Some people may think that the students of today have it easy. But in thinking this they are indeed wrong. Very wrong in fact. I would even argue that being a student is harder than it has ever been before.
Firstly, there is a huge amount of pressure that is put on us to meet the standards of the generations before us. We are told that we have to work hard to succeed and that our options are limited, when in reality it is the opposite. In this day and age there are literally countless ways to make a living for yourself and leave your own mark on the world. So why restrict yourself to just one trade when you the possibilities are endless. For example, if I told my parents I wanted to be a youtuber or an instagram influencer I would be laughed at, when in reality, they provide the highest earnings.
With the education system being hundreds of years old, you’d think it would have changed, right?
Sadly not, even to this day students are told to sit exams that test nothing more than memory to determine how much money they are allowed to get when they are older. Obviously there are a select few that obtain the grades that they wanted to more as far as possible in life but the truth is that for most that is not at all the case. How can you say it is fair that our whole life is completely dependant on how we perform as a child/young adult.
Now it is true that if you are someone that struggles in exams there are options you can take to help you. However, the truth is that if you take this help you are severely restricted to what you can achieve, this could be seen as a fair way of going about it but in reality it is far from it.
The way I see it is that if you convince someone that they can only achive the most minimum of goals then they will believe you. We need to be told that no matter what if we work hard enough we can achieve our dreams and succeed in life.
I believe that some serious changes need to be made to the system in order to make it truly ‘fair for everyone’. Start believing in us and maybe we will surprise you.
NASA’s next-generation Mars rover has blasted off from Florida’s Cape Canaveral top an Atlas 5 rocket on a $US2.4 billion ($3.36 billion) mission to search for traces of potential past life on Earth’s planetary neighbour.
The next-generation robotic rover – a car-sized six-wheeled vehicle carrying seven scientific instruments – also is scheduled to deploy a mini helicopter on Mars and try out equipment for future human missions to the fourth planet from the sun.
Scientists have long debated whether Mars once a much more hospitable place than it is today ever harboured life.
Water is considered a key ingredient for life, and the Mars of billions of years ago had lots of it on the surface before the planet became a harsh and desolate planet.
One of the most journey will be what mission engineers call the “seven minutes of terror,” when the robot endures extreme heat and speeds during its descent through the Martian atmosphere, deploying a set of supersonic parachutes before igniting mini rocket engines to gently touch down on the planet’s surface.
Since NASA’s first Mars rover Sojourner landed in 1997, the agency has sent two others – Spirit and Opportunity – that have explored the geology of expansive Martian plains and detected signs of past water formations, among other discoveries. NASA also has successfully sent three landers – Pathfinder, Phoenix, InSight.
The United States has plans to send astronauts to Mars in the 2030s under a program that envisions using a return to the moon as a testing platform for human missions before making the more ambitious crewed journey to Mars.
The rover also is intended to help bring Martian rock samples back to Earth, collecting materials in cigar-sized capsules and leaving them in various spots on the surface for retrieval by a future “fetch” rover. That planned rover is expected to launch the samples back into space to link up with other spacecraft for an eventual Earth homecoming around 2031.
Covid-19 crisis has severely impacted almost all industries but disruptions in the airline industry is so profound and it has manifold implications that it is assumed to be greater than the combined crises of 9/11 terror attack in the US and the 2008 global financial crisis combined to put together.
The Government of India (acting through DGCA) (“GoI”) has vide its (i) order dated March 23, 2020, passed under Section 88(1) of the Aircraft Act, 1934; and (ii) orders dated March 26, 2020, and April 14, 2020, directed inter alia all aircraft operators to suspend the operations of all the domestic flights and all scheduled international commercial passenger services until May 3, 2020.
The forward air travel bookings are far outweighed by the cancellations due to which the air travel demand is in its all-time low and drying up in ways that are unprecedented with no semblance of normalcy on the horizon.
CURRENT SCENARIO DUE TO COVID-19
For an industry which is already in stress, the Covid-19 pandemic has only accelerated the process of a bankruptcy filing by several companies (like Virgin Australia and Air Mauritius).
Those airline companies which are still in business have also suffered huge losses and misfortunes as the novel coronavirus-forced lockdowns due to which the airlines had to keep their fleets at bay and grounded.
As per the market sources, apart from the pay cut, several airline companies from the likes of Indigo, Go Airlines etc in India have also taken other cost-cutting measures including furloughs.
Due to the turbulence caused by the outbreak of Covid-19 virus, the airline industry must focus on the horizon as there is always a silver lining in these tough times so that it can successfully navigate a wide array of challenges (including legal, financial and operational) which are likely to surface once the pandemic is behind us.
Future flight plan post the COVID-19 pandemic for the airlines will be influenced to a great extent by factors such as avoiding the countries that have been the virus epicentres and gauging government responses on the type and duration of travel restrictions and the conditions under which they might be relaxed.
Governments across the globe may likely consider imposing specific restrictions/limitations which is akin to the security measures put in place after terrorism events for inbound and outbound passengers.
RESTRICTIONS/ LIMITATIONS
Health screenings or certificates form prescribed by the medical practitioners before the boarding is a must. In the Post-COVID era, megatrends such as the dramatic rise in remote working, government or organisation-imposed limitations/restrictions on air travel, greater reliance on locally-oriented supply chains as well as avoiding non-essential travels will impact the recovery demand in the aviation industry and may lead to a major overhaul in the management and operation of the airline industry.
To fly safely through this turbulent time, it is of utmost importance that the airline companies launch a crisis management team or as its being coined by some in the industry – “Plan Ahead Team”. This Plan Ahead Team will be responsible for collecting forward-looking intelligence and provide a Post Covid-19 flight plan to guide and accelerate decision making.
CHALLENGES/ CONSIDERATIONS
Following are some of the challenges/considerations which airline companies in India may consider while formulating their Post Covid-19 flight plan.
Third-party contractor agreements/Hedging arrangement for jet fuel prices:
To determine the optimal size and dimensions of their networks and fleet, this will hold the key to the survival of airline companies. These companies may have to revamp their strategies vis-à-vis the air travel restrictions imposed by the governments to identify routes that are most likely to recover basis demand, regulatory and market structure scenarios.
The determination of routes that are most likely to recover will determine which fleet/route to recommission. For the routes that could not be recommissioned or are partially commissioned post-COVID-19 and withdrawal of lockdown orders, the airline companies may have to renegotiate/re-assess the legal risk that may arise according to their contracts with third-party contractors engaged for inter alia refuelling; catering; runway/taxiway construction and repair; aircraft maintenance and overhaul; crew training; and flight dispatch.
Further, airline companies must also consider revisiting/re-negotiating their existing contracts for hedging the jet fuel prices. Most of the airline are locked into contracts for hedging the jet fuel prices. There has been a steep drop and the prices of jet fuel is at an all-time low due to the upshot of the current crisis.
Accordingly, the airline companies will have to pay their higher hedged amount for jet fuel, creating hedging loses. In this context, the existing provisions of these contracts become relevant to determine the leverage of discussions from a legal rights perspective.
Financing Arrangements:
Given that the airline companies have suspended all their business, it would be imperative to ascertain if defaults would get triggered under the various financing agreements entered by the airline companies.
Where an event of default is only triggered upon a ‘voluntary’ suspension of business, it may be argued that such temporary cessation of business due to the virus outbreak is a direct consequence of the government regulations and therefore it is outside the purview and scope of such provision.
Further, it would be relevant to check if an event of default is qualified by a requirement that a suspension of business has a “material adverse effect” on the borrower’s ability to perform its contractual obligations.
If there is a significant impact on the borrower’s ability to pay, this will likely satisfy the test of ‘material adverse effect. Additionally, it is expected that post-COVID-19 and lifting of the lockdown orders, for reasons including financial and operational difficulties, the airline companies may not be able to commence operations in all the sectors or may not be in a position to recommission their entire fleet.
Given the aforesaid, it would be relevant for the airline companies to review an event of default provision relating to ‘cessation of business’ in their financing agreements.
Cessation of Business would typically include events where a company ‘threatens’ to suspend or cease to carry on its business and therefore, one may argue that such temporary closures post Covid-19 and/or lifting of lockdown orders, would constitute a ‘cessation’ of business. It would be prudent for airline companies to review their facility agreements when contemplating Covid-19 related measures and consider the impact of such measures may have on their financing arrangements. These tests can be carried out during the period of lockdown, such that the provisions can be re-considered by the parties.
Aircraft Lease Agreements:
The airline companies may have to revisit/review their aircraft lease agreements. The airline companies may consider approaching the lessors for seeking concessions concerning the lease obligations including ‘rental holiday’ on account of liquidity crunch consequent to fall in ticket receipts post Covid-19.
While the lessors may be entitled to decline requests for concessions on lease obligations, the commercial reality may well be that lessors will have to assess whether supporting an airline in some way may improve their financial health in the aftermath of the crisis or whether such benevolence will only delay the end of a business that was struggling in any case.
It may be worthwhile to consider that the relief package/concessions which an airline company may seek from the lessors may include inter alia a standstill for an agreed period with an agreed repayment schedule to recapture the unpaid rents, forbearance on event of default at a cost.
Governmental Support: Globally, the market structure for the airline industry is set to witness a major revamp. This change will be significantly influenced by government responses to the crisis and types and levels of support extended to the airline industry.
In the absence of specific announcements/ relief measures, the airline companies in India may consider approaching the Ministry of Civil Aviation and/or the GoI for relaxation/waiver concerning various fees/licenses including airport charges, AAI and Private Airport Operators’ space rentals and infrastructure charges which are to be paid by them.
This waiver may specifically be sought concerning air spaces/sectors, which the airline companies suspect will not be recommissioned or sectors where the travel demand likely to rebound slowly.
Resolution/Restructuring: Globally there are several airline companies which have filed for bankruptcy. Per CAPA-Centre of Aviation, most world airlines would be bankrupt by the end of May. In this context, the Ministry of Finance (“MoF”) has on March 24, 2020, indicated that if Covid-19 crisis continues beyond April 30, 2020, it may consider suspending Section 7, 9 and 10 of the Insolvency and Bankruptcy Code, 2016 for six months to stop companies from being forced into insolvency proceedings in such force majeure causes of default under the commercial agreements (e.g. financing agreements, lease agreements).
Import Duties and Trade barriers: Government of India is considering putting in place several trade restrictions/embargo on the import of goods from China.
CONCLUSION
As COVID -19 continues to spread across the globe, the challenges triggered by it are numerous and unprecedented. As COVID -19 continues to spread across the globe, the challenges triggered by it are numerous and unprecedented. The Indian tourism and hospitality industry is severely affected by the outbreak of COVID-19.
Once the COVID-19 crisis is contained, the GoI may inter alia consider developing an appropriate messaging/advertising campaign (similar to ‘Incredible India’ tourism campaign) to provide the necessary impetus to the recovery of the aviation industry post-COVID-19.
