These greedy and parasitic lawyers would only bribe them and they are not at all concerned with the welfare of the people or the delivery of justice to them. Hence these poor people don’t visit the courts for justice. Other problems that are faced by the Indian Judicial System is the pendency of the cases…
Category: #law
The urgency to work on our Legal Language
The first sound of the child coming into the world is filled with discomfort. The first cry of the baby makes sure he is alive. At first the child does not know how to behave in the society, in the social circle and how to express himself. Gradually, he learns to express himself through the…
Current Problems in Indian Judiciary System – Part 1
INTRODUCTION- Indian Judicial System has a very glorious history. The Indian Judiciary has evolved overtime since ancient times till the modern period India has a recorded legal history starting from the Vedic Ages. It is believed that ancient India had some sort of legal system in place even during the Bronze Age and the Indus…
Critical Analysis of Indian Judiciary
The Indian judicial system is one of the important pillars of democracy. It has its roots since ancient times when the judicial system worked according to the kings and emperors, british rulers and now working as a sovereign and independent body. The judicial system in India has a systematic hierarchy of courts – the Supreme…
Common Rights of Every Indian Citizens
In this winter’s many of us go for vacations, but have we ever thought that whether a police officer gets to enjoy his vacation? So, the answer is no, a police officer is never off duty. Whether he is in his dress code or not he is always on duty. There are many such common…
CERTIFYING AUTHORITY IN CYBER LAW (PART 1)
A Certificate Authority (or Certification Authority) is an entity that issues digital certificates that contain a public key and therefore the identity of the owner. The private key’s not made available to the general public generally but kept secret by the end-user who generates the key pair. Further, the certificate is also working as a…
The Personal Data Protection Bill, 2019
The Personal Data Protection Bill, 2019 was introduced in Lok Sabha on December 11, 2019. The Bill seeks to supply for cover of private data of a private , and establishes a knowledge Protection Authority. • Applicability: The Bill provides for the processing of private data by: (i) Government, (ii) Companies incorporated in India, and…
Personal data and data protection
Data is of two types: a. personal and b. non-personal data. Personal means those characteristics, traits or attributes of identity that can be used to identify an individual. Non-personal data includes aggregated data through which an individual cannot be identified. Data protection means to protect or to minimise intrusion into the privacy of an individual…
Nuisance
Nuisance basically means hurting anyone or causing injury to a person by the deeds of another person. It includes hurting or causing injury to the person by causing nuisance of lands, tenements, or hereditaments and it does not amount to the trespass. The word ‘nuisance’ is derived from the word nuire, to do hurt, or…
Cyber Law : Provisions in Information Technology Act, 2000 associated with data protection and security
After its amendments in 2008, the IT Act, 2000 now consists of multiple provisions handling data protection, mandatory privacy policies, and penalties to be imposed on violations of such privacy policies. Some relevant provisions of the IT Act are as follows: 1. Section 43 (a), (b) and (j): This Section provides that, a person, who…
Women Empowerment in India
Women Empowerment in India has become the most important matter of discussion in recent times because women in the earlier were not given the equal role, status, value and affection in the society. So all around the world that how to improve the status of the women in society and how should they get the…
Search and Seizer in Cyber Crime investigation
The Cybercrime has no physical boundaries. The criminals seeking information stored in computers with dial-in-access can access the information virtually from anywhere. The quantity of data that can be stolen or the level and amount of damage that can be caused by malicious programming code may be limited only by the speed of the network…