SC refuses to relax ban on crackers in NCR, rejects traders' plea

Agencies
October 13, 2017

New Delhi, Oct 13: The Supreme Court today refused to relax the ban on the sale of firecrackers in Delhi and the national capital region till October 31.

The apex court dismissed the plea of firecracker traders who had sought relaxation in the October 9 ban order and sought permission to sell crackers for at least a day or two before Diwali on October 19.

The top court also expressed pain over certain people trying to give its order a political colour, after advocate Prashant Bhushan, appearing for one of the parties, referred to certain statements made by some political leaders.

A bench of Justices A K Sikri and Ashok Bhushan said that relaxing the ban order "would be against the very spirit" of the verdict passed by the top court.

The bench also said that people would burst firecrackers which they have purchased before the October 9 order.

"We are not going to relax the order as far as sale of firecrackers is concerned," the bench said and directed the Delhi Police to implement the order.

"Sale of firecrackers which has already taken place before the ban order. People will burst it and that will be sufficient. Anyhow, it is not going to be a cracker-free Diwali," the court said.

At the outset, senior advocate Mukul Rohatgi, appearing for the firecracker traders, suggested to the bench that the sale of crackers should be allowed at least a day or two before Diwali.

He also suggested that the court could restrict the time for bursting firecrackers or its sale.

The traders had on October 11 said their licences were revived in pursuance of the court's order passed on September 12 and they had procured firecrackers for sale during Diwali.

They had told the top court that a huge amount of money has been invested by them after their licences were revived and the latest order would cause massive loss to them.

The apex court, while banning the sale of firecrackers till October 31, had said its September 12 order temporarily lifting the stay and permitting sale of firecrackers, would be made effective only from November one.

It had said its November 11, 2016 order suspending the licences "should be given one chance to test itself" to see if there is a positive effect of this, particularly during Diwali.

Comments

jay
 - 
Tuesday, 17 Oct 2017

The destruction of the environment is not only limited to Deepavali. Think about many other celebrations. During Dussehra and Ganesh Puja, loudspeakers blare from morning to night. Large-scale disturbance and noise take place. Can’t we reduce this? The number of idols we immerse in water – don’t they cause pollution in the water bodies? We followed untouchability and Sati for years, but eventually banned them. Any rituals or traditions hurting any individual’s or group’s sentiments or affecting the environment should be stopped or limited. We must think of innovative ideas which will reduce the use of crackers.

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
August 7,2020

Kottayam, Aug 7: A trial court in Kottayam on Friday granted bail to Bishop Franco Mulakkal, accused of raping a nun in Kerala, with stringent conditions and directed him to be present on the dates of hearing of the case.

The Additional Sessions Court had cancelled the bail granted to the Bishop on July 13 for failing to appear for the trial and issued a Non Bailable Warrant against him.

Mulakkal was present in the Court on Friday when it considered the matter.

Granting bail, the court directed him not to leave the state till the chargesheet is read out to him on August 13 and to be present in court on the dates of hearing of the case.

The Court also directed him to offer fresh sureties and bail bonds.

On July 13, Mulakkal’s counsel had informed the court that his client could not appear as he had been in self quarantine due to his primary contact with a COVID-19 infected person.

The next day, the former Jalandhar Bishop had tested positive for coronavirus.

The prosecution informed the Court that Mulakkal had not produced the COVID negative certificate, to which the Court observed that the state Health Department can take necessary action on this issue.

The Supreme Court on Wednesday had directed Mulakkal to face trial as it dismissed his plea seeking discharge in the rape case lodged against him by the nun belonging to a congregation under Jalandhar diocese, saying there was no merit in his petition.

A bench of Chief Justice S A Bobde, A S Bopanna and V Ramasubramanian had told the counsel for Bishop that the court is not saying anything on merit, but is dismissing the plea on the issue of discharge from the case.

Mulakkal, in his plea had challenged the July 7 Kerala High Court order, dismissing his discharge plea in the rape case filed by the nun.