WEBSITES REFERRED
Covid-19: Flight Plan for Indian Aviation Industry by Subhojit Sadhu & Shrey Srivastava on May 6, 2020,
The Government of India had vide its circular dated April 14, 2020, has decided that all scheduled international commercial passenger services shall remain closed until May 3, 2020. Additionally, a collated list of the Global and regional Government measures related to Covid-19
Post 9/11, it is customary to have long lines at the airport and extensive security checks. The enhanced security measures are being monitored and implemented by the Transportation Security Administration (TSA). The TSA was created as a direct result of the 9/11 attacks
Uttar Pradesh gangster Vikas Dubey, the main accused in the killing of eight policemen in Kanpur, was shot dead in an alleged encounter Friday morning. According to the UP Police, the special task force was bringing him back from Ujjain to Kanpur when the vehicle he was in toppled, and Dubey attempted to flee. According to the police, Dubey also fired at the police as he was fleeing.
Apart from Dubey, five of his associates have also been killed by the police in reported encounters over the last week.
These encounters under mysterious circumstances have raised many questions on the authenticity of the Uttar Pradesh police’s claims, as Dubey was said to have a nexus with politicians and the police.
ThePrint looks back at some of India’s most controversial ‘encounter’ killings
Alleged rapists/murderers in Hyderabad, 2019
In December 2019, the Telangana police dead four men accused of gang-raping and burning to death a veterinarian doctor in Hyderabad. Calling their actions an “encounter”, the police said they had to open fire in self-defence as the four men tried to escape and began pelting stones.
The police had taken the four accused to an underpass on the Hyderabad-Bengaluru highway next to Chatanpally village to reconstruct the crime scene when the four tried to escape, the police claim.
Bhopal jail encounter, 2016
In October 2016, eight people associated with the Students’ Islamic Movement of India (SIMI) allegedly escaped from the Bhopal Central Jail and were subsequently shot dead by the state police.
The probe report tells that the deceased persons were asked to surrender, but, instead, began firing at the police and public. Therefore, the police had to open fire and even after that they showed no intention to surrender, sustained injuries and died on the spot.
In one man judicial commisson headed by S.K. Pandey, retired judge of the Madhya Pradesh High Court gave the police a clean chit.
Manipur extrajudicial killings, 2010
In February 2020, four Manipur policemen, including an surrendered before the Imphal West chief judicial magistrate in connection with the alleged fake encounter of Irengbam Ratankumar on 1 September 2010.
The case was among more than 1,500 extrajudicial killing by the Manipur Police and security forces. The Special Investigation Team (SIT) of the CBI, which was investigating the case, submitted a charge sheet against the police personnel in May 2019.
This action came after former CBI director Alok Kumar Verma was told by the Supreme Court in 2018 for the agency’s failure to arrest the accused in the many alleged extrajudicial killings in Manipur.
Batla House, 2008
The Batla House encounter held in Delhi in 2008, becoming a national sensation—Bollywood even made a film on it.
On 19 September 2008, a Delhi Police special team carried out an encounter in Batla House in Jamia Nagar, where two suspected Indian Mujahideen terrorists were killed along with inspector Mohan Chand Sharma.
The operation led by Sharma, an encounter specialist, was supposed to only gather information from residents of the area after the 2008 September blasts in Delhi. However, it escalated into a 20-minute shootout.
Many questioned the veracity of the encounter, and claimed it was staged. The National Human Rights Commission also conducted an investigation into the encounter, on a plea filed by People’s Union for Democratic Rights, and eventually gave a clean chit to the Delhi Police.
However, the post-mortem report of the victims of the shootout, which raised several flags and questions, was not included in the NHRC report. What’s more, the report was dated two days before the body was even asked to investigate the matter by the high court.
Ram Narayan Gupta, 2006
Ram Narayan Gupta alias ‘Lakhan Bhaiya’, who was apparently an aide to gangster Chhota Rajan, was shot dead in 2006 by the Mumbai Police when he was picked up from Vashi and killed in an allegedly staged encounter in Versova.
Following the encounter, a Mumbai sessions court in 2013 sentenced 21 people, including 13 policemen, to life imprisonment for killing Gupta. It also held them guilty of conspiring and kidnapping him. However, the prime accused, encounter specialist Pradeep Sharma, was acquitted.
Sohrabuddin Sheikh, 2006
According to the CBI, Sheikh was a wanted criminal who extorted money from marble traders in Gujarat and Rajasthan. However, the Gujarat Police claimed he was a Lashkar-e-Taiba operative.
In November 2006, Sheikh and his wife Kausar Bi were travelling from Hyderabad to Sangli in Maharashtra when the Gujarat Police Anti-Terror Squad intercepted them and took them to a farmhouse on the outskirts of Ahmedabad. It has been reported that three days later, then-ATS chief D.G. Vanzara took Sheikh away and killed him, claiming he was a terrorist with a plan to attack Narendra Modi.
Tulsiram Prajapati, 2006
Also in 2006, Tulsiram Prajapati, known to be an associate of Sohrabuddin Sheikh, was allegedly killed in a fake encounter. According to the CBI, Prajapati was with Sheikh and Kausar Bi when the Gujarat Police caught them. Prajapati was shown to be arrested in Rajasthan and later killed.
In 2011, the Supreme Court told the CBI to take up the case and the agency named then-Gujarat home minister Amit Shah as the prime accused in the elimination of Prajapati. According to the charge sheet, former DGP P.C. Pande and additional DGP Geetha Johri abused their positions to eliminate Prajapati, who was an eyewitness to the killings of Sheikh and his wife Kauser Bi.
Ishrat Jahan, 2004
On 15 June 2004, the Gujarat Police killed 19-year-old Ishrat Jahan and three others on the outskirts of Ahmedabad in an alleged encounter. as police all four were operatives of the Lashkar-e-Taiba who had a plan to kill then-Gujarat CM Narendra Modi.
However an investigation by the special investigation team formed by the Gujarat High Court said the encounter was staged. The case was then transferred to the Supreme Court, which handed it over to the CBI, which, in turn, filed a charge sheet against many Gujarat police officers for their involvement in the alleged encounter.
Jahan was the second of seven siblings and a second-year student at Mumbai’s Guru Nanak Khalsa College. In 2017, terrorist David Headley said a Mumbai court that Jahan was an operative of the LeT.
Fifteen years after the death of her daughter, Ishrat’s mother Shamim Kausar said she was releasing herself from the judicial process because her daughter’s killers were roaming free.
Veerappan, 2004
In October 2004, the notorious Veerappan, infamous for kidnapping, elephant poaching and sandalwood smuggling, was shot dead in an encounter by the Tamil Nadu Special Task Force. He had been on the run for a decade was tricked into getting into an ambulance as he needed to visit a hospital in Salem for his eye.
The STF fired 338 bullets at the ambulance, out of which three hit Veerappan. However, it was asked at the time whether his encounter was staged and actually a cover-up job, as according to reports, Veerappan had no bullet wounds in his body and was only shot in his eye and forehead.
Sadiq Jamal, 2003
In 2003, the Gujarat Police shot dead Sadiq Jamal, claiming to have information that he was planning an attack on Narendra Modi and other top BJP leaders. According to an investigation by the CBI, not only was Jamal shot dead by the police in a fake encounter, but also that the Intelligence Bureau played a role in it.
According to the CBI, Jamal did not match the profile of reports of a plan to kill Modi and others, and his past criminal record only included an altercation in 1996 and arrest for gambling in 2002. Many police inspectors and top IB officials were asked and later accused in the case of his ‘encounter’.
In 2017, Jamal’s father files a petition in the Gujarat High Court seeking compensation of Rs 50 lakh from the state government.
India is celebrating seventy years of Independence, but still the female of our country are not independent and not living truly free. Women are live under realm of darkness and fear. It is indeed a cloudy reality of India.
What is Marital Rape? Marital Rape is defined as unwanted sexual intercourse between by a man and his wife (one’s spouse without the spouse’s consent). The lack of consent is the essential element and it is obtained force, threat of force, or physical violence, or when she is unable to give consent. Marital rape could be by the use of force only, a battering rape or a sadistic rape. It is a non-consensual act of violent perversion by a spouse against his spouses where she is physically and sexually abused. It is also known as spousal rape.
LAWS : It is an important case to be a concern, while on the one side our country is celebrating some glorious decisions in the legal arena from the Hon’ble Supreme Court of India like landmark judgments in the matter of ‘Adhaar Card Case’ , ‘Triple Talaq’ and ‘Ayodhya disputes’ creating new cornerstones for the judiciary; while on the other side to the general disappointment, the Central Government has given its view against criminalizing marital rape, saying doing so would ‘destabilize the institution of marriage’. Approximations have quoted that every 7-8 hours; a young married woman is burnt or beaten to death, or driven to suicide from emotional abuse by her husband. The UN Population Fund states that more than 2/3rds of married women in India, aged between 16 to 48 have been beaten, raped or forced to provide sex. In 2005, 6789 cases were recorded of women murdered by their husbands or their husbands’ families. However, indeed the increasing number of cases of spousal rape in our country, spousal rape is not defined in any statue/ laws. It is to be noted that while ‘Rape'” is defined under section 375 of the Indian Penal Code, there is no definition of ‘Marital Rape’ till now and there is no reorganization of marital rape under the ambit of Indian Law. It is disheartening that such a sensitive issue like marital rape is being dismissed by the highest courts of India by giving the view that “You are espousing a personal cause and not a public cause…This is an individual case.” In the running days, a survey indicates that between 12 and 16% of married women are raped by their husbands and the incidents of marital rape soars to 1/3rd to ½ among clinical samples of battered women. Sexual assault by one’s spouse accounts for approximately 28% of rapes committed. Women who became prime targets for marital rape are those who attempt to flee. Criminal charges of sexual assault may be activating by other acts. Marital rape is not an offence in India. Despite amendments, law commissions and new legislations, one of the most humiliating and acts is tiring not an offence in India.
Section 375 of the Indian Penal Code defines “Rape” A man is said to commit “rape” if he is against her will and the situations falling under any of the following seven illustrations: First— He should be against her will. Second — the man should be without her consent. Third — the man with her consent, when her consent has been obtained by putting her or any person in whom she is interested, in fear of death or of hurt. Fourth — the man with her consent, when the man knows that he is not her husband and that her consent is given because she believes that he is another man to whom she is or believes herself to be lawfully married. Fifth — It should be in her consent when, at the time of giving such consent, by reason of unsoundness of mind or intoxication or the administration by him personally or through another of any stupefying or unwholesome substance, she is unable to understand the nature and consequences of that to which she gives consent. Sixth — it can be with or without her consent, when she is under the age of adult. Seventh — when she is unable to communicate consent.
Violation of Article 14 of the Indian Constitution Article 14 of the Indian Constitution defines that India provides for equality before the law or equal protection of the laws within the territory of India. “The State cannot not deny with any person equality before the law or the equal protection of the laws within the boundary of our country.” Therefore, the Constitution gives assurance of equality to all, Indian criminal law disfavour against female victims who have been raped by their own spouse. At the time the Indian Penal Code was drafted in the 1860s, a married woman was not considered an independent legal entity. Rather, the woman was considered to be the chattel of her spouse. As an output, she did not constitute many of the rights now guaranteed to her as an independent legal entity, including the right to file a complaint against another under her own identity.
