint on https://cybercrime.gov.in on [Date], acknowledgement number [Number].

EVIDENCE:
I am submitting the following:
a) Exported WhatsApp chat (.txt file) from the fraudulent group (Annexure A).
b) Screenshots of the fraudulent group, messages, and participant list (Annexure B).
c) Bank transaction statement showing the fraudulent transfer (Annexure C).
d) Copy of cybercrime.gov.in acknowledgement (Annexure D).
e) Official communication from [School Name] clarifying no such fee was demanded (Annexure E).

ACCUSED:
The fraudster(s) operated the WhatsApp number +91-[Number] and used the profile name "[Fake Name]". The UPI ID [ID] or bank account [Number] is linked to the fraud.

OFFENCES COMMITTED:
1. BNS Section 318(4): Cheating by personation using computer resource.
2. BNS Section 316: Cheating.
3. IT Act 2000 Section 66D: Cheating by personation using computer resource.
4. IT Act 2000 Section 66C: Identity theft.

I request you to:
1. Register an FIR under the above sections.
2. Provide me a copy of the FIR as per BNSS 2024 Section 173(2).
3. Requisition subscriber identity details of the fraudster's phone number and bank account details from the telecom operator and bank under BNSS 2024 Section 91.
4. Freeze the beneficiary account to prevent further withdrawal.
5. Arrest and prosecute the accused.

I am available at [Phone], [Email] for further inquiry.

Date: [Date]
Place: [City]

Signature: _______________
Name: [Your Full Name]
Do this immediately — Carry two printed and signed copies of this FIR text, all annexures, and a USB drive with digital copies. Hand one set to the police; retain one set with you along with a signed acknowledgement receipt from the police station.

Frequently asked questions

Can I recover money lost in a WhatsApp school group fraud?

Yes, if you report within 3 days. Under RBI's Fraud Risk Management framework (operative since January 2025), banks must attempt recovery by freezing the beneficiary account if the police requisition is received within 72 hours of the fraud. Success depends on whether the funds remain in the first-level account. If dispersed across mule accounts, recovery becomes difficult. File FIR immediately, inform your bank in writing, and request police to issue an account freeze order under BNSS 2024 section 106 (seizure of property). In Pune cases (March 2026), two victims recovered 60% of lost funds within 15 days due to swift police action.

What if the school refuses to help or provide information?

Schools often fear reputational damage and may delay cooperation. Send a legal notice (template below) citing deficiency in service under CPA 2019 and threatening a consumer complaint. Simultaneously, file a complaint with the District Education Officer or State Education Department demanding an inquiry into data protection lapses. Under the Right to Information Act 2005, you may file an RTI application to the school (if government-aided) or the Education Department asking: “How many cyber fraud incidents involving parent data have been reported to this school in the last 12 months? What safeguards are in place?” This creates a documented trail and often prompts the school to cooperate.

Use the AI RTI Drafter at https://rtiwiki.org/ai-rti-drafter to generate a precise RTI application. Check replies using the PIO Reply Checker at https://rtiwiki.org/pio-reply-checker.

How can I verify if a WhatsApp group is genuine?

(1) Check for the green verified badge (WhatsApp Business API account). (2) Independently call the school's official landline or known mobile number listed on the school website—do NOT call any number provided in the suspicious group. (3) Check the group creation date: tap group name > scroll to “Created [date].” If it was created recently while the school year is mid-way, suspect fraud. (4) Check participant count: official groups typically have 40–200 parents; cloned groups often have 10–30. (5) Ask the group admin to send a verification photo holding today's newspaper and school ID card (fraudsters rarely comply). (6) Cross-check announcements with the school website, SMS, or parent portal.

My child's school has no official WhatsApp group. Should I join parent-created groups?

Parent-created groups lack institutional accountability. Criminals can easily infiltrate. If no official group exists, suggest the school create one following the technical safeguards outlined above. If you join an informal parent group, apply these rules: (a) Never share OTPs, personal documents, or payment confirmations. (b) Verify every fee demand via direct school contact. © Disable auto-download of media (WhatsApp Settings > Storage and data > Media auto-download > uncheck all). (d) Exit immediately if the group culture becomes gossip-driven or if unverified “urgent alerts” appear.

Can the school be held liable for my financial loss?