The High Court had asked the deposed Bishop of Jalandhar diocese to stand for trial in the rape case, which was registered on the basis of a complaint filed by the nun.

The senior priest of the Roman Catholic Church had filed the revision petition following the dismissal of his discharge plea by a trial court in March this year.

The rape case against the Bishop was registered by police in Kottayam district.

In her complaint to the police in June, 2018, the nun had alleged that she was subjected to sexual abuse by the bishop during the period between 2014 and 2016.

The bishop, who was arrested by the Special Investigation team, which probed the case, charged him with wrongful confinement, rape, unnatural sex and criminal intimidation.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
March 19,2020

New Delhi, Mar 19: Lawyer of Mukesh Singh, who is one of the four death row convicts in the Nirbhaya gang-rape and murder case, on Thursday mentioned a petition before the Registrar of the Supreme Court seeking an urgent hearing in the matter.

Advocate Manohar Lal Sharma, through the petition, sought directions to bring call record, documents and reports of his client through any probe agency and passed appropriate directions and measure to ensure justice in the matter.

The petition, however, has not sought a stay on the execution, which is scheduled for the morning of March 20. The petition is likely to be taken up for hearing today.

Earlier today, the apex court dismissed the curative petition of Pawan Gupta, another convict in the matter, who claimed juvenility at the time of the crime.

This comes as the four convicts -- Mukesh Singh, Akshay Singh Thakur, Vinay Sharma and Pawan Gupta -- are scheduled to be hanged at 5.30 am on March 20.

Meanwhile, several other petitions are also pending in the matter in different courts.

The case pertains to the brutal gang-rape and killing of a 23-year-old paramedical student in a moving bus on the night of December 16, 2012, by six people including a juvenile in the national capital. The woman had died at a Singapore hospital a few days later.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
May 21,2020

Bengaluru, May 21: The COVID-19-induced lockdown saw a spurt in crybercrimes in India with Kerala recording the highest number during the period, according to an analysis of IT security solutions provider K7 Computing.

The report analyses various cyberattacks within India during the pandemic and reveals that threat actors targeted the States with COVID-19-themed attacks aimed at exploiting user trust.

The sudden surge in the frequency of attacks witnessed from February 2020 to mid-April 2020 indicates that scamsters across the world were exploiting the widespread panic around coronavirus at both the individual and corporate level, the company said in a statement.

These attacks aimed to compromise computers and mobile devices to gain access to users confidential data, banking details and cryptocurrency accounts.

The key threats seen during this period ranged from phishing attacks to rogue apps disguised as COVID-19 information apps that targeted users sensitive data.

Phishing attacks were noticed more in Tier-II and Tier-III cities while the metros fared better.

Smaller cities saw over 250 attacks being blocked per 10,000 users.

Users from Ghaziabad and Lucknow seem to have faced almost six and four times the number of attacks, respectively, as Bengaluru users.

In Kerala, regions like Kottayam, Kannur, Kollam, and Kochi saw the highest hits with 462, 374, 236, and 147 attacks respectively, while the state as a whole saw around 2,000 attacks during the period, the highest thus far in the country.

This was followed by Punjab with 207 attacks and Tamil Nadu at 184 attacks, the statement said.

A majority of the recorded attacks were phishing attacks with sophisticated campaigns that could easily snare even the most educated users, it said.

These attacks were aimed at heightening users fears and creating a sense of urgency to take action.

The report noted phishing attacks where scamsters posed as representatives of the United States Department of the Treasury, the World Health Organisation, and the Centres for Disease Control and Prevention.

Users were encouraged to visit links that would automatically download malware on the host computer such as the Agent Tesla keylogger or Lokibot information-stealing malware, infamous banking Trojans such as Trickbot or Zeus Sphinx, and even disastrous ransomware.

Other attacks included infected COVID-19 Android apps like CoronaSafetyMask that scam users with promises of masks for an upfront payment; the spyware app Project Spy; and seemingly genuine apps that are infected with dangerous malware like banking Trojans such as Ginp, Anubis and Cerberus, it was stated.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.