top button
Flag Notify
    Connect to us
      Site Registration

Site Registration

Some rights that all Indian women should know about

+2 votes
278 views

We live in a shady and messed up world, where life of a person is taken away by a loved one, where goddesses are worshiped while women (of any age) are maimed and harassed. The only way out to keep an eye on such horrific happenings is to make laws and rules stricter to keep a check on the horrendous crimes. Having laws doesn't suffice when they are broken. Most people are unaware of their legal rights until they hire a legal firm for their problems. Merely a handful of them would say, 'Yes, we know' to this and most of them are not women. So, to help women know their rights and to help them fight back, here are some  rights that they should know.

 


 

1. Right to equal pay

According to provisions under the Equal Remuneration Act, one cannot be discriminated on the basis of sex when it comes to salary or wages.

2. Right to anonymity

Victims of sexual assault have a right to anonymity. To ensure that her privacy is protected, a woman who has been sexually assaulted may record her statement alone before the district magistrate when the case is under trial, or in the presence of a female police officer.

3. Can Be Questioned At Home

Section 160 of the Criminal Procedure Code states that a woman cannot be called for questioning to a police station. She has the right to be questioned at her place of residence.

4. Right against domestic violence

The act primarily looks to protect a wife, a female live-in partner or a woman living in a household like a mother or a sister from domestic violence at the hands of a husband, male live-in partner or relatives. She or anybody on her behalf, can file a complaint.

5. Right to maternity-related benefits

Maternity benefits are not merely a privilege of the working woman, they are a right. The Maternity Benefit Act ensures that the new mother does not suffer any loss of earnings following a period of twelve weeks after her delivery, allowing her to rejoin the workforce.

6. Right to free legal aid

All female rape victims have the right to free legal aid, under the Legal Services Authorities Act. It is mandatory for the Station House Officer (SHO) to inform the Legal Services Authority, who arranges for the lawyer.

7. Time  does not matter in cases of rape or molestation. Police cannot refuse to register an FIR even if a considerable period of time has elapsed since the incident.

8. Right to dignity and decency

In the event that an accused is a woman, any medical examination procedure on her must be performed by or in the presence of another woman.

9. Right to property

The Hindu Succession Act allows women and men equal share in inheritance, thereby setting new rules and regulations.

10. Safety at the workplace
Any workplace with more than 10 employees is duty-bound to create a Sexual Harassment Complaints Committee. According to Supreme Court's Vishakha Guidelines, the presence of such committee is mandatory and it must be headed by a woman.

11. No arrests at night
According to Supreme Court ruling, a woman cannot be arrested between sunset and sunrise. This was the result of a rising number of police harassment complaints by women.However, if the woman in question is wanted for a serious crime, police can make an arrest with a special permission from a magistrate.

12.Women witnesses can't be called to police stations
Indian women witnesses have the right to record a statement at home. Section 160 CrPC states that women cannot be called over to police stations for interrogation. "If a woman is a witness, she can choose to record her statement at her own residence in presence of a lady police officer," says criminal lawyer Kaushik Dey.

 13. Right To Abort

 Medical Termination Of Pregnancy Act or the MTP Act, 1971 says pregnancy not exceeding 12 weeks may be terminated based on the opinion of a single doctor. If the period of pregnancy exceeds 20 weeks, then the opinion of two doctors has to be taken before initiating an abortion.

posted Mar 9, 2016 by Andy Quirós

  Promote This Article
Facebook Share Button Twitter Share Button LinkedIn Share Button


Related Articles

The Union Budget of India is considered as the annual budget of the Republic India. According to Article 112 of the Constitution of India, it is referred as the Annual Financial Statement. The Budget is presented by the Finance Minister every year and the bill has to be passed by both the Houses of the Parliament before it comes into effect. Interim Budget is known as a short budget which usually presented prior to general elections by the ruling government.

1. R.K Shanmukham Chetty presented the First Union Budget of Independent India on November 26th, 1947.

2. Generally, the Union Budget of India is presented on the last working day of February.

3. Moraji Desai is the only Finance Minister to present the Union Budget on his Birthday.Desai did it in two different years (1964 & 1968). Interestingly, his birthday was on 29th February.

Moraji Desai presented the Union Budget 10 times, most by any Finance Minister of India.