Violation of Article 21 Marital Rape is also a violation of Article 21 of the Indian Constitution. Article 21 defines that “Protection of life and personal liberty No person shall be deprived of his life or personal liberty except according to procedure established by law. The Article forbids the deprivation of the above rights except according to a procedure established by law” The Supreme Court has interpreted this clause in various judgments to extend beyond the purely literal guarantee to life and liberty. Instead, it has held that the rights enshrined in Article 21 include the rights to health, privacy, dignity, safe living conditions, and safe environment, among others. The above conclusions clearly reflect that Section 375 of the IPC is an infringement of Articles 14 and 21 of the Constitution. It is time that Indian jurisprudence understands the inhumane nature of this provision of law and strikes it down.
Conclusion
Marital rape is not fully criminalized in our country. It certainly is an authentic type of wrongdoing against ladies and deserving of government’s consideration. Women who are raped by their husband are more inclined to various attacks and frequently endure long haul physical and enthusiastic issues. In this specific circumstance, marital rape is significantly more horrendous for a lady since she needs to remain with her aggressor ordinary. As the results of marital rape are truly high, there is obviously a dire requirement for criminalization of the offense of marital rape. Positive legitimate change for ladies by and large is going on in India, yet additionally steps are fundamental so that both lawful and social change happens, which would finish in criminalizing marital rape and changing the attitude about ladies in marriage. There are many loopholes in Protection of Women from Domestic Violence Act, as the Act does not straightforwardly talk against marital rape. On the brighter side sanctioning of a particular enactment against abusive behaviour at home has opened the entryway for an enactment criminalizing marital rape.
44 years ago, in 1975, India saw its darkest phase when then Prime Minister Indira Gandhi declared emergency across the country.
The emergency was issued by President Fakhruddin Ali Ahmed under Article 352(1) of the Constitution and lasted 21 long months beginning 25th June 1975 and going on until 21st March 1977. Here are some facts from the emergency period.
1974: A student agitation by the Bihar Chatra Sangharsh Samiti received the support of Gandhian socialist Jayaprakash Narayan, referred to as JP, against the Bihar government.
Meanwhile, in Patna, JP called for “total revolution,” asking students, peasants, and labour unions to non-violently transform Indian society. He also demanded the dissolution of the state government, but this was not accepted by Centre.
Another significant movement was the Nav Nirman movement in Gujarat, between December 1973 and March 1974. Raj Narain filed cases of election fraud and use of state machinery for election in the Allahabad High Court. He had been defeated in the 1971 parliamentary election by Indira Gandhi.
This was for the first time that a Prime Minister was cross-examined in the Court.
Allahabad High Court found Indira Gandhi guilty and declared her election null and void and unseated her from her seat in the Lok Sabha.
Indira Gandhi challenged Allahabad High Court’s decision in the Apex Court.
Justice V. R. Krishna Iyer, on 24 June 1975, upheld the High Court judgement and ordered all privileges Gandhi received as an MP be stopped, and that she be debarred from voting. ws SHARE THIS NEWS WHATSAPPFACEBOOKTWITTERLINKEDINEMAIL CANCEL Nifty11,271.0568.20Sensex38,318.07246.94Dr. Reddys Laborat4,531.30229.10Gold (MCX) (Rs/10g.)53,115.00-72.00USD/INR74.860.05Market Watch
Politics and Nation The darkest phase in Indira’s tenure as PM Updated: 31 Oct 2019, 12:10 PM IST Emergency!BCCL1/8Emergency! 44 years ago, in 1975, India saw its darkest phase when then Prime Minister Indira Gandhi declared emergency across the country.
The emergency was issued by President Fakhruddin Ali Ahmed under Article 352(1) of the Constitution and lasted 21 long months beginning 25th June 1975 and going on until 21st March 1977. Here are some facts from the emergency period. The catalystsBCCL2/8The catalysts 1974: A student agitation by the Bihar Chatra Sangharsh Samiti received the support of Gandhian socialist Jayaprakash Narayan, referred to as JP, against the Bihar government.
Meanwhile, in Patna, JP called for “total revolution,” asking students, peasants, and labour unions to non-violently transform Indian society. He also demanded the dissolution of the state government, but this was not accepted by Centre.
Another significant movement was the Nav Nirman movement in Gujarat, between December 1973 and March 1974. ET Prime
AUTO Future cars will be software on wheels Sibros, a Silicon Valley startup by an ex-Tesla engineer from India, wants … Read 2 More Stories The case that shook IndiaAgencies3/8The case that shook India Raj Narain filed cases of election fraud and use of state machinery for election in the Allahabad High Court. He had been defeated in the 1971 parliamentary election by Indira Gandhi.
This was for the first time that a Prime Minister was cross-examined in the Court.
Allahabad High Court found Indira Gandhi guilty and declared her election null and void and unseated her from her seat in the Lok Sabha.
Raj Narain (center)
Debarring IndiraAgencies4/8Debarring Indira Indira Gandhi challenged Allahabad High Court’s decision in the Apex Court.
Justice V. R. Krishna Iyer, on 24 June 1975, upheld the High Court judgement and ordered all privileges Gandhi received as an MP be stopped, and that she be debarred from voting. Internal disturbanceAgencies5/8Internal disturbance The goal of the 21-month-long Emergency in the country was to control “internal disturbance”.
Indira Gandhi justified her steps in terms of national interest, primarily based on three grounds.
India’s security and democracy, rapid economic development and upliftment of the underprivileged and intervention of powers from abroad which could destabilise and weaken India. The Gandhi Government laid out some rules for the journalists across the country and they were told about “guidelines” to follow.
All the newspapers in the country were asked to take permission before publishing any anything by the Press Advisor. The Gandhi Government laid out some rules for the journalists across the country and they were told about “guidelines” to follow.
All the newspapers in the country were asked to take permission before publishing any anything by the Press Advisor.
Human rights violations Several other human rights violations were reported from the time, including a forced mass-sterilization campaign spearheaded by Sanjay Gandhi, the Prime Minister’s son.
The Emergency is one of the most controversial periods of independent India’s history.
The months preceding the declaration of the Emergency were fraught with economic troubles — growing unemployment, rampant inflation and scarcity of food. The dismal condition of the Indian economy was accompanied by widespread riots and protests in several parts of the country. Interestingly, the hitherto simmering borders of the country were rather quiet in the years preceding the Emergency. “As if to compensate, there was now trouble in the heartland, in parts of the country which, for reasons of history, politics, tradition, and language, had long considered themselves integral parts of the Republic of India,” writes historian Ramachandra Guha in his book, ‘India after Gandhi.’ The trouble began in Gujarat, spread to Bihar and from there to several other parts of Northern India. While the streets were raging against Gandhi’s governance, another challenge came to the doorstep of the prime minister in the form of a petition filed in the Allahabad High Court.
pradhan is the post which is also called mukhiya in some parts of india like bihar and odisa . it is the post which is very respected and it is up to panchayat level . a person has to fight election like member of parliament and member of legislative assemblies in wich the people of that panchayat directly cast thier thier vote in the favour of the personwhom they want to see as thier representative . so this clear its a legally elected body who ovwelooks a panchayat . now lets talks about the pradhan pati what wrong with this name ? actually the constitution has garnted equal rights to both mwn and women and given the reservation to the womens to balance the system of equality. so the seats in the panchayat elections are reserved for the womens to do welfare and equally give the rights to the females . in this situation the male or the husband of that elected reprentative take the actual charge and the role of the actual womwn pradhan is limited or restricted to signing any documents . all the works are done by the husband of that pradhan this culture is primarily known as the PRADHAN PATI . Though the panchayati raj system originally envisioned empowering women, over the years the husbands of elected women and sarpanches have made a mockery of the rules. Gandhi has criticised the way the vision of women’s empowerment in the panchayati raj system has been given a short shrift. “Thirty years ago when Rajiv Gandhi announced it, the idea was to get women into the mainstream. 33 percent of all sarpanchs would be women. That was a brilliant idea. But women allowed themselves to be used as tools. New institutions like ‘pradhan pati’ and ‘sarpanch pati’ came up. They even became legitimised as district magistrates allowed husbands to sit in panchayat meetings. Pradhan patis would run the show while women stayed in ghunghats.”Gandhi said the problem stems from two factors. “One is overpopulation. In an overpopulated society violence does increase and it’s always aimed at the weaker. So, it is always going to be one caste against other, one class against other. Our job is to empower women rather than change the mindset of men which is not possible at this point.” What the government can do in this regard is empower the women.
“Has Panchayats in our country ever thought that there should be no poor left in our country. If one village brings out five persons out of poverty in a year, what a big change will come in the country”
Prime Minister Narendra Modi in an event called for an end to the practice of “husbands of women sarpanches” or “sarpanch pati” exercising undue influence on the work of their wives elected to power.
At an event to mark the National Panchayati Raj Day here, Mr. Modi hailed the contribution of women to the functioning of panchayats. He urged panchayat members to work with a five-year vision with concrete plans to bring about positive changes in their villages.
Mr. Modi urged panchayat members to instil pride about the village. He said issues such as education of children and vaccination for them should be paid special attention. Mr. Modi asked panchayat members to motivate government officials to spend at least one hour a week with the school-going children.
He gave away the Annual Devolution Index (States) Awards and e-Panchayat awards and congratulated the zila parishads and gram panchayats which were being felicitated on the occasion.
“Cyber” is a prefix used to describe a person, thing, or idea as part of the computer and information age. Taken from kybernetes, the Greek word for “steersman” or “governor,” it was first used in cybernetics, a word coined by Norbert Wiener and his colleagues. The virtual world of internet is known as cyberspace and the laws governing this area are known as Cyber Laws and all the netizens of this space come under the ambit of these laws as it carries a kind of universal jurisdiction.
Cyberlaw can also be described as that branch of law that deals with legal issues related to use of inter-networked information technology. In short, cyber law is the law governing computers and the internet. The growth of Electronic Commerce has propelled the need for vibrant and effective regulatory mechanisms which would further strengthen the legal infrastructure, so crucial to the success of Electronic Commerce. All these regulatory mechanisms and legal infrastructures come within the domain of Cyberlaw.
Cyberlaw is important because it touches almost all aspects of transactions and activities on and involving the internet, World Wide Web and cyberspace. Every action and reaction in cyberspace has some legal and cyber legal perspectives.
Cyberlaw encompasses laws relating to:-
Cybercrimes
Electronic and digital signatures
Intellectual property
Data protection and privacy
WHY IS CYBER LAW THE NEED OF THE HOUR IN INDIA?
Firstly, India has an extremely detailed and well-defined legal system in place. Numerous laws have been enacted and implemented and the foremost amongst them is The Constitution of India. We have inter alia, amongst others, the Indian Penal Code, the Indian Evidence Act 1872, the Banker’s Book Evidence Act, 1891 and the Reserve Bank of India Act, 1934, the Companies Act, and so on.
However, the arrival of Internet signalled the beginning of the rise of new and complex legal issues. It may be pertinent to mention that all the existing laws in place in India were enacted way back keeping in mind the relevant political, social, economic, and cultural scenario of that relevant time.
