Doctors attacked for trying to resuscitate dying girl in Delhi hospital

April 22, 2012
Doctor_HelpsNew Delhi, April 22: A desperate, unsuccessful effort to save a 16-year-old girl's life led to a team of six doctors being assaulted early on Friday by a group of 25 persons accompanying the girl, who objected to their providing cardiopulmonary cerebral resuscitation. The procedure involves pressing down hard and rapidly on the chest and blowing into the patient's mouth.

The accused, residents of Turkman Gate area, allegedly attacked the doctors and vandalized the emergency ward in Lok Nayak Jai Prakash Hospital.

According to the FIR registered by chief medical officer Arvind Mohan at the IP Estate police station , the patient was brought to the emergency ward around 12.40am with fever, pain and a distended abdomen. "Clinical diagnosis was preparedy and the treatment was begun with the patient being given IV fluids and antibiotics. The blood samples were sent and the procedure and diagnosis explained to the attendants," the complainant said suddenly, she suffered cardiac arrest.

According to a source in LNJP Hospital, the doctors immediately began to provide CPCR, which involves pressing down hard and rapidly on the chest and blowing air into the patient's mouth. The doctors also removed the girl's clothes to administer an injection, but were unable to save the girl. At this, some of the people accompanying her began shouting that the doctors had misbehaved with the girl and killed her.

"The attendants - who were around 25 in number - attacked the resident doctors on duty and began to assault them. The group began to throw away medicines, broke trolleys, monitors and the telephone and vandalized the entire ward. The guards were not able to protect us. A decision to evacuate the emergency was taken as the accused had threatened to come back again in more numbers with firearms," the complainants said in the FIR. The doctors suffered minor injuries. They called for a strike on Saturday, but it was called off after the police mediated between both sides.

The police said they were informed through a PCR call and the CMO was subsequently informed too. A written complaint by the doctors was forwarded to the CMO who approached the cops. "A case under section 353 (assault or criminal force to deter public servant from discharging his duty) and 186 (obstructing public servant in discharge of public functions) of IPC has been registered and the police is investigating the matter," said Devesh Chandra Srivastava, DCP, central district.

"The accused party was accompanied by the police and brought to us. We had a talk wherein they profusely apologized for their misbehavior following which the doctors decided to call of the strike. The issue is being solved amicably," said a senior administrative officer at LNJP Hospital.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
January 29,2020

New Delhi, Jan 29: The Supreme Court on Wednesday dismissed the plea by Mukesh Kumar Singh, one of the four death row convicts in the Nirbhaya gang rape and murder case, challenging the rejection of his mercy petition by the President.

A three-judge bench headed by Justice R Banumathi said that expeditious disposal of mercy plea by the President doesn't mean non-application of mind by him.

The court also said that alleged sufferings in prison can't be grounds to challenge the rejection of mercy petition.

The bench said all relevant material including judgments pronounced by trial court, high court and Supreme Court were placed before the President when he was considering the mercy plea of the convict.

The bench also comprising justices Ashok Bhushan and A S Bopanna rejected the contentions of the counsel appearing for Singh that entire materials of the case were not placed before the President when he was considering his mercy plea.

The bench, while referring to two files placed before it by the Centre on Tuesday, said that as per the January 15 covering letter which was sent by the Delhi government to the Ministry of Home Affairs, all relevant documents were sent.

The bench noted that detailed judgements of trial court, high court and the Supreme Court, curative petition filed by Singh, his past criminal history and his family background were sent to the Home Ministry by the Delhi government.

"All the documents were taken into consideration by the President while rejecting the mercy petition," the bench said.

The bench also dealt with submissions advanced by the convict's counsel, who had argued that the mercy plea was rejected at "lightning speed".

The bench said that if a mercy petition is expeditiously dealt with, it cannot be assumed that it has been adjudicated upon in a pre-conceived mind.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
June 8,2020

New Delhi, Jun 8: India on Monday reported the highest single-day spike of 9,983 more COVID-19 cases and 206 deaths in the last 24 hours.

With this, the country's coronavirus count has reached 2,56,611, including 1,25,381 active cases, according to the Ministry of Health and Family Welfare.

1,24,094 patients have been cured/discharged so far and 7,135 succumbed to the deadly virus. While one patient has migrated.

With 85,975 cases, Maharashtra is the worst-affected state in the country followed by Tamil Nadu at 31,667 cases.

A total of 1,08,048 samples were tested for coronavirus in the last 24 hours and overall 47,74,434 samples have been tested till now.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
May 21,2020

Bengaluru, May 21: The COVID-19-induced lockdown saw a spurt in crybercrimes in India with Kerala recording the highest number during the period, according to an analysis of IT security solutions provider K7 Computing.

The report analyses various cyberattacks within India during the pandemic and reveals that threat actors targeted the States with COVID-19-themed attacks aimed at exploiting user trust.

The sudden surge in the frequency of attacks witnessed from February 2020 to mid-April 2020 indicates that scamsters across the world were exploiting the widespread panic around coronavirus at both the individual and corporate level, the company said in a statement.

These attacks aimed to compromise computers and mobile devices to gain access to users confidential data, banking details and cryptocurrency accounts.

The key threats seen during this period ranged from phishing attacks to rogue apps disguised as COVID-19 information apps that targeted users sensitive data.

Phishing attacks were noticed more in Tier-II and Tier-III cities while the metros fared better.

Smaller cities saw over 250 attacks being blocked per 10,000 users.

Users from Ghaziabad and Lucknow seem to have faced almost six and four times the number of attacks, respectively, as Bengaluru users.

In Kerala, regions like Kottayam, Kannur, Kollam, and Kochi saw the highest hits with 462, 374, 236, and 147 attacks respectively, while the state as a whole saw around 2,000 attacks during the period, the highest thus far in the country.

This was followed by Punjab with 207 attacks and Tamil Nadu at 184 attacks, the statement said.

A majority of the recorded attacks were phishing attacks with sophisticated campaigns that could easily snare even the most educated users, it said.

These attacks were aimed at heightening users fears and creating a sense of urgency to take action.

The report noted phishing attacks where scamsters posed as representatives of the United States Department of the Treasury, the World Health Organisation, and the Centres for Disease Control and Prevention.

Users were encouraged to visit links that would automatically download malware on the host computer such as the Agent Tesla keylogger or Lokibot information-stealing malware, infamous banking Trojans such as Trickbot or Zeus Sphinx, and even disastrous ransomware.

Other attacks included infected COVID-19 Android apps like CoronaSafetyMask that scam users with promises of masks for an upfront payment; the spyware app Project Spy; and seemingly genuine apps that are infected with dangerous malware like banking Trojans such as Ginp, Anubis and Cerberus, it was stated.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.