#Sec. 120-A IPC
Explore tagged Tumblr posts
Text
Cyber Crime during online recruitment examination
Gurmeet Singh v. State of Punjab
Before Hon’ble Punjab & Haryana High Court at Chandigarh
Anticipatory bail Petition was dismissed on 21.07.2023
FIR u/s 420, 465, 438, 471, 120-B, 409 IPC & Sec. 66-D of Information Technology (Amendment) Act 2008
Case of the Petitioner
Apprehending arrest petitioner Gurmeet Singh moved anticipatory bail application as the petitioner was granted interim bail on 10.04.2023. Allegations levelled against the petitioner is that he found out candidates who could solve the online question-paper of the examination for the recruitment of Police Sub Inspectors in the State of Punjab, and was also running the center from where the examinations center was hacked.
Contention of the Petitioner’s Counsel
He is seeking bail on the ground that the evidence collected against him relates to the disclosure statement of accused Ankit, who was mentioned as accused in the disclosure statement of Laveneesh Gupta, and therefore this evidence is inadmissible.
Contention of the State’s Counsel
Anticipatory bail petition of the petitioner be not allowed as they want the custodial investigation to know the role of other people involved in the recruitment scams, including the beneficiaries, as this scam has already derailed the recruitment process for Sub Inspectors.
Background
1. The SHO, Police Station Anaaj Mandi, Patiala, received secret information on 16.09.2021 that online examinations
for recruitment of various departments were conducted at the center at Infra IT Solutions, Zila Parishad Complex, Patiala, and some hackers have hacked the computers.
2. The informant further informed that, one candidate Gurpreet Singh had secured the highest marks, and he had given his examination from the center of Infra IT Solutions, and Gurpreet Singh had not secured marks because of merits but because a gang of cyber criminals had hacked computer centers and someone else had remotely solved his question paper. He secured the highest marks by paying massive amounts of money to the cyber-thugs
3. Based on this information, the police registered an FIR during the investigation, candidate Gurpreet Singh was arrested and during investigation several other people involved in the crime were also arrested.
4. Ankit, one of the arrested accused informed the investigator the involvement Gurmeet Singh, the present petitioner. He informed that the center was initially run by Jasvir Sigh who had left sometime back thereafter it was run by Gurmeet Singh who used to make entries of the candidates for examination.
5. The High Court on 06.07.2023 had directed the concerned Deputy Superintendent of Police to show the evidence collected against the present petitioner. Dy S P submitted evidence collected by way of Affidavit. Affidavit corroborated the statement of the other accused Ankit.
Observation of the Court
1. The petitioner seeks anticipatory bail on the grounds of parity with the co-accused. A perusal of the order reveals that the co-accused were granted regular bail, and one ground for their bail was prolonged custody. On the contrary, the petitioner is seeking anticipatory bail; as such, he is not entitled