Nobody then could really visualize about the Internet. Despite the brilliant acumen of our master draftsmen, the requirements of cyberspace could hardly ever be anticipated. As such, the coming of the Internet led to the emergence of numerous ticklish legal issues and problems which necessitated the enactment of Cyber laws.
Secondly, the existing laws of India, even with the most benevolent and liberal interpretation, could not be interpreted in the light of the emerging cyberspace, to include all aspects relating to different activities in cyberspace. In fact, the practical experience and the wisdom of judgment found that it shall not be without major perils and pitfalls, if the existing laws were to be interpreted in the scenario of emerging cyberspace, without enacting new cyber laws. Hence, the need for enactment of relevant cyber laws.
Thirdly, none of the existing laws gave any legal validity or sanction to the activities in Cyberspace. For example, the Net is used by a large majority of users for email. Yet till today, email is not “legal” in our country. There is no law in the country, which gives legal validity, and sanction to email. Courts and judiciary in our country have been reluctant to grant judicial recognition to the legality of email in the absence of any specific law having been enacted by the Parliament.
As such the need has arisen for Cyberlaw. Fourthly, the Internet requires an enabling and supportive legal infrastructure in tune with the times. This legal infrastructure can only be given by the enactment of the relevant Cyber laws as the traditional laws have failed to grant the same.
E-commerce, the biggest future of the Internet, can only be possible if necessary legal infrastructure compliments the same to enable its vibrant growth. All these and other varied considerations created a conducive atmosphere for the need for enacting relevant cyber laws in India.
CYBERCRIME ON THE RISE
As per the cybercrime data maintained by the National Crime Records Bureau (NCRB), a total of 217, 288, 420 and 966 Cyber Crime cases were registered under the Information Technology Act, 2000 during 2007, 2008, 2009 and 2010 respectively.
Also, a total of 328, 176, 276 and 356 cases were registered under Cyber Crime related Sections of Indian Penal Code (IPC) during 2007, 2008, 2009 and 2010 respectively.
A total of 154, 178, 288 and 799 persons were arrested under the Information Technology Act 2000 during 2007-2010. A total number of 429, 195, 263 and 294 persons were arrested under Cyber Crime related Sections of Indian Penal Code (IPC) during 2007-2010.
Crime head-wise and age-wise profile of the offenders arrested under Cyber Crimes (IPC) for the year 2011 reveals that offenders involved in 9 forgery cases were more in the age-group of 18-30 (46.5%) (129 out of 277). 50.4% of the persons arrested under Criminal Breach of Trust/Cyber Fraud offences were in the age group 30-45 years (65 out of 129).
Meanwhile, 9 out of 88 mega cities did not report any case of cybercrime i.e., neither under the IT Act nor under IPC Sections during the year 2011. And 53 megacities have reported 858 cases under the IT Act and 200 cases under various sections of IPC.
There was an increase of 147.3% (from 347 cases in 2009 to 858 cases in 2011) in cases under IT Act as compared to the previous year (2010), and an increase of 33.3% (from 150 cases in 2010 to 200 cases in 2011) of cases registered under various sections of IPC. Bangalore (117), Vishakhapatnam (107), Pune (83), Jaipur (76), Hyderabad (67) and Delhi (City) (50) have reported a high incidence of cases (500 out of 858 cases) registered under IT Act, accounting for more than half of the cases (58.3%) reported under the IT Act.
Delhi City has reported the highest incidence (49 out of 200) of cases reported under IPC sections accounting for 24.5% followed by Mumbai (25 or 12.5%). A major programme has been initiated on development of cyber forensics specifically cyber forensic tools, setting up of infrastructure for investigation and training of the users, particularly police and judicial officers in the use of this tool to collect and analyze the digital evidence and present them in Court.
Indian Computer Emergency Response Team (CERT-In) and Centre for Development of Advanced Computing (CDAC) are involved in providing basic and advanced training of Law Enforcement Agencies, Forensic labs and judiciary on the procedures and methodology of collecting, analyzing and presenting digital evidence.
Cyber forensic training lab has been set up at Training Academy of Central Bureau of Investigation (CBI) to impart basic and advanced training in Cyber Forensics and Investigation of Cyber Crimes to Police Officers associated with CBI.
In addition, Government has set up cyber forensic training and investigation labs in Kerala, Assam, Mizoram, Nagaland, Arunachal Pradesh, Tripura, Meghalaya, Manipur and Jammu & Kashmir.
In collaboration with Data Security Council of India (DSCI), NASSCOM, Cyber Forensic Labs have been set up at Mumbai, Bengaluru, Pune and Kolkata. DSCI has organized 112 training programmes on Cyber Crime Investigation and awareness and a total of 3680 Police officials, judiciary and Public prosecutors have been trained through these programmes.
Indian Computer Emergency Response Team (CERT-In) issues alerts, advisories and guidelines regarding cybersecurity threats and measures to be taken to prevent cyber incidents and enhance the security of Information Technology systems.
IMPORTANT TERMS RELATED TO CYBER LAWAS PER INFORMATION TECHNOLOGY ACT,2000
“Access” with its grammatical variations and cognate expressions means gaining entry into, instructing or communicating with the logical, arithmetical, or memory function resources of a computer, computer system or computer network. (Sec.2(1)(a) of IT Act, 2000)
“Addressee” means a person who is intended by the originator to receive the electronic record but does not include any intermediary. (Sec.2(1)(b) of IT Act, 2000.
“Affixing Electronic Signature” with its grammatical variations and cognate expressions means adoption of any methodology or procedure by a person for the purpose of authenticating an electronic record by means of Electronic Signature. (Sec.2(1)(d) of IT Act, 2000)
“Asymmetric Crypto System” means a system of a secure key pair consisting of a private key for creating a digital signature and a public key to verify the digital signature. (Sec.2(1)(f) of IT Act, 2000).
“Certifying Authority” means a person who has been granted a license to issue an Electronic Signature Certificate under section 24. (Sec.2(1)(g) of IT Act, 2000)
“Communication Device” means Cell Phones, Personal Digital Assistants (Sic), or combination of both or any other device used to communicate, send or transmit any text, video, audio, or image. (Sec.2(1)(ha) of IT Act, 2000)
“Computer” means any electronic, magnetic, optical or other high-speed data processing device or system which performs logical, arithmetic, and memory functions by manipulations of electronic, magnetic or optical impulses, and includes all input, output, processing, storage, computer software, or communication facilities which are connected or related to the computer in a computer system or computer network (Sec.2(1)(i) of IT Act, 2000)
“Computer Network” means the interconnection of one or more Computers or Computer systems or Communication device through- (i) the use of satellite, microwave, terrestrial line, wire, wireless or other communication media; and (ii) terminals or a complex consisting of two or more interconnected computers or communication device whether or not the interconnection is continuously maintained. (Sec.2(1)(j) of IT Act, 2000).
“Computer Resource” means computer, communication device, computer system, computer network, data, computer database or software. (Sec.2(1)(k) of IT Act, 2000)
“Computer System” means a device or collection of devices, including input and output support devices and excluding calculators which are not programmable and capable of being used in conjunction with external files, which contain computer programmes, electronic instructions, input data, and output data, that performs logic, arithmetic, data storage and retrieval, communication control and other functions. (Sec.2(1)(l) of IT Act, 2000)
“Cybercafe” means any facility from where access to the Internet is offered by any person in the ordinary course of business to the members of the public. (Sec.2(1)(na) of IT Act, 2000)
“Cyber Security” means protecting information, equipment, devices, computer, computer resource, communication device and information stored therein from unauthorized access, use, disclosure, disruption, modification or destruction. (Sec.2(1)(nb) of IT Act, 2000) (o)
“Data” means a representation of information, knowledge, facts, concepts or instructions which are being prepared or have been prepared in a formalized manner, and is intended to be processed, is being processed or has been processed in a computer system or computer network and may be in any form (including computer printouts magnetic or optical storage media, punched cards, punched tapes) or stored internally in the memory of the computer. (Sec.2(1)(o) of IT Act, 2000)
(p) “Digital Signature” means authentication of any electronic record by a subscriber by means of an electronic method or procedure in accordance with the provisions of section 3. (Sec.2(1)(p) of IT Act, 2000)
“Electronic Form” with reference to information means any information generated, sent, received or stored in media, magnetic, optical, computer memory, microfilm, computer generated micro fiche or similar device. (Sec.2(1)(r) of IT Act, 2000) “Electronic Record” means data, record or data generated, image or sound stored, received or sent in an electronic form or microfilm or computer generated microfiche. (Sec.2(1)(t) of IT Act, 2000)
“Electronic signature” means authentication of any electronic record by a subscriber by means of the electronic technique specified in the second schedule and includes a digital signature. (Sec.2(1)(ta) of IT Act, 2000)
“Function”, in relation to a computer, includes logic, control, arithmetical process, deletion, storage and retrieval and communication or telecommunication from or within a computer. (Sec.2(1)(u) of IT Act, 2000)
“Information” includes data, message, text, images, sound, voice, codes, computer programmes, software and databases or microfilm or computer generated microfiche. (Sec.2(1)(v) of IT Act, 2000)
“Intermediary” with respect to any particular electronic records, means any person who on behalf of another person receives, stores or transmits that record or provides any service with respect to that record and includes telecom service providers, network service providers, internet service providers, web 14 hosting service providers, search engines, online payment sites, online-auction sites, online market places and cyber cafes. (Sec.2(1)(w) of IT Act, 2000)
“Key Pair”, in an asymmetric cryptosystem, means a private key and its mathematically related public key, which are so related that the public key can verify a digital signature created by the private key. (Sec.2(1)(x) of IT Act, 2000)
“Originator” means a person who sends, generates, stores or transmits any electronic message or causes any electronic message to be sent, generated, stored or transmitted to any other person but does not include an intermediary. (Sec.2(1)(za) of IT Act, 2000)
“Private Key” means the key of a key pair used to create a digital signature. (Sec.2(1)(zc) of IT Act, 2000)
“Public Key” means the key of a key pair used to verify a digital signature and listed in the Digital Signature Certificate. (Sec.2(1)(zd) of IT Act, 2000)
“Secure System” means computer hardware, software, and procedure that -: (a) are reasonably secure from unauthorized access and misuse; (b) provide a reasonable level of reliability and correct operation; (c) are reasonably suited to performing the intended functions, and (d) adhere to generally accepted security procedures. (Sec.2(1)(ze) of IT Act, 2000)
“Subscriber” means a person in whose name the Electronic Signature Certificate is issued. (Sec.2(1)(zg) of IT Act, 2000)
ABOUT INFORMATION TECHNOLOGY ACT, 2000
Information Technology Act, 2000 is India’s mother legislation regulating the use of computers, computer systems and computer networks as also data and information in the electronic format. This legislation has touched varied aspects pertaining to electronic authentication, digital (electronic) signatures, cyber crimes and liability of network service providers.
The Preamble to the Act states that it aims at providing legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication, commonly referred to as “electronic commerce”, which involve the use of alternatives to paper-based methods of communication and storage of information and aims at facilitating electronic filing of documents with the Government agencies.
This Act was amended by Information Technology Amendment Bill, 2008 which was passed in Lok Sabha on 22nd December 2008 and in Rajya Sabha on 23rd December 2008. It received the assent of the President on 5th February 2009 and was notified with effect from 27/10/2009.