4. The printing of the Union Budget of India starts with Halwa Ceremony.

5. Jawaharlal Nehru was the first Prime Minister to present the budget in the Parliament.

6. Indira Gandhi is still the only lady to hold the post of the Finance Minister.

7. Indira Gandhi is also the only woman and second Prime Minister to present the Union Budget for 1969-70.

8. Rajiv Gandhi became the third Prime Minister to present the Union Budget after Nehru (his grandfather) and Indira Gandhi (his mother).

9. Pranab Mukherjee was the first Rajya Sabha member to present the Union Budget.

10. Until 1999, Union Budget was announced at 5 pm in the evening. However, in 2001 Yashwanth Sinha then Finance Minister of NDA govt. led by Shri Atal Bihari Vajpayee changed it to 11 am.

 

 

READ MORE

Sex is fun and for it to remain fun, there are certain things which every one must keep in mind. The most obvious one is birth control, the mistake that couples make is that they think they know everything about birth control, they know all the methods and that they’ve made the correct decision of using whatever method of birth control that they do use.

Sadly, that is not true. There are a lot of things about birth control that remain undiscovered. Here they are:

1. Birth control pills prevent pregnancy through two different mechanisms: They prevent women from ovulating, and they cause the cervical mucus to thicken, which makes it more difficult for a sperm to penetrate and make contact with an egg if the woman is ovulating.

2. If women follow the exact instructions for taking birth control pills — every day, at the same time — they prevent pregnancy in 99 percent of all cases. But lots of people don’t do that.

3. Birth control pills have a higher failure rate than other contraceptives, like intra-uterine devices (IUDs) or birth control rings.

4. Those “sugar pills” at the end of a birth control pack? They have active ingredients.

5. Birth control does not make you fat.

6. If you notice a reduction in your sex drive after starting on the pill, call your doctor.

7. Condoms keep things secure 98 percent of the time, but there is the possibility of failure.

8. If you’re considering getting the Depo-Provera shot as an alternative to birth control pills or IUDs, you have to go in for a new shot once every 12 weeks.

READ MORE

1. Robert Augustus Chesebrough, was an American scientific expert who found oil jam, which he set apart as Vaseline. He asserted to eat a spoonful of Vaseline ordinary. Before propelling the item, he tried Vaseline all alone hands and legs ordinary. To illustrate, he would consume his skin with open fire and than would apply the oil jam. 

2. Stephen Hawking kept on working all through his illnesses. In any case, one of the uncommon truth says, Hawking could talk single word every moment. He does this by jerking his cheek to control a cursor on a screen. Notwithstanding, as per different sources, it is said that Intel buckled down and plans to lift Hawking's discourse from one to ten words for each minutes.

3. Did you know who is the innovator of flame hydrant? All things considered, nobody thinks about it. Since the designer of flame hydrant was scorched in flame while testing the gadget. 

4. The Process of water moved from the roots to the leaves known as transpiration was first broadly proposed in 1895 and comparable process was penned by Isaac Newton amid his undergrad years in 1660's. Berling authors, "We have no clue to what extent Newton spent considering the workings of plants or what provoked these musings". 

5. Leo Fender, who is the designer of telecaster and strastocaster, couldn't play guitar. 

6. The main telephone call was made in 1973 by Martin Cooper, who is the previous Motorola innovator. 

7. A New Molecule called Tetranitratoxycarbon was incidentally created by a 10-Year-Old in 2012 in Science Class. 

8. The primary Credit card by imagined by a man who confronted a humiliation to pay the bill for supper yet overlooked his wallet. 

9. James Watson is one of the researchers who found the helical structure of DNA. He trusts that idiocy is an illnesses and morons ought to be cured. He trusted that individuals from Africa are less canny and furthermore does not wish to contract chubby individual because of their corpulence. 

10. Charles Richter, who is the innovator of the Richter scale was a nudist some time recently. 

11. Rudolf Diesel, who concocted the Diesel Engine submitted suicide in 1913 on the grounds that he thought this creation of diesel motor was a waste, and could never prevail in future.

READ MORE

Ransomware. It’s been described by security companies and news agencies alike as an “epidemic.” New strains are constantly detected in the wild and many are using original techniques — such as creating a unique encryption key for each file locked down — to frustrate security companies and convince users they should pay. 