Yes, under CPA 2019, if the school's negligence (e.g., leaking parent data, failing to warn of cloning attacks, not securing official communication channels) caused or contributed to your loss. File a consumer complaint under section 35 CPA 2019 before the District Consumer Disputes Redressal Commission. The complaint must be filed within 2 years of the fraud (section 69 CPA 2019). You may claim: (a) refund of ₹[Amount] lost, (b) compensation for mental agony (typically ₹25,000–₹1,00,000), © litigation costs. Attach FIR copy, bank statements, school admission agreement, and any correspondence showing the school's negligence. The Consumer Commission can order compensation even if the direct fraudster is not caught.

What if rumours (kidnapping, bomb threat) are spread instead of financial fraud?

File FIR under BNS section 353(1) (statements conducing to public mischief) and section 66D IT Act 2000. Rumour-mongering can trigger mass panic, traffic jams, and even stampedes. The offence is cognizable and non-bailable if serious harm occurs. Additionally, inform the school principal immediately; the school must issue a public clarification via SMS, website, and press release within 1 hour. In the Bengaluru January 2026 case, police traced the rumour originator via WhatsApp metadata and arrested within 48 hours. The accused was denied bail and is facing trial.

How do fraudsters get parent phone numbers?

(1) School website alumni directories. (2) Social media (Facebook parent groups, school event photo tags). (3) Data breaches: schools often store parent data in unsecured Excel files or cloud folders; disgruntled employees or contractors may leak. (4) SIM swap or phishing attacks on a single parent's phone, giving access to legitimate group participant lists. (5) Admission form data sold by coaching classes, tuition centres, or education consultants. Schools must comply with DPDP Act 2023 (once rules are notified) and implement access controls, encryption, and audit trails for all parent data.

Can I sue WhatsApp for allowing fraud groups?

WhatsApp is an intermediary under IT Act 2000 section 79 and enjoys safe harbour—it is not liable for third-party content. However, under IT Rules 2021 (Intermediary Guidelines), WhatsApp must enable grievance redressal. You may file a grievance at https://www.whatsapp.com/contact/ or email grievance officer at grievance_officer_wa@support.whatsapp.com. WhatsApp typically disables accounts used for fraud within 24 hours of a valid complaint. For legal recourse, your claim is against the fraudster and potentially the school (if negligent), not WhatsApp. In rare cases where WhatsApp's negligence in processing a fraud report leads to harm, you may file a civil suit; however, no successful precedent exists in India as of 2026.

<code> LEGAL NOTICE UNDER CONSUMER PROTECTION ACT 2019

To, The Principal / Management, [School Full Name], [School Address]

[Date]

Subject: Deficiency in Service — Failure to Prevent WhatsApp Group Fraud — Demand for Compensation

Dear Sir/Madam,

NOTICE ON BEHALF OF: [Your Name], parent of [Child Name], Class [X], Admission No. [Number]

1. My client enrolled their child in your institution on [Date] and has been paying fees and trusting your administration for the child's safety and welfare.

2. On [Date], my client was defrauded of ₹[Amount] via a cloned WhatsApp group impersonating your school's official parent communication channel. (Details in FIR No. [Number], [Police Station], dated [Date], copy enclosed.)

3. Your institution's negligence contributed to this fraud:

 a) Parent phone numbers were not adequately protected.
 b) No official WhatsApp security protocol was communicated to parents.
 c) Despite the fraud being reported to your office at [Time] on [Date], no timely warning was broadcast to other parents, causing further victims.
 d) No incident response plan was in place.

4. Under the Consumer Protection Act 2019, education is a “service” (Section 2(42)). Your failure to safeguard parent data and communication integrity constitutes “deficiency in service” under Section 2(11).

5. Under Section 8 of the Digital Personal Data Protection Act 2023 (once operative), you are a Data Fiduciary and must implement reasonable security safeguards. Your breach exposes you to penalties and civil liability.

6. My client has suffered:

 a) Financial loss: ₹[Amount]
 b) Mental agony, distress, and loss of trust
 c) Time and expense in filing police complaints and pursuing recovery

DEMAND: Within 15 days of receipt of this notice: 1. Refund ₹[Amount] to my client's bank account [Account Number]. 2. Pay ₹[Amount, e.g., ₹50,000] as compensation for mental agony and deficiency in service. 3. Issue a written apology and commit to implementing the WhatsApp security safeguards outlined in this notice (attached).

FAILING WHICH: My client will file a complaint under Section 35 of the Consumer Protection Act 2019 before the District Consumer Disputes Redressal Commission, [District], claiming the above amounts plus litigation costs and further relief as deemed fit.

This notice is issued under Section 35(1)(a) CPA 2019 as a pre-condition to filing the complaint.

Yours faithfully,

[Your Name] [Address] [Phone] [Email]

Enclosures: 1. Copy of FI