The IT Act of 2000 was developed to promote the IT industry, regulate eCommerce, facilitate e-governance and prevent cybercrime. The Act also sought to foster security practices within India that would serve the country in a global context.
The Amendment was created to address issues that the original bill failed to cover and to accommodate further development of IT and related security concerns since the original law was passed. The IT Act, 2000 consists of 90 sections spread over 13 chapters [Sections 91, 92, 93 and 94 of the principal Act were omitted by the Information Technology (Amendment) Act 2008 and has 2 schedules.[ Schedules III and IV were omitted by the Information Technology (Amendment) Act 2008].
SALIENT FEATURES OF THE INFORMATION TECHNOLOGY ACT, 2000
The term ‘digital signature’ has been replaced with ‘electronic signature’ to make the Act more technology-neutral.
A new section has been inserted to define ‘communication device’ to mean cell phones, personal digital assistance or combination of both or any other device used to communicate, send or transmit any text video, audio or image.
A new section has been added to define cyber cafe as any facility from where the access to the internet is offered by any person in the ordinary course of business to the members of the public.
A new section has been added to define cyber cafe as any facility from where the access to the internet is offered by any person in the ordinary course of business to the members of the public.
A new definition has been inserted for an intermediary.
A new section 10A has been inserted to the effect that contracts concluded electronically shall not be deemed to be unenforceable solely on the ground that electronic form or means was used.
The damages of Rs. One Crore prescribed under section 43 of the earlier Act of 2000 for damage to computer, computer system etc. has been deleted and the relevant parts of the section have been substituted by the words, ‘he shall be liable to pay damages by way of compensation to the person so affected’.
A new section 43A has been inserted to protect sensitive personal data or information possessed, dealt or handled by a body corporate in a computer resource which such body corporate owns, controls or operates.
If such body corporate is negligent in implementing and maintaining reasonable security practices and procedures and thereby causes wrongful loss or wrongful gain to any person, it shall be liable to pay damages by way of compensation to the person so affected.
Sections 66A to 66F has been added to Section 66 prescribing punishment for offences such as obscene electronic message transmissions, identity theft, cheating by impersonation using computer resource, violation of privacy and cyber terrorism.
Section 67 of the IT Act, 2000 has been amended to reduce the term of imprisonment for publishing or transmitting obscene material in electronic form to three years from five years and increase the fine thereof from Rs.100,000 to Rs. 500,000. Sections 67A to 67C have also been inserted.
While Sections 67A and B deal with penal provisions in respect of offences of publishing or transmitting of material containing sexually explicit act and child pornography in electronic form, Section 67C deals with the obligation of an intermediary to preserve and retain such information as may be specified for such duration and in such manner and format as the central government may prescribe.
In view of the increasing threat of terrorism in the country, the new amendments include an amended section 69 giving power to the state to issue directions for interception or monitoring or decryption of any information through any computer resource. Further, sections 69A and B, two new sections, grant power to the state to issue directions for blocking for public access of any information through any computer resource and to authorize to monitor and collect traffic data or information through any computer resource for cybersecurity.
Section 79 of the Act which exempted intermediaries has been modified to the effect that an intermediary shall not be liable for any third party information data or communication link made available or hosted by him if; (a) The function of the intermediary is limited to providing access to a communication system over which information made available by third parties is transmitted or temporarily stored or hosted; (b) The intermediary does not initiate the transmission or select the receiver of the transmission and select or modify the information contained in the transmission; (c) The intermediary observes due diligence while discharging his duties.
However, section 79 will not apply to an intermediary if the intermediary has conspired or abetted or aided or induced whether by threats or promise or otherwise in the commission of the unlawful act or upon receiving actual knowledge or on being notified that any information, data or communication link residing in or connected to a computer resource controlled by it is being used to commit an unlawful act, the intermediary fails to expeditiously remove or disable access to that material on that resource without vitiating the evidence in any manner.
A proviso has been added to Section 81 which states that the provisions of the Act shall have overriding effect. The proviso states that nothing contained in the Act shall restrict any person from exercising any right conferred under the Copyright Act, 1957.
OVERVIEW OF THE INFORMATION TECHNOLOGY ACT, 2000
The Information Technology Act was enacted with a view to give a fillip to the growth of electronic-based transactions, to provide legal recognition for e-commerce and e-transactions, to
facilitate e-governance, to prevent computer-based crimes and ensure security practices and procedures in the context of the widest possible use of information technology worldwide.
APPLICABILITY OF THE ACT
The Act will apply to the whole of India unless otherwise mentioned. It applies also to any offence or contravention thereunder committed outside India by any person.
The Act shall not apply to the following documents or transactions –
A negotiable instrument as defined in Sec.13 of the Negotiable Instruments Act, 1881;
A power of attorney as defined in Sec.1A of the Powers of Attorney Act, 1882;
A trust as defined in Section 3 of the Indian Trusts Act, 1882;
A Will as defined in Sec.2(h) of the Indian Succession Act, 1925 including any other testamentary disposition by whatever name called;
Any contract for the sale or conveyance of immovable property or any interest in such property.
SCHEME OF THE ACT
Chapter – I – Preliminary
Chapter – II – Digital Signature and Electronic Signature (Sections 3 & 3A)
Chapter – III – Electronic Governance (Sections 4 to 10A)
Chapter – IV – Attribution, Acknowledgement and Dispatch of Electronic Records (Sections 11 to 13)
Chapter – V – Secure electronic records and secure electronic signatures (Sections 14 to 16)
Chapter – VI – Regulation of Certifying Authorities (Sections 17 to 34)
Chapter – VII – Electronic Signature Certificates (Sections 35 to 39)
Chapter – VIII – Duties of Subscribers (Sections 40 to 42)
Chapter – IX – Penalties, Compensation and Adjudication (Sections 43 to 47)
Chapter X – The Cyber Appellate Tribunal (Sections 48 to 64)
Chapter XI – Offences (Sections 65 to 78)
Chapter XII – Intermediaries not to be liable in certain cases (Section 79)
Chapter XIIA – Examiner of Electronic Evidence (Section 79A)
Chapter XIII – Miscellaneous (Sections 80 to 90)
First Schedule – Documents or Transactions to which the Act shall not apply
Second Schedule – Electronic signature or Electronic authentication technique or procedure
IMPORTANT PROVISIONS OF THE ACT
A) Digital signature and Electronic signature:
Digital Signatures provide a viable solution for creating legally enforceable electronic records, closing the gap in going fully paperless by completely eliminating the need to print documents for signing. Digital signatures enable the replacement of slow and expensive paper-based approval processes with fast, low-cost, and fully digital ones.
The purpose of a digital signature is the same as that of a handwritten signature. Instead of using pen and paper, a digital signature uses digital keys (public-key cryptography). Like the pen and paper method, a digital signature attaches the identity of the signer to the document and records a binding commitment to the document.
However, unlike a handwritten signature, it is considered impossible to forge a digital signature the way a written signature might be. In addition, the digital signature assures that any changes made to the data that has been signed cannot go undetected.
Digital signatures are easily transportable, cannot be imitated by someone else and can be automatically time-stamped. A digital signature can be used with any kind of message, whether it is encrypted or plaintext. Thus Digital Signatures provide the following three features:-
(i) Authentication– Digital signatures are used to authenticate the source of messages. The ownership of a digital signature key is bound to a specific user and thus a valid signature shows that the message was sent by that user. Integrity – In many scenarios, the sender and receiver of a message need assurance that the message has not been altered during transmission. Digital Signatures provide this feature by using cryptographic message digest functions.
(ii) Integrity– In many scenarios, the sender and receiver of a message need assurance that the message has not been altered during transmission. Digital Signatures provide this feature by using cryptographic message digest functions.
(iii) Non-Repudiation – Digital signatures ensure that the sender who has signed the information cannot at a later time deny having signed it.
A handwritten signature scanned and digitally attached with a document does not qualify as a Digital Signature. An ink signature can be easily replicated from one document to another by copying the image manually or electronically. Digital Signatures cryptographically bind an electronic identity to an electronic document and the digital signature cannot be copied to another document.
B) ELECTRONIC SIGNATURE
This has also been dealt with under Section 3A of the IT Act, 2000. A subscriber can authenticate any electronic record by such electronic signature or electronic authentication technique which is considered reliable and may be specified in the Second Schedule.
Any electronic signature or electronic authentication technique will be considered reliable if-
The signature creation data or the authentication data are, within the context in which they are used, linked to the signatory or, as the case may be, the authenticator and of no other person;
The signature creation data or the authentication data were, at the time of signing, under the control of the signatory or, as the case may be, the authenticator and of no other person;
Any alteration to the electronic signature made after affixing such signature is detectable;
Any alteration to the information made after its authentication by electronic signature is detectable; and
It fulfils such other conditions which may be prescribed. An electronic signature will be deemed to be a secure electronic signature if-
(i) the signature creation data, at the time of affixing the signature, was under the exclusive control of signatory and no other person; and
(ii) the signature creation data was stored and affixed in such exclusive manner as may be prescribed. (Sec.15)
An Amendment to the IT Act in 2008 introduced the term electronic signatures. The implication of this Amendment is that it has helped to broaden the scope of the IT Act to include new techniques as and when technology becomes available for signing electronic records apart from Digital Signatures.
There are various other provisions of the IT Act which are important which are as follows:
E-Governance
Attribution, Acknowledgement and Dispatch of Electronic Records
Certifying Authorities
Controller of Certifying Authorities (CCA)
Root Certifying Authority of India (RCAI)
Certifying Authorities
Under the IT Act the licensed Certifying Authorities (CAs) are –
Safescrypt
NIC
IDRBT
TCS
MTNL
Customs and Central Excise
(n)Code Solutions CA (GNFC)
e-Mudhra
NOW LET’S COME TO THE POINT THAT “WHO CAN BECOME A CERTIFYING AUTHORITY”?
The following persons can apply for the grant of a licence to issue Digital Signature Certificates, namely:-
(a) an individual, being a citizen of India and having a capital of five crores of rupees or more in his business or profession;
(b) a company having–
(i) paid-up capital of not less than five crores of rupees; and
(ii) net worth of not less than fifty crores of rupees: No company in which the equity share capital held in aggregate by the Non-resident Indians, Foreign Institutional Investors, or foreign companies, exceeds forty-nine per cent of its capital, will be eligible for grant of licence.
(c) a firm having – (i) capital subscribed by all partners of not less than five crores of rupees; and (ii) net worth of not less than fifty crores of rupees. No firm, in which the capital held in aggregate by any Non-resident Indian, and foreign national, exceeds forty-nine per cent of its capital, will be eligible for grant of licence.
(d) Central Government or a State Government or any of the Ministries or Departments, Agencies or Authorities of such Governments.
There are various other important provisions also that are to be kept in mind in relation to the certifying authority:-
Submission of performance bond
Submission of application:- Every application for a licensed Certifying Authority should be made to the Controller in the form given in Schedule I of the Information Technology (Certifying Authorities) Rules, 2000. Rule 10 of IT (Certifying Authorities) Rules, 2000 prescribes what all are the documents to be submitted along with the application.
