Bengaluru: Software engineer booked for sexually harassing colleague

News network
May 16, 2018

Bengaluru, May 16: A 27-year-old executive with a major IT firm in Electronics City alleged a colleague has been harassing her sexually since December 2016.

Acase was filed against software engineer Vijay Kumar, 32, under IPC section 354A (sexual harassment), based on the woman’s complaint.

Police said it could be a personal or financial problem between the duo. “We booked a case against Kumar on May 11 and asked him to appear for questioning. We will get to know the facts once we record his statement,” police said.

The woman claimed Kumar asked her to invest Rs 7 lakh in an e-commerce venture and started misbehaving with her when she asked about her investment. She alleged that he used to touch her indecently at the office and his house.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
January 31,2020

New Delhi, Jan 31: The Supreme Court Friday dismissed the plea filed by one of the four death row convicts in the Nirbhaya gang-rape and murder case, Pawan Gupta, seeking review of its order rejecting his juvenility claim.

The review plea filed earlier in the day was taken up for consideration in-chamber by a bench comprising Justices R Banumathi, Ashok Bhushan and A S Bopanna. 

On January 20, the apex court had rejected the plea by Pawan who had challenged the Delhi High Court's order dismissing his juvenility claim.

Advocate A P Singh, who is representing Pawan in the case, said he filed a petition on his behalf seeking review of the top court's January 20 order on Friday.

While dismissing the plea, the top court had said there was no ground to interfere with the high court order that rejected Pawan's plea and his claim was rightly rejected by the trial court as also the high court.

It had said the matter was raised earlier in the review petition before the apex court which rejected plea of juvenility taken by Pawan and another co-accused Vinay Kumar Sharma and that order has attained finality.

Singh had argued that as per his school leaving certificate, he was a minor at the time of the offence and none of the courts, including trial court and high court, ever considered his documents.

Solicitor General Tushar Mehta, appearing for the Delhi Police, had said Pawan's claim of juvenility was considered at each and every judicial forum and it will be a travesty of justice if the convict is allowed to raise the claim of juvenility repeatedly and at this point of time.

The trial court on January 17 issued black warrants for the second time for the execution of all the four convicts in the case -- Mukesh Kumar Singh (32), Pawan (25), Vinay (26) and Akshay (31) -- in Tihar jail at 6 am on February 1. Earlier, on January 7, the court had fixed January 22 as the hanging date.

As of now, only Mukesh has exhausted all his legal remedies including the clemency plea which was dismissed by President Ram Nath Kovind on January 17 and the appeal against the rejection was thrown out by the Supreme Court on January 29.

Convict Akshay's curative petition was dismissed by the top court on January 30. Another death row convict Vinay moved mercy plea before President on January 29, which is pending.

Singh has also approached the trial court seeking stay on the execution scheduled on February 1, saying the legal remedies of some of the convicts are yet to be availed.

A 23-year-old paramedic student, referred to as Nirbhaya, was gang-raped and brutally assaulted on the intervening night of December 16-17, 2012, in a moving bus in south Delhi by six people before she was thrown out on the road.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
June 24,2020

New Delhi, June 24: The United Arab Emirates (UAE) has asked Air India to not carry any passengers aboard the repatriation flights to UAE being operated under the Vande Bharat Mission.

As per the Guidelines issued by the General Civil Aviation Authority of United Arab Emirates (UAE)- Safety Decision 2020-01 (Issue 17) Q and A Guidance For Foreign Operators, on June 23, 2020 - transportation of passengers ( UAE Nationals and Non - UAE Nationals) to the United Arab Emirates on the repatriation flights is not allowed.

In view of the foregoing, all passengers including the Indian Nationals who are holding valid Residency Permit / Work Permit of United Arab Emirates and have procured approval of the UAEs Federal Authority for Identity and Citizenship- UAE (ICA) of United Arab Emirates or an approval from the General Directorate of Residency and Foreigners Affairs (GDRFA) applicable to Dubai would need to have specific approval from the Embassy of the United Arab Emirates in New Delhi and their UAE Ministry of Foreign Affairs and International Cooperation (MOFAIC) to travel from India to United Arab Emirates (UAE) on these repatriation flights.

All passengers need to comply with the quarantine and COVID-19 test requirements as per the preventive and the precautionary measures required by the appropriate health authorities, as notified from time to time.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
July 18,2020

Days after Twitter accounts of several billionaires were hacked to engineer a crypto scam, Twitter on Saturday said it is embarrassed, disappointed and, more than anything, sorry for what happened with some of its high-profile users as attackers successfully manipulated its employees and used their credentials to access internal systems, including getting through the two-factor protections.

In the first detailed summary of the "social engineering attack" via a crypto scam that hit at least 130 users this week, Twitter said for 45 of those accounts, the attackers were able to initiate a password reset, login to the account and send Tweets.

"We are continuing our forensic review of all of the accounts to confirm all actions that may have been taken. In addition, we believe they may have attempted to sell some of the usernames," the micro-blogging platform said in a statement.

For up to eight of the Twitter accounts involved, the attackers took the additional step of downloading the account's information via "Your Twitter Data" tool.

This is a tool that is meant to provide an account owner with a summary of their Twitter account details and activity.

"We are reaching out directly to any account owner where we know this to be true. None of the eight were verified accounts," said Twitter.

The company said the attackers were not able to view previous account passwords, as those are not stored in plain text or available through the tools used in the attack.

"Attackers were able to view personal information including email addresses and phone numbers, which are displayed to some users of our internal support tools," informed Twitter.

In cases where an account was taken over by the attacker, they may have been able to view additional information, Twitter added, saying its forensic investigation of these activities was still ongoing.

"We are actively working on communicating directly with the account-holders that were impacted".

The company said it will soon restore access for all account owners who may still be locked out as a result of the remediation efforts.

The New York Times reported on Friday that the Twitter crypto scam can be traced back to a group of hackers who congregate online at OGusers.com, a username-swapping community where people buy and sell coveted online handles.

The report said that the Twitter hack is not from Russian, Chinese or North Korean hackers but was done by a group of young people, "one of whom says he lives at home with his mother".

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.