6 resultados para license violations

em Cochin University of Science


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Human rights are the basic rights of every individual against the state or any other public authority as a member of the human family irrespective of any other consideration. Thus every individual of the society has the inherent right to be treated with dignity in all situations including arrest and keeping in custody by the police. Rights of an individual in police custody are protected basically by the Indian Constitution and by various other laws like Code of Criminal Procedure, Evidence Act, Indian Penal Code and Protection of Human Rights Act. The term `custody' is defined neither in procedural nor in substantive laws. The word custody means protective care. The expression `police custody' as used in sec. 27 of Evidence Act does not necessarily mean formal arrest. In India with special reference to Kerala and evolution and development of the concept of human rights and various kinds of human rights violations in police custody in different stages of history. Human rights activists and various voluntary organisations reveals that there are so many factors contributing towards the causes of violations of human rights by police. Sociological causes like ambivalent outlook of the society with respect to the use of third degree methods by the police, economic causes like meager salary and inadequate living conditions, rampant corruption in police service, unnecessary political interference in the crime investigation, work load of police personnel without any time limit and periodic holidays, unnecessary pressure from superior police officers and the general public for speedy detection causing great mental strain to the investigating officers, defective system of recruitment and training, imperfect system of investigation and lack of public co-operation are some of the factors identified in the field survey towards the causes of violations of human rights in police custody.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This thesis is an attempt to explore the problems faced by Indian Women and to examine the ways in which the human rights of women could be better protected in the light of international movements with special reference to national legislation and judicial decisions.The evolution of human rights from early period to Universal Declaration of Human Rights, 1948 is traced in the first chapter. The second chapter deals with the evolution of human rights in India. The evolution of fundamental rights and directive principles and the role played by the Indian Judiciary in enforcing the human rights enumerated in various international instruments dealing with human rights are also dealt with in this chapter. The rights guaranteed to women under the various international documents have been dealt with in the third chapter.It is noticed that the international documents have had their impact in India leading to creation of machinery for protection of human rights. Organised violations of women's rights such as prostitution, devadasi system, domestic violence, sexual harassment at workplaces, the evil of dowry, female infanticide etc. have been analysed in the light of existing laws and decisional jurisprudence in the fourth chapter. The fifth chapter analyses the decisions and consensus that emerged from the world conferences on women and their impact on the Indian Society and Judiciary. The constitutional provisions and legislative provisions protecting the rights of women have been critically examined in the sixth chapter. Chapter seven deals with various mechanisms evolved to protect the human rights of women. The eighth chapter contains conclusions and suggestions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

India is a signatory to the United Nations Declaration of Human Rights 1948 and the International Covenant on Civil and Political 1966, the two major International instruments, building the foundations of the major democracies and the constitutions of the world. Both these instruments give an independent and upper position to right to privacy compared to right to freedom of speech and expression. The freedom of press finds its place under this right to freedom of speech and expression. Both these rights are the two opposite faces of the same coin. Therefore, without the right of privacy finding an equal place in Indian law compared to right to freedom of speech and expression, the working of democracy would be severely handicapped and violations against citizens rights will be on the rise It was this problem in law and need to bring a balance between these two conflicting rights that induced me to undertake this venture. This heavy burden to bring in a mechanism to balance these two rights culminated in me to undertake this thesis titled “Right to Privacy and Freedom of Press – Conflicts and Challenges

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Embedded systems, especially Wireless Sensor Nodes are highly prone to Type Safety and Memory Safety issues. Contiki, a prominent Operating System in the domain is even more affected by the problem since it makes extensive use of Type casts and Pointers. The work is an attempt to nullify the possibility of Safety violations in Contiki. We use a powerful, still efficient tool called Deputy to achieve this. We also try to automate the process

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Embedded systems, especially Wireless Sensor Nodes are highly prone to Type Safety and Memory Safety issues. Contiki, a prominent Operating System in the domain is even more affected by the problem since it makes extensive use of Type casts and Pointers. The work is an attempt to nullify the possibility of Safety violations in Contiki. We use a powerful, still efficient tool called Deputy to achieve this. We also try to automate the process

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this computerized, globalised and internet world our computer collects various types of information’s about every human being and stores them in files secreted deep on its hard drive. Files like cache, browser history and other temporary Internet files can be used to store sensitive information like logins and passwords, names addresses, and even credit card numbers. Now, a hacker can get at this information by wrong means and share with someone else or can install some nasty software on your computer that will extract your sensitive and secret information. Identity Theft posses a very serious problem to everyone today. If you have a driver’s license, a bank account, a computer, ration card number, PAN card number, ATM card or simply a social security number you are more than at risk, you are a target. Whether you are new to the idea of ID Theft, or you have some unanswered questions, we’ve compiled a quick refresher list below that should bring you up to speed. Identity theft is a term used to refer to fraud that involves pretending to be someone else in order to steal money or get other benefits. Identity theft is a serious crime, which is increasing at tremendous rate all over the world after the Internet evolution. There is widespread agreement that identity theft causes financial damage to consumers, lending institutions, retail establishments, and the economy as a whole. Surprisingly, there is little good public information available about the scope of the crime and the actual damages it inflicts. Accounts of identity theft in recent mass media and in film or literature have centered on the exploits of 'hackers' - variously lauded or reviled - who are depicted as cleverly subverting corporate firewalls or other data protection defenses to gain unauthorized access to credit card details, personnel records and other information. Reality is more complicated, with electronic identity fraud taking a range of forms. The impact of those forms is not necessarily quantifiable as a financial loss; it can involve intangible damage to reputation, time spent dealing with disinformation and exclusion from particular services because a stolen name has been used improperly. Overall we can consider electronic networks as an enabler for identity theft, with the thief for example gaining information online for action offline and the basis for theft or other injury online. As Fisher pointed out "These new forms of hightech identity and securities fraud pose serious risks to investors and brokerage firms across the globe," I am a victim of identity theft. Being a victim of identity theft I felt the need for creating an awareness among the computer and internet users particularly youngsters in India. Nearly 70 per cent of Indian‘s population are living in villages. Government of India already started providing computer and internet facilities even to the remote villages through various rural development and rural upliftment programmes. Highly educated people, established companies, world famous financial institutions are becoming victim of identity theft. The question here is how vulnerable the illiterate and innocent rural people are if they suddenly exposed to a new device through which some one can extract and exploit their personal data without their knowledge? In this research work an attempt has been made to bring out the real problems associated with Identity theft in developed countries from an economist point of view.