Issuance of licence
Security Guidelines for Certifying Authorities
Commencement of Operation by Licensed Certifying Authorities
Procedures to be followed by Certifying Authorities
Audit of Certifying Authority
Registration Authority (RA)
ELECTRONIC SIGNATURE CERTIFICATES
Provisions relating to Electronic/Digital signature certificates are covered in Chapter VII i.e. Secs.35 to 39 of the IT Act, 2000 and Rules 23 to 30 of the IT (Certifying Authorities) Rules, 2000 and IT (Certifying Authority) Regulations, 2001. A Digital Signature Certificate is an electronic document which uses a digital signature to bind together a public key with an identity — information such as the name of a person or an organization, their address, and so forth. Digital certificates are the digital equivalent (i.e. electronic format) of physical or paper certificates. Examples of physical certificates are driver’s licenses, passports or membership cards.
Depending upon the requirement of assurance level and usage of Digital Signature Certificate, the following are the classes of Digital Signature Certificates:-
1) Class -1 Certificate
2) Class – 2 Certificate
3) Class – 3 Certificate
Different types of digital signature certificates that are issued:–
1) Individual Digital Signature Certificates (Signing Certificates)
2) Server Certificates
3) Encryption Certificates
Certificate Revocation
Digital Signature Certificates are issued with a planned lifetime, which is defined through a validity start date and an explicit expiration date. A certificate may be issued with a validity of up to two years. Once issued, a Certificate is valid until its expiration date. Under such circumstances, the issuing CA needs to revoke the certificate. In case a Digital Signature Certificate is compromised, one should immediately contact the respective CA to initiate revocation. The CA will then put the certificate in the Certificate Revocation List.
Duties of Subscribers
“Subscriber” means a person in whose name the Electronic Signature Certificate is issued. Chapter VIII i.e. Secs.40 to 42 of the IT Act, 2000 deals with the duties of subscribers.
CASE LAWS
i) State of Tamil Nadu Vs Suhas Katti
The Case of Suhas Katti is notable for the fact that the conviction was achieved successfully within a relatively quick time of 7 months from the filing of the FIR. Considering that similar cases have been pending in other states for a much longer time, the efficient handling of the case which happened to be the first case of the Chennai Cyber Crime Cell going to trial deserves a special mention.
The case related to the posting of obscene, defamatory and annoying message about a divorcee woman in the yahoo message group. E-Mails were also forwarded to the victim for information by the accused through a false e-mail account opened by him in the name of the victim.
The posting of the message resulted in annoying phone calls to the lady in the belief that she was soliciting. Based on a complaint made by the victim in February 2004, the Police traced the accused to Mumbai and arrested him within the next few days. The accused was a known family friend of the victim and was reportedly interested in marrying her.
She, however, married another person. This marriage later ended in divorce and the accused started contacting her once again. On her reluctance to marry him, the accused took up the harassment through the Internet. On 24-3-2004 Charge Sheet was filed u/s 67 of IT Act 2000, 469 and 509 IPC before The Hon’ble Addl. CMM Egmore by citing 18 witnesses and 34 documents and material objects.
The same was taken on file in C.C.NO.4680/2004. On the prosecution side, 12 witnesses were examined and entire documents were marked as Exhibits. The Defence argued that the offending mails would have been given either by the ex-husband of the complainant or the complainant herself to implicate the accused as accused alleged to have turned down the request of the complainant to marry her.
Further, the Defence counsel argued that some of the documentary evidence was not sustainable under Section 65B of the Indian Evidence Act. However, the court relied upon the expert witnesses and other evidence produced before it, including the witnesses of the Cyber Cafe owners and came to the conclusion that the crime was conclusively proved. Ld.
Additional Chief Metropolitan Magistrate, Egmore, delivered the judgement on 5-11-04 as follows: ” The accused is found guilty of offences under section 469, 509 IPC and 67 of IT Act 2000 and the accused is convicted and is sentenced for the offence to undergo RI for 2 years under 469 IPC and to pay fine of Rs.500/-and for the offence u/s 509 IPC sentenced to undergo 1-year Simple imprisonment and to pay fine of Rs.500/- and for the offence, u/s 67 of IT Act 2000 to undergo RI for 2 years and to pay fine of Rs.4000/- All sentences to run concurrently.” This is considered as the first case convicted under Section 67 of the Information Technology Act 2000 in India.
ii) Syed Asifuddin and Ors. V. The State of AP. & Anr., 2005CriLJ4314
Tata Indicom employees were arrested for manipulation of the electronic 32-bit number (ESN) programmed into cell phones that were exclusively franchised to Reliance Infocomm. The court held that such manipulation amounted to tampering with computer source code as envisaged by section 65 of the Information Technology Act, 2000.
Reliance Infocomm launched a scheme under which a cell phone subscriber was given a digital handset worth Rs. 10,500/- as well as a service bundle for 3 years with an initial payment of Rs. 3350/- and monthly outflow of Rs. 600/-. The subscriber was also provided with a 1-year warranty and 3-year insurance on the handset.
The condition was that the handset was technologically locked so that it would only work with the Reliance Infocomm services. If the customer wanted to leave Reliance services, he would have to pay some charges including the true price of the handset. Since the handset was of a high quality, the market response to the scheme was phenomenal.
Unidentified persons contacted Reliance customers with an offer to change to a lower-priced Tata Indicom scheme. As part of the deal, their phone would be technologically “unlocked” so that the exclusive Reliance handsets could be used for the Tata Indicom service.
Reliance officials came to know about this “unlocking” by Tata employees and lodged a First Information Report (FIR) under various provisions of the Indian Penal Code, Information Technology Act and the Copyright Act.
The police then raided some offices of Tata Indicom in Andhra Pradesh and arrested a few Tata Tele Services Limited officials for reprogramming the Reliance handsets. These arrested persons approached the High Court requesting the court to quash the FIR on the grounds that their acts did not violate the said legal provisions.
Some of the issues raised by the defence in the case were – It is always open for the subscriber to change from one service provider to the other service provider; The subscriber who wants to change from Tata Indicom always takes his handset, to other service providers to get service-connected and to give up Tata services; The handsets brought to Tata by Reliance subscribers are capable of accommodating two separate lines and can be activated on principal assignment mobile ( NAM 1 or NAM 2).
The mere activation of NAM 1 or NAM 2 by Tata in relation to a handset brought to it by a Reliance subscriber does not amount to any crime; A telephone handset is neither a computer nor a computer system containing a computer programmed; there is no law in force which requires the maintenance of “computer source code”. Hence section 65 of the Information Technology Act does not apply.
Following were the observations of the Court –
As per section 2 of the Information Technology Act, any electronic, magnetic or optical device used for storage of information received through satellite, microwave or other communication media and the devices which are programmable and capable of retrieving any information by manipulations of electronic, magnetic or optical impulses is a computer which can be used as a computer system in a computer network.
The instructions or programmed given to a computer in a language known to the computer are not seen by the users of the computer/consumers of computer functions. This is known as source code in computer parlance. ESN and SID come within the definition of “computer source code” under section 65 of the Information Technology Act.
When ESN is altered, the offence under Section 65 of Information Technology Act is attracted because every service provider has to maintain its own SID code and also give a customer-specific number to each instrument used to avail the services provided.
OTHER IMPORTANT CASE LAWS
P.R. Transport Agency Vs. Union of India (UOI)
SMC Pneumatics (India) Private Limited v. Jogesh Kwatra
the fraud has been always seen by changing its nature from a different type to different type in the 90 the modes ewre mostly te physical but after the introduction of electronic facility in the 20th century the humans has devloped different types of the techniques related to the fraud . due to accessebiluty of the banking fqcility in the current world keeping in hand the smart phones . it is absolutely true tht the technologies had given us so freedon and made our work easy but at the same time it has been saw that its creating a big loss to the people hwen it goes in wrong hand and where guilty mind lies .
talking about the new trends of frauds throuhgh the electronic means which includes
net banking fraud
app fraud- phne pay , paytm, olx , quikr etc
fraud on call
data hacks
The Unified Payments Interface or UPI has made transferring money very simple, thanks to the rising popularity of apps like Google Pay, PhonePe, and others. But while UPI is fostering a new way of digital payments, it has also opened up new ways to trick unsuspecting users. I found out just how common such scams on UPI are thanks to my father’s recent interactions on OLX, where he wanted to sell his bike.
The scam unfolded like this– My father, who lives in a small town in Uttar Pradesh received a call from someone who claimed to be from a nearby city, and said was keen to purchase the listed motorcycle. He also offered to pay Rs 10,000 in advance and promised to pay the rest of the amount in cash within two days when he would come to pick it up.
A week later, he refreshed the listing and within an hour, he received a call and the same thing followed. My father was now sure that it is some kind of fraud, but could not understand how giving up his UPI ID alone could result in a scam. He called me to look into the matter and when I searched for ‘UPI fraud OLX’ on Google, there was plenty to show how such scams were being executed.
However, I soon found out that it was not the only way that people were being conned. I myself received a call in the office where the caller claimed that I have pending cashback in my PhonePe account. “Do you want me to ‘pay’ the amount or do you wish to ‘decline’ it,” the caller said. Obviously, he did not have the answers to my questions like– “Since when did cashback needs to be accepted,” and “Why the cashback is on hold,” and “Why have I got cashback in the first place?”
The person even sent a payment request on PhonePe with three options as usual — “Pay”, “Later”, and “Decline”.
How the fraud happens
What follows after you tell the fraudster your UPI ID is that user gets a payment request. The scammer might have promised to transfer the money for the item you have listed on the classified site, but instead sends a request demanding money from you.
The scammer tells you that he has sent the money, please accept this ‘request’. He says that in order to receive the money you will have to tap on the ‘Pay’ button, while tapping on ‘Decline’ will result in cancellation of the said transaction.
However, the receiver in a UPI transaction does not need to do anything to get their money. People, unaware of the very fact, end up paying the scammer in the hopes of receiving the money. This small negligence on your part makes you a victim of UPI fraud.
How to save yourself from fraud
To transfer money or make a transaction using the UPI apps, users need to enter their M-PIN, which differs for every linked bank account. The M-PIN is like a digital ATM PIN. If at any point of time, you are entering your M-PIN into the UPI app, you are either checking your account balance or you are making a transaction where money will be deducted from your linked bank account.
Treat your M-PIN exactly like you treat your ATM PIN. Do not disclose or share your M-PIN with anyone. The same applies for UPI login passcode– a password that you need to enter to log in to your UPI app. To be on the safer side, put a lock on your payment apps.
