Skip to main content

The Rule 5 of Information Technology Rules, Mystery revealed


Introduction 

Employees are considered the assets of a company. They work day in day out to maintain the position of the company. For the employees who contribute so much to the company, it becomes the responsibility of the company to provide safety to them so that they travel home safely. In this blog we are going to discuss about the privacy regulation which is extremely useful for employees who travel alone in cab. 

Safety through Apps ( Advanced Technology) 

Technology has reached to an advanced level and has widened in those areas also where it is highly required for safety reasons. Many apps have been designed to provide safety and protection to passengers who travel alone in cab. 
What they need to do is, just download the app and through the app, they get to know the details of the driver and the authenticity of his license. They are required to provide their correct details so that no harm is caused to the passenger in any sense. 

Safety and the Law 

The personal information of the driver is collected in order to ensure safety of the passengers. Such type of information is termed in law as sensitive personal data. Such type of data stands protected under Rule 5 of Information Technology Rules, 2002 
It states that :- 
1) Body corporate or any person on its behalf shall obtain consent in writing through fax or letter or email from the provider of the sensitive personal data or information regarding purpose of usage before collection of such information. 
2) Body corporate or any person on its behalf shall not collect sensitive personal data or information unless - a) the information is collected for a lawful purpose connected with a function or activity of body corporate and b) the collection of the sensitive personal data or information is considered necessary for that purpose. 

Relevant Case Law 

This case law is the most relevant example where it is required for the safety of the passenger, it would connect to the permit holder through the aggregator 
Satish N v State of Karnataka (2016)
WRIT PETITION No. 30917/2016
In this case, certain rules were drafted which were needed to be followed by the aggregators in order to ensure safety of the passengers
It was held by the Karnataka High Court that this merely claims to facilitate and to connect a passenger to the driver of a taxi. The emphasis was basically to connect a passenger through a technology platform in order to ensure his / her safety. In case, the driver violates a permit condition laid down by aggregator, he may face liability of having his /her permit cancelled or suspended. 

Conclusion 
As companies give remuneration to their employees, so their safety is also a matter of prime concern. As advanced technology is used to make our life easier and smoother, so this technology can also be devised to ensure safety while traveling alone in cab. 

Comments

Popular posts from this blog

SOURCES OF INDIAN CONSTITUTION(constitution of India in hindi)

SOURCES OF INDIAN CONSTITUTION(constitution of India in Hindi)                            The sources of Indian Constitution are as follows  : -   1. BRITAIN  Single citizenship, Parliamentary form of government, rule of law ,lawmaking procedure , Winning elections on the basis of majority vote 2. U.S.A Fundamental rights, supremacy of Constitution, independent judiciary, Pavel of judicial review, Post of president, election of President, post ofvice president, impeachment of President, Financial emergency, idea of preamble  3. GERMANY  power of president during emergency 4. RUSSIA Fundamental duties, idea of equal justice 5. JAPAN Procedure established by law  6. IRELAND Directive principles of state policy, election process of president, nomination of the twelve members in Rajya Sabha , emergency, Awards and honours given  by President. 7. FRANCE Idea of a republican state, idea of liberty equality and fraternity. 8. AUSTRALIA  Language of preamble, relation between union and state,

Technological crimes : Issues and future weapons for prevention

INTRODUCTION MEANING OF CYBER CRIME Cyber crime or computer related crime is a crime that involves a computer and a network . The computer may have been used in the commission a crime, or it may be the target. Cybercrimes can be defined as offences that are committed against individuals or group of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm, or loss, to the victim directly or indirectly, using modern telecommunication networks such as Internet (networks including but not limited to chat rooms, emails, notice board and groups) and mobile phones (Bluetooth/SMS/MMS) TYPES OF CYBER CRIMES 1. Hacking 2. Copyright infringement 3. Unwarranted mass surveillance 4. Child pornography 5. Child grooming 1. Hacking It is unauthorized intrusion into a computer or network. The person engaged in hacking activities is generally referred to as a hacker .This hacker may alter system or securi

Importance of Mental health

Essay on Importance of Mental Health ( 300 Words) Gandhiji once said, "Health is real wealth and not pieces of gold and silver". This statement indicates the importance of health in our life. People usually focus on their physical health and ignore the fitness of the mind. But the fact is that mental health is just as important as physical health. We can control our life because of our highly developed minds. Hence, it becomes very important for us to keep our body and mind fit and healthy for better performance and results. There are many factors that have a great impact on our fitness levels such as depression, aggression, negative thinking, hopelessness and fear. A mentally healthy person is always in a good mood and can easily manage situations of distress and depression. Mental fitness means having positivity in emotions and thinking which improves our ability to enjoy life. It is a positive word and leaves negative thoughts coming into our minds. The term mental fitness