Four-day Lok Sabha logjam over FDI ends

November 29, 2012

fdivoting

New Delhi, November 29: The four-day logjam in Lok Sabha over the FDI in retail ended today with Speaker Meira Kumar allowing a discussion on the subject under a rule that entails voting.

 

"I have received 30 notices for discussion on FDI in multi-brand retail under Rule 184. I have admitted the motion to allow the discussion. The date and the time will be decided later," the Speaker announced in the House.

 

Her observation came minutes after the Leader of the House Sushilkumar Shinde, Parliamentary Affairs Minister Kamalnath and Leader of the Opposition Sushma Swaraj met her in her chamber before the House met for the day.

 

Government had yesterday itself given clear signals that it has no problem in having a discussion on FDI under a rule that entails voting after Nath held consultations with Swaraj and her Rajya Sabha counterpart Arun Jaitley.

 

Swaraj welcomed the decision of the Speaker. "I welcome the decision. I assure you smooth functioning of the House," she said immediately after the Speaker allowed it.

 

Parliament has not been functioning since Winter Session began on November 22 with the Left and the Right making a common cause on the demand for a discussion under a rule that entails voting.

 

An indication of a resolution to the logjam was available in the morning itself when Kamalnath told reporters that he was hopeful that Parliament will run smoothly.

 

Yielding to Opposition pressure, Government agreed to the measure to discuss the issue under Rule 184 to ensure "smooth functioning" of the House as opposition parties stuck to their demand.

 

Parliament failed to transact any business for four consecutive days 22 despite government's efforts to break the logjam over FDI through an all-party meeting.

 

The all- party meeting on Monday saw SP and BSP providing comfort to the government by not insisting on voting. UPA constituent DMK, which has been opposing FDI in multi-brand retail, also finally agreed to vote with the government.

 

Trinamool Congress, which had given a notice for no-confidence motion last week over FDI issue, had sprung a surprise by not pressing for vote during the meeting.

 

TMC MPs, however, protested against FDI at Parliament gate today and shouted slogans against the UPA government over its measures like FDI in multi-brand retail and proposed pension reforms.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
February 4,2020

New Delhi, Feb 4: Saying the matter had been adjourned many times and it will have to hear it someday, the Supreme Court on Tuesday fixed April 14 for hearing a plea by Zakia Jafri, wife of slain MP Ehsan Jafri, challenging the SIT's clean chit to then Gujarat chief minister Narendra Modi in the 2002 riots.

A bench comprising Justices A M Khanwilkar and Dinesh Maheshwari posted the matter for hearing in April after Zakia's counsel sought an adjournment and urged the court to post it after the Holi vacation.

When advocate Aparna Bhat, appearing for Zakia, told the court that the issue in the matter is contentious, the bench said, "It has been adjourned so many times, whatever it is, we will have to hear it someday. Take one date and make sure you all are available." Zakia had filed a petition in the apex court in 2018 challenging the Gujarat High Court's October 5, 2017 order rejecting her plea against the decision of the Special Investigation Team.

Ehsan Jafri was among the 68 people killed at Gulberg Society on February 28, 2002, a day after the S-6 Coach of the Sabarmati Express was burnt at Godhra killing 59 people and triggering riots in Gujarat.

On February 8, 2012, the SIT filed a closure report giving a clean chit to Modi and 63 others, including senior government officials, saying there was "no prosecutable evidence" against them.

Comments

Althaf
 - 
Tuesday, 4 Feb 2020

No use.. will Supreme court gives justice??? 

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
June 24,2020

New Delhi, Jun 24: Union Civil Aviation Minister Hardeep Singh Puri on Tuesday said that nearly 1,25,000 Indians have returned from different countries under the Vande Bharat Mission.

He informed that 6,037 people returned to India from overseas on June 23.

"Vande Bharat continues to be a mission of hope and happiness for stranded and distressed Indians around the world. So far, nearly 125K Indians have come back on these evacuation flights and nearly 43K have flown out of India. Today (on Tuesday) 6,037 people returned from different countries," Puri said in a tweet.

As many as 2,50,087 Indian nationals stranded abroad have been repatriated since the beginning of Vande Bharat Mission last month, the Ministry of External Affairs (MEA) said last week.

The Vande Bharat Mission, which started from May 7 to evacuate Indians stranded abroad due to coronavirus pandemic, is in its third phase.
The recent phase commenced on June 11.

Under the third phase, India would have 550 flights including 191 feeder flights.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
May 21,2020

Bengaluru, May 21: The COVID-19-induced lockdown saw a spurt in crybercrimes in India with Kerala recording the highest number during the period, according to an analysis of IT security solutions provider K7 Computing.

The report analyses various cyberattacks within India during the pandemic and reveals that threat actors targeted the States with COVID-19-themed attacks aimed at exploiting user trust.

The sudden surge in the frequency of attacks witnessed from February 2020 to mid-April 2020 indicates that scamsters across the world were exploiting the widespread panic around coronavirus at both the individual and corporate level, the company said in a statement.

These attacks aimed to compromise computers and mobile devices to gain access to users confidential data, banking details and cryptocurrency accounts.

The key threats seen during this period ranged from phishing attacks to rogue apps disguised as COVID-19 information apps that targeted users sensitive data.

Phishing attacks were noticed more in Tier-II and Tier-III cities while the metros fared better.

Smaller cities saw over 250 attacks being blocked per 10,000 users.

Users from Ghaziabad and Lucknow seem to have faced almost six and four times the number of attacks, respectively, as Bengaluru users.

In Kerala, regions like Kottayam, Kannur, Kollam, and Kochi saw the highest hits with 462, 374, 236, and 147 attacks respectively, while the state as a whole saw around 2,000 attacks during the period, the highest thus far in the country.

This was followed by Punjab with 207 attacks and Tamil Nadu at 184 attacks, the statement said.

A majority of the recorded attacks were phishing attacks with sophisticated campaigns that could easily snare even the most educated users, it said.

These attacks were aimed at heightening users fears and creating a sense of urgency to take action.

The report noted phishing attacks where scamsters posed as representatives of the United States Department of the Treasury, the World Health Organisation, and the Centres for Disease Control and Prevention.

Users were encouraged to visit links that would automatically download malware on the host computer such as the Agent Tesla keylogger or Lokibot information-stealing malware, infamous banking Trojans such as Trickbot or Zeus Sphinx, and even disastrous ransomware.

Other attacks included infected COVID-19 Android apps like CoronaSafetyMask that scam users with promises of masks for an upfront payment; the spyware app Project Spy; and seemingly genuine apps that are infected with dangerous malware like banking Trojans such as Ginp, Anubis and Cerberus, it was stated.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.