I want to be a writer because it had in me,I am meant for this, I love writing, it’s my passion! Look how childish these answers seems to be.There is complete lack of conscience. I mean everyone could easily guess what the answer might be. Then the point is why should one ask such questions??Answering and art of answering are two different things. So you might be thinking what could I answer if i were in your place, and my answer will be “I want to be a writer because its a Decision rather than a choice”
When I wear my writer’s hat, My wings unfold, I travel to a mysterious dimension, Where time stands still Thoughts intoxicate me, and words enchant me, my heart sings and my brain weaves a grand design It’s harmony that resonates within my whole being
Group discussion is a selection method that is used to screen the best candidates for a particular job. It is a form of comparative assessment where the applicants skills can be evaluated. Usually the candidates are called for the group discussion stage once their resume and cover letter have been selected by the officer. A personal interview will be conducted after this stage where only the selected candidates from the group discussion can participate. In a group discussion, communication skills, critical thinking, leadership qualities, general knowledge and personality of the candidates, etc can be identified. Since the candidates are asked to perform in a group, the observer can identify whether you are competitive, whether you possess any leadership qualities or if you are taking initiative and so on. A group discussion is perfect to know one’s social behavior.
There is not a single leader in group discussion. It is usually observed by a panel that consists of two or more people. There are mainly three types of group discussion.
1.Case study- In this type the candidates will be given a particular case and will be asked to solve them. The cases are more likely to be the popular or recent ones.
2.Topic based- Here the candidates will be asked to discuss about a random topic and also will be expected to give their opinions.
3.Group tasks- In this type, several tasks will be also given along with the case. The candidates are expected to set some objectives in addition to the case.
The topic based group discussions are further divided into factual, controversial and abstract.
Factual. The topic which are factual based come under this section. Role of trade union, educational policies in India, etc. are some of the examples that can be considered as factual based topics.
Controversial. This type can expect argumentative and opposing view points from the candidates. Controversial topics are very subjective and candidates may have extreme opinions on this. Women empowerment, development of the nation etc. can be examples.
Abstract. The topics that are intangible come under abstract. Topics such as aliens, gravity and space etc. are examples.
A group discussion normally doesn’t take longer than fifteen minutes. It mainly consists of three steps. The very first step is group formation. A group can consist of eight to twelve members. After the group is formed, the topic will be provided and the candidates will also get some time to prepare. Based on the topic, the time provided can vary. As a next step, the actual discussion starts. Here the panel can do an ongoing evaluation. Each candidate will have to speak about the given topic. In this step, the panel can assess the candidate’s communication skills and his attitude. The candidate should not use terms or phrases that can hurt other participants and he should make sure that he doesn’t interrupt others. The candidate can take the initiative but he should not try to dominate others. Your Patience to listen, understand others’ opinions,way of expressing your points politely etc. will be analysed during the discussion.The GD can end early but it is not supposed to exceed the time limit.
The strength of Indian Parliamentary Democracy lies in its people’s commitment towards being active participants in the electoral foray by utilizing their right to universal adult sufferage for Legislative Assemblies and Parliament, every five years.
However, in recent times, India has been witnessing some departure from the established conventions whereby elected representatives from one party have been switching sides and helping a party that otherwise lacks the requisite number, to form government. This process of Defection has been defined by Soli J. Sorabjee as “the abandonment or disloyalty to duty or ideology. In political term the ‘defectors’ not only violate the credibility of political party on whose ticket they were elected but also betrays the electors who had voted for them. It commits a breach of faith not only to the party on whose ticket the member has been elected but also commits a breach of faith with electorates whose votes were secured on the basis of affiliation with the party.”
The 10th Schedule was inserted in the constitution to curb this menace of defection and to reduce the power of money used for alluring the elected members to break or topple government and to ensure that elected members remain loyal to the party on whose ticket he/she has been elected as well as electors.
The anti-defection law in India, technically the Tenth Schedule to the Indian Constitution, was enacted to address the perceived problem of instability caused by democratically elected legislators in India’s Parliamentary System of Government shifting allegiance from the parties they supported at the time of election, or disobeying their parties’ decisions at critical times such as during voting on an important resolution. Such shifting of allegiance was considered to be a symptom of endemic political corruption, which in turn provided some legitimisation for corruption prevalent in other aspects of life in the country.
Prior to the introduction of the anti-defection law, both the central Government of India and the governments of some of its states and territories had experienced instances of perceived instability resulting from legislators changing their political allegiance. By one estimate, almost 50 per cent of the 4,000 legislators elected to central and federal parliaments in the 1967 and 1971 general elections subsequently defected, leading to political turmoil in the country.
A law was sought to limit such frequent defections in India. In 1985, the Tenth Schedule of the 52nd amendment to the Constitution of Indiawas passed by the Parliament of India to achieve this. Following recommendations from many constitutional bodies, Parliament in 2003 passed the Ninety-first Amendment to the Constitution of India. This strengthened the act by adding provisions for disqualification of defectors and barring them from being appointed as ministers for a period of time.
What is the anti-defection law?
Aaya Ram Gaya Ram was a phrase that became popular in Indian politics after a Haryana MLA Gaya Lal changed his party thrice within the same day in 1967. The situation between 1967 to 1971 was so grave that jokingly this phase has been termed as that of ‘AYARAM GAYARAM‘ when as many as 142 MPs and over 1900 MLAs changed their political parties.
In this context of weakening democratic ethos, there was a dire need to create mechanisms that would discourage these tendencies and discipline the legislators and for this objective on December 8, 1967, the Lok Sabha constituted a high-level Committee (Known as “Committee on Defection”) under the chairmanship of then Home Miniter Y. B. Chavan. The Committee in its report dated January 7, 1969, made certain recommendations for outlawing defections. Keeping in view these recommendations, the Constitution (Thirty-second Amendment) Bill, 1973, was introduced in the Lok Sabha on May 16, 1973, but the Bill lapsed on account of the dissolution of the House. Thereafter, the Constitution (Forty-eighth Amendment) Bill, 1979, was introduced in the Lok Sabha containing similar provisions. But, it was opposed by ruling as well as opposition parties at the stage of introduction of the Bill, resulting in its withdrawal.
The Tenth Schedule was inserted in the Constitution in 1985 with the aim “to curb defection to bring the political stability and to discourage the practice of defection of members from one party to another after their election.” It came into force on March 1, 1985. It lays down the process by which legislators may be disqualified on grounds of defection by the Presiding Officer of a legislature based on a petition by any other member of the House. A legislator is deemed to have defected if he either voluntarily gives up the membership of his party or disobeys the directives of the party leadership on a vote. This implies that a legislator defying (abstaining or voting against) the party whip on any issue can lose his membership of the House. The law applies to both Parliament and state assemblies.
The court in Ravi S. Naikcase held that “the words “voluntarily given up his membership of such political party” are not synonymous with “resignation” and would have a wider connotation, even in the absence of a formal resignation from membership, an inference could be drawn from the conduct of a member that he had voluntarily given up his membership of the political party to which he belonged.” Thus, the act of voluntarily giving up the membership of the political party, may be express or implied, non-fulfilment of formalities for joining a party is of no consequence.Clause (2) of Paragraph 2 of Tenth schedule provides that an independent member shall be disqualified for being a member of the House if he joins any political party after such election.
To maintain and sustain the process of democratic governance the Fifty-second Amendment Act, 1985, made necessary changes in Articles 101, 102, 190 and 191, besides adding the Tenth Schedule in the Constitution. It contains provisions as to disqualification on the ground of defection along with certain exceptions.
Are there any exceptions under the law?
Yes, legislators may change their party without the risk of disqualification in certain circumstances. The law allows a party to merge with or into another party provided that at least two-thirds of its legislators are in favour of the merger. In such a scenario, neither the members who decide to merge, nor the ones who stay with the original party will face disqualification.
Various expert committees have recommended that rather than the Presiding Officer, the decision to disqualify a member should be made by the President (in case of MPs) or the Governor (in case of MLAs) on the advice of the Election Commission.This would be similar to the process followed for disqualification in case the person holds an office of profit (i.e. the person holds an office under the central or state government which carries a remuneration, and has not been excluded in a list made by the legislature).
Judgements
On the pattern of Lily Thomas case, the Apex Court should issue directions that the defected person automatically should be treated as disqualified and s/he should not be allowed to be elected for either house at least for 5 years. Such defectors should also not be allowed to be appointed as a minister even for a single day. In addition to this, the benefit of Article 75 (5) and Article 164 (4) should not be available to the defectors.
In Keisham Meghachandra Singh v. The Hon’ble Speaker Manipur Legislative Assembly & Ors., the Supreme Court has held that “Speaker of the Legislative Assembly should decide on a petition seeking disqualification of a member under 10th Schedule of the Constitution within a period of three months, in the absence of exceptional reasons. The bench also acknowledged the problem of Speakers acting in a partisan manner due to their political loyalties. Therefore, the bench suggested that “the Parliament should amend the Constitution to provide for an independent mechanism, such as a Permanent Tribunal headed by retired judges, to decide disputes under Tenth Schedule.”
The whole object of Anti-defection law was to discipline the legislators but it seems that this law could not contain defection, the politicians continuously changing their party affiliation and this system of political turncoats has become rampant, especially after 2014. Defectors by changing their party affiliation allow other political party to form government which was rejected by the voters in the election. The ensuing changes in the government composition following defection in Arunachal Pradesh (2016), Goa (2019), Manipur (Manipur), Karnataka (2019), Madhya Pradesh (2020) and currently the ongoing power struggle in Rajasthan are some of the illustrations of this assertion.
Defectors have no fear as they mostly join the ruling party and the Speaker who has the power to disqualify belongs to the ruling party, therefore, the chances are too remote that the Speaker being political person will decide against the will of his/her political party.
Conclusion
It can be concluded that this legislation has proved to be completely ineffective in curbing the menace of defection. It is really difficult to prevent defections because politician mostly join ruling the party in the House to which even the Speaker belongs to. The lack of non-partisan and ethical conduct by those in privileged positions such as that of the Speaker further jeopardizes the efficacy of the Anti-Defection Law in India. Some hope could be seen in the Apex Court’s suggestion given in Keisham Meghachandra Singh case, whereby it stated that “the power should be vested in independent tribunal” as also suggested by the different Commissions in the past. The government should do the needful in this direction while adopting a more stringent approach.
Most times as we’re improving to strive and achieve our targets, there would still be those negative people who couldn’t see our potential and would still try to demotivate us and drag us down.Judgmental people are everywhere. You may also be one of them and not realize it! Yet no matter whether you condemn or not, we definitely both know whether others criticize us. They ‘re pessimistic, exhausting and not letting you feel good. So what can you do to deal with that?
Here are some guidelines about how to deal with them:
Don’t take anything personally:
Remember one thing if you are confident in what you doing is right you should not care on what other is commenting on you. Rather, you can not take their thing seriously with what you’ve been focusing on. And we typically think someone is doing it for us. But the truth is that massively-judiciary people criticize everyone and everything – especially themselves.So remember this: It’s not YOU … it’s THEM.
Be Compassionate:
People are never born of judgement, they are influenced by their environment or the actions without their parents, etc. And you will still have compassion because you choose to be happy. But if you want someone to be truly happy, then you should be compassionate.
Look it as a life lesson:
The sooner we respond favorably on these people in criticism, the quicker it will motivate us to develop our lives positively. So before that, we should decide if the message is beneficial or harmful. Whether it is good, continue to focus actively on it, and if it is detrimental, then strive and avoid such negative comments and move on.
Don’t sink to their level:
Like I already said, anytime anyone criticizes us, our first reaction is to be protective and to defend ourselves. Or maybe you’re just fighting back. Yet doing so doesn’t make you any greater than others do. When you don’t like their actions, don’t give them the ability to affect who you are. Don’t let their criticism transform you into an irritable, crab-like person who enjoys a judgmental game with them.