While there’s no way to completely shield devices from ransomware attacks and payment demands, knowing the basics can both reduce user anxiety and limit the chances of becoming a victim.

What Is Ransomware?

As noted by Tech Target, the goal of ransomware is to "kidnap" data and demand payment from users for its release. It’s a subset of the general malware category, made distinct because ransomware attacks don’t focus on stealing user credentials or interrupting key processes, but rather the isolation of data coupled with the promise of destruction if monetary demands aren’t met.

Often, ransomware code is hidden inside seemingly harmless software or applications, and executes when users first launch the program. Devices may also be infected through malicious email links or compromised websites. In many cases, victims aren’t aware they’re under attack until they discover files are locked and a ransom demand displays on screen.

Some key characteristics that set it apart from other malware

  • It feature unbreakable encryption, which means that you can’t decrypt the files on your own (there are various decryption tools released by cyber security researchers – more on that later);

  • It has the ability to encrypt all kinds of files, from documents to pictures, videos, audio files and other things you may have on your PC;

  • It can scramble your file names, so you can’t know which data was affected. This is one of the social engineering tricks used to confuse and coerce victims into paying the ransom;

  • It will add a different extension to your files, to sometimes signal a specific type of ransomware strain;

  • It will display an image or a message that lets you know your data has been encrypted and that you have to pay a specific sum of money to get it back;

  • It requests payment in Bitcoins because this crypto-currency cannot be tracked by cyber security researchers or law enforcements agencies;

  • Usually, the ransom payments have a time-limit, to add another level of psychological constraint to this extortion scheme. Going over the deadline typically means that the ransom will increase, but it can also mean that the data will be destroyed and lost forever.

  • It uses a complex set of evasion techniques to go undetected by traditional antivirus (more on this in the “Why ransomware often goes undetected by antivirus” section);

  • It often recruits the infected PCs into botnets, so cyber criminals can expand their infrastructure and fuel future attacks;

  • It can spread to other PCs connected to a local network, creating further damage;

  • It frequently features data exfiltration capabilities, which means that it can also extract data from the affected computer (usernames, passwords, email addresses, etc.) and send it to a server controlled by cyber criminals; encrypting files isn’t always the endgame.

  • It sometimes includes geographical targeting, meaning the ransom note is translated into the victim’s language, to increase the chances for the ransom to be paid.

How Does A Ransomware Attack Work?

As noted by Kaspersky Lab there are two main types of ransomware: Locker and crypto. Locker programs are easier to defeat since they avoid critical files and instead aim to lock out users from critical functions such as desktop or Internet access. The much more popular crypto form, meanwhile, encrypts files and then demands payment.

Most crypto ransomware attacks follow a similar pattern: User devices are infected with malicious code, which then selects specific files and starts to encrypt them using a unique algorithm. In some cases, only pictures and documents are targeted; in newer ransomware variants, attackers also go after executable files. Once infected, victims usually receive a warning screen that may accuse them of breaking the law or simply state they’ve been the victim of a cyberattack. Malware makers often want payment in Bitcoin sent to a specific email address and many start a "countdown timer" — if payment isn’t made quickly enough, all files are deleted.

Preventing The Problem

To protect your personal data, it’s worth implementing a few simple ransomware security measures. First up? Don’t assume that only Windows PCs are at risk. According to PCWorld it’s now possible for ransomware to attack Android and iOS, Linux servers and even smart televisions. 

  • lower the chances of infection by deleting spam emails.
  • Never clicking on suspicious links.
  • Always downloading mobile apps from official application stores.
  • Keep your operating system up to date and regularly run a reliable anti-virus scan to help detect any dormant ransomware code.
  • It’s important to always back up critical files — on a USB stick, external hard drive or another PC — that isn’t connected to your primary device.
  • If your device does get locked down, search online for a cure, since many security companies have developed ways to crack existing ransomware encryption.
  • Worst-case scenario, you can also pay the ransom — understand, however, that payment does not guarantee the safe return of your files.

Ransomware continues to impact devices and users worldwide. Avoid attacks and limit damage by understanding the basics of a ransomware attack and improving your overall information security.

READ MORE
...