Even after 2 years, Modi govt has failed to put in place a simple GST system: CAG

Agencies
July 31, 2019

New Ddelhi, Jul 31: The government has failed to put in place a simplified tax compliance regime and non-intrusive e-tax system remains elusive even after two years of the Goods and Services Tax's (GST) roll-out, according to official auditor, Comptroller and Auditor General of India (CAG).

"The complexity of return mechanism and the technical glitches resulted in roll back of invoice-matching, rendering the system prone to ITC frauds. Thus, on the whole, the envisaged GST tax compliance system is non-functional," the CAG has said a report tabled in Parliament on Tuesday.

The new indirect tax regime had kicked in July 2017. The transformation tax structure is aimed at reducing tax cascading, ushering in a common market for goods and services and bringing in a simplified, self-regulating and non-intrusive tax compliance regime.

The CAG said that one significant area where the full potential of GST roll out has not been achieved is the roll out of the simplified tax compliance regime.

While it was expected, the auditor said, that compliance would improve as the system would stabilise, all returns being filed showed a declining trend of filing from April 2018 to December 2018.

According to the report, the filing percentage of GSTR-1 returns (monthly returns on outward supplies) were throughout less in comparison to the corresponding filing of GSTR-3B returns (summary self-assessed return). The introduction of GSTR-3B resulted in filing of returns with ITC claims which could not be verified and it appears to have disincentivised filing of even GSTR-1.

"Since filing of GSTR-1 is mandatory, short-filing is an area of concern and needs to be addressed," the CAG noted.

GSTR-3B being only a summary return, short-filing of GSTR-1 implied that the tax departments did not have complete invoice level details as filed by the suppliers, which could be used to verify details given in GSTR-3B or to arrive at turnover.

During the audit, the CAG found that system validations were not aligned to the provisions of the GST Act and as a result, there were some crucial gaps in the registration module. Among various gaps, the system failed to validate and debar ineligible taxpayers from availing Composition Levy Scheme.

Comments

Mr Frank
 - 
Thursday, 1 Aug 2019

No one can question Modi or Shah bill already passed.

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
June 15,2020

Nuapada, Jun 15: In a shocking incident, a 70-year-old elderly woman had to drag her 100-year-old bedridden mother on a cot to the nearby bank to withdraw pension money of Rs 1,500.

The incident came to light after a video of the woman dragging her bedridden mother on a cot to a bank in Odisha's Nuapada district went viral on social media.

The woman from Bargaon village dragged her mother on the cot after the bank official allegedly asked for physical verification. The incident took place on June 9.

"I went to the bank several times in last three months and requested the bank official to release the pension amount. However, the official informed that they would release the pension if I bring my mother to the branch," said Punjimati Dei.

Bank manager Ajit Pradhan allegedly asked Dei to bring her bedridden mother Labhe Baghel to the bank.

Her mother is an account holder under Jan Dhan Yojana of the Central government.

The Centre had announced Rs 500 monthly assistance for women Jan Dhan bank account holders from April to June in view of the COVID-19 situation.

A district administration official informed that the woman reached the bank with her mother before the manager could visit her home for the verification.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
February 29,2020

Kochi, Feb 29: When Major Abdul Rahim, a soldier in the Afghan army, died in a bomb blast in Kabul on February 19, a tear was shed for him in far away Ernakulam district of Kerala.

The major had received a transplant of hands from Eloor native T G Joseph back in 2015, and the latter’s family had grown attached to the Afghan soldier.

Maj. Abdul Rahim, a bomb disposal expert, had lost his hands in an explosion in 2012. For three years thereafter, he struggled with his handicap. Then, when 54-year-old Joseph passed away in a road accident, it was decided to give his hands to the Afghan major.

The transplant procedure was successfully performed by a team of doctors led by Dr. Subrahmania Iyer at the Amrita Institute of Medical Sciences in Kochi.

After the transplant and an intensive spell of physiotherapy, Abdul Rahim could regain a considerable part of his hands’ functions. He rejoined the army and returned to defuse bombs in his war-torn country.

In gratitude, Major Abdul Rahim would visit Kochi every year to meet Joseph’s family. 

“We were shocked to hear of the demise of Major Abdul Rahim. Though Joseph left us, a part of him lived on. Abdul Rahim was a living memorial for us. Whenever he came to the Amrita institute for a consultation, we used to visit him,” Joseph’s wife was quoted as saying by Mathrubhoomi daily.

Major Abdul Rahim struck up a good friendship with his predecessor, in a way of speaking: the first person to have had a successful hand transplant at the Amrita Institute of Medical Sciences. T R Manu became a close friend of the Afghan solider and kept regularly in touch.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
May 21,2020

Bengaluru, May 21: The COVID-19-induced lockdown saw a spurt in crybercrimes in India with Kerala recording the highest number during the period, according to an analysis of IT security solutions provider K7 Computing.

The report analyses various cyberattacks within India during the pandemic and reveals that threat actors targeted the States with COVID-19-themed attacks aimed at exploiting user trust.

The sudden surge in the frequency of attacks witnessed from February 2020 to mid-April 2020 indicates that scamsters across the world were exploiting the widespread panic around coronavirus at both the individual and corporate level, the company said in a statement.

These attacks aimed to compromise computers and mobile devices to gain access to users confidential data, banking details and cryptocurrency accounts.

The key threats seen during this period ranged from phishing attacks to rogue apps disguised as COVID-19 information apps that targeted users sensitive data.

Phishing attacks were noticed more in Tier-II and Tier-III cities while the metros fared better.

Smaller cities saw over 250 attacks being blocked per 10,000 users.

Users from Ghaziabad and Lucknow seem to have faced almost six and four times the number of attacks, respectively, as Bengaluru users.

In Kerala, regions like Kottayam, Kannur, Kollam, and Kochi saw the highest hits with 462, 374, 236, and 147 attacks respectively, while the state as a whole saw around 2,000 attacks during the period, the highest thus far in the country.

This was followed by Punjab with 207 attacks and Tamil Nadu at 184 attacks, the statement said.

A majority of the recorded attacks were phishing attacks with sophisticated campaigns that could easily snare even the most educated users, it said.

These attacks were aimed at heightening users fears and creating a sense of urgency to take action.

The report noted phishing attacks where scamsters posed as representatives of the United States Department of the Treasury, the World Health Organisation, and the Centres for Disease Control and Prevention.

Users were encouraged to visit links that would automatically download malware on the host computer such as the Agent Tesla keylogger or Lokibot information-stealing malware, infamous banking Trojans such as Trickbot or Zeus Sphinx, and even disastrous ransomware.

Other attacks included infected COVID-19 Android apps like CoronaSafetyMask that scam users with promises of masks for an upfront payment; the spyware app Project Spy; and seemingly genuine apps that are infected with dangerous malware like banking Trojans such as Ginp, Anubis and Cerberus, it was stated.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.