See them as if they are still child:
We don’t expect children to learn everything of it. That’s why we forgive and embrace negative actions by children more frequently than we can from adults. We think he’s not mature enough to understand. however if we consider children as a infant – somebody that’s only learning and progressing and who understands nothing better – so it’s easier to be more forgiving towards them.
Reframe it:
When you change your attention from these judgmental people to focus on the reality that you need to enhance your professional life, your life will become easier indirectly. And after that you won’t really worry about their opinions or perceptions on you and that would also allow you to raise confidence.
Have an attitude of gratitude.
Be thankful that you would not have been abused and teared down by your parents as their parents did. Be grateful that you’re more like other people than they. For any case you will still consider something about which to be thankful – particularly though it’s a tough one. “Gratitude makes sense of our past, brings peace for today and creates a vision for tomorrow.”
Focus your attention on other people who love and support you.
If you can stop or detach your life from the judgmental person, so do it! And if your own parent is the judgmental one, it doesn’t mean you have to speak to her every day. You should set yourself to distance from them. Try staying under the ground as far as possible, if the person is your boss. The individual can forget to criticize you, and instead go and choose someone else.“You have to surround yourself with people who love you and want the best for you.”
Only because somebody is judging you wouldn’t mean what they’re saying is true! Many judgmental people find pleasure in bringing down someone and attempt and feel better for themselves. But don’t let them pull you down.
“If you accept the expectations of others, especially negative ones, then you never will change the outcome.” – Michael Jordan
Sex Slavery and it’s buying and selling is attaching the right of ownership over one or more people with the intent of coercing or otherwise forcing them to engage in sexual activities. This includes forced labour, reducing a person to a servile status (including forced marriage) and sex trafficking persons, such as the sexual trafficking of children. Sexual slavery is a particular form of enslavement which includes limitations on one’s autonomy, freedom of movement and power to decide matters relating to one’s sexual activity. Thus, the crime also includes forced marriages, domestic servitude or other forced labour that ultimately involves forced sexual activity. In contrast to the crime of rape, which is a completed offence, sexual slavery constitutes a continuing offence. … Forms of sexual slavery can, for example, be practices such as the detention of women in “rape camps” or “comfort stations”, forced temporary “marriages” to soldiers and other practices involving the treatment of women as chattel, and as such, violations of the peremptory norm prohibiting slavery.
Commercial sexual exploitation of adults
Commercial sexual exploitation of adults (often referred to as “sex trafficking” is a type of human trafficking involving the recruitment, transportation, transfer, harbouring or receipt of people, by coercive or abusive means for the purpose of sexual exploitation. Commercial sexual exploitation is not the only form of human trafficking and estimates vary as to the percentage of human trafficking which is for the purpose of transporting someone into sexual slavery.
Commercial sexual exploitation of children
Commercial sexual exploitation of children (CSEC) includes child prostitution (or child sex trafficking), child sex tourism, child pornography, or other forms of transactional sex with children. The Youth Advocate Program International (YAPI) describes CSEC as a form of coercion and violence against children and a contemporary form of slavery.
””Types of Sex Slavery:””
Child prostitution- Child prostitution, or child sex trafficking, is a form of sexual slavery. It is the commercial sexual exploitation of children, in which a child performs the services of prostitution, usually for the financial benefit of an adult. In some parts of the world, child prostitution is tolerated or ignored by the authorities. Reflecting an attitude which prevails in many developing countries, a judge from Honduras said, on condition of anonymity: “If the victim [the child prostitute] is older than 12, if he or she refuses to file a complaint and if the parents clearly profit from their child’s commerce, we tend to look the other way”.
Child sex tourism- Child sex tourism is a form child sex trafficking, and is mainly centred on buying and selling children into sexual slavery. It is when an adult travels to a foreign country for the purpose of engaging in commercially facilitated child sexual abuse. Child sex tourism results in both mental and physical consequences for the exploited children, who may include “disease (including HIV/AIDS), drug addiction, pregnancy, malnutrition, social ostracism, and possibly death”, accord to the State Department of the United States. Thailand, Cambodia, India, Brazil and Mexico have been identified as leading hotspots of child sexual exploitation.
Cybersex trafficking- Victims of cybersex trafficking, primarily women and children, are sex slaves who are trafficked and then forced to perform in live streaming] shows involving coerced sex acts or rape on webcam. They are usually made to watch the paying consumers on shared screens and follow their orders. It occurs in ‘cybersex dens,’ which are rooms equipped with webcams.
Forced marriage- A forced marriage is a marriage where one or both participants are married, without their freely given consent. Forced marriage is a form of sexual slavery. Causes for forced marriages include customs such as bride price and dowry; poverty; the importance given to female premarital virginity; “family honour”; the fact that marriage is considered in certain communities a social arrangement between the extended families of the bride and groom; limited education and economic options; perceived protection of cultural or religious traditions; assisting immigration.
Bride kidnapping and raptio- Bride kidnapping, also known as marriage by abduction or marriage by captive, is a form of forced marriage practised in some traditional cultures. Though the motivations behind bride kidnapping vary by region, the cultures with traditions of marriage by abduction are generally patriarchal with a strong social stigma against sex or pregnancy outside marriage and illegitimate births. In most cases, however, the men who resort to capturing a wife is often of lower social status, whether because of poverty, disease, poor character or criminality. In some cases, the couple collude together to elope under the guise of a bride kidnapping, presenting their parents with a fait accomplishment. These men are sometimes deterred from legitimately seeking a wife because of the payment the woman’s family expects, the bride price (not to be confused with a dowry, paid by the woman’s family).
”’Health Implications”’
Victims of sex trafficking are likely exposed to adverse conditions that can negatively affect their physical, mental, and emotional health. Physicians, nurses, midwives, and other healthcare providers can play critical roles in helping to identify victims of sex trafficking as a first step in providing both assistance and advocacy for affected women and girls. As a provider, one can play an essential role in providing interventions to improve physical and psychological health among victims and advocating on behalf of victims to help improve their social circumstances.
Physical-
Sex trafficking victims are particularly susceptible to sexually transmitted infections such as gonorrhoea, syphilis, urinary tract infections, and pubic lice. Human immunodeficiency virus/ AIDS infection is known to be prevalent.They may experience pelvic pain, vaginal/anal tearing, rectal trauma, and/or urinary difficulties as a result of commercial sex work. Sex trafficking victims are often physically abused and tortured. Providers should screen women and girls for physical injuries such as broken bones, bruises, burns, scars, and broken teeth/ dental problems. A history of concussions and head trauma should also be taken to screen for traumatic brain injury, which may result in memory loss, dizziness, headaches, and numbness. Food deprivation represents an indirect form of physical harm that also should be considered by screening victims for malnutrition.
Psychological-
Victims of sex trafficking may face moderate to severe psychological trauma from daily mental, emotional, and psychological abuse and torture. Post-traumatic stress disorder, acute anxiety, and depression are all common psychological issues among sex industry workers. Providers should screen for feelings of helplessness, shame, humiliation, distrust, self-hatred, disbelief, denial, suicidal thoughts, disorientation, confusion, and phobias among suspected victims. It is not uncommon to encounter sex trafficking victims in their early 30s who have become psychologically and emotionally disabled from working in prostitution.
Social-
Although there are insufficient data that report the social effects of sex trafficking, anecdotal evidence suggests that victims have a greater prevalence of illiteracy, homelessness, poverty, and societal isolation. Trafficked women engaging in sex work tend to have fewer resources, limited options, and increased vulnerability to violence and abuse than women who are not trafficked.
”Conclusions”
Sex trafficking involves some form of forced or coerced sexual exploitation that is not limited to prostitution, and has become a significant and growing problem in both the United States and the larger global community. The costs to society include the degradation of human and women’s rights, poor public health, disrupted communities, and diminished social development. Victims of sex trafficking acquire adverse physical and psychological health conditions and social disadvantages. Thus, sex trafficking is a critical health issue with broader social implications that requires both medical and legal attention. Healthcare professionals can work to improve the screening, identification, and assistance of victims of sex trafficking in a clinical setting and help these women and girls access legal and social services.
The NEW EDUCATION POLICY 2020 was passed on 29 July 2020, Wednesday by the Union Cabinet chaired by the Prime Minister Narendra Modi. The policy aims to bring reform in the schools and higher education systems in India, as stated by the Ministry of Human Resource Development. It is a replacement for the National Policy on Education 1986. The aim of the policy is to create an education system which has a direct contribution in transformation of the country, to provide high-quality education to all, and to make India a global knowledge superpower. The cabinet has also approved to change the name of the HRD ministry to Education Ministry.
The key highlights of the policy are as follows:
1.Mother tongue or local or regional language to be the medium for instructions till class fifth (or if preferable till class eighth and beyond). Sanskrit shall e offered at all the levels of the school and higher education as an option however; the policy clearly states that no language shall be imposed on any student.
2.The 10+2 structure has been replaced with the 5+3+3+4 structure, which includes 12 years of school and three years of the pre-school. The division is as follows – Foundational Stage (ages 3-8), Pre-Primary stage (ages 8-11), Preparatory Stage (ages 11-14), and Secondary Stage (ages 14-18).
3.School students now have to only sit for three exams at classes 3, 5, and 8, rather than sitting in exams every year. The assessment for other years will have a regular and formative style that promotes learning and development as well as tests higher-order skills of the students.
4.For classes 10 and 12, the board exams will continue to take place but they will be re-designed with a ‘holistic development’ and the standards for the same will be established by a new national assessment centre – PARAKH (Performance Assessment, Review, and Analysis of Knowledge for Holistic Development.
5.A singular regulatory body i.e. Higher Education Council of India (HECI) will be set up to regulate all higher education institutions except for legal and medical colleges. The goal of the council is to increase the enrolment rate in college from 26.3% to 50% (by 2035). The main focus will be on the institutions that have more than 3000 students.
6.The HECI will have 4 independent bodies – National Higher Education Regulatory Council for regulation, General Education Council to set the standards, Higher Education Grants Council for funding, and the National Accreditation Council for accreditation.
7.The policy aims to reduce the load of the curriculum on the students and allowing them to become ‘multi-disciplinary’ and ‘multi-lingual’. There will also be no distinction between arts and science streams, or between the curricular or extracurricular activities, or between the vocational and academic streams.
8.It also proposes a 4 year under graduate programme with multiple exit options for the students to have flexibility. A multi disciplinary bachelors’ degree will be given after completing 4 years of study. A diploma will be given to those who exit the degree after two years. A vocational/professional course degree will be given to those who leave after 12 months of studying. Also the MPhil (Masters of Philosophy) courses are to be discontinued.
9.For the reason of quality, there will be common regulations for both the private and the public higher education institutions in the country. There will also be a Common Entrance Exam that will be conducted by the National Testing Agency (NTA) for admissions to universities and higher education institutions.
10. There will also be establishment of more online courses in regional languages. Virtual labs will also be developed and a National Education Technology Forum(NEFT) will also be created.
You must be logged in to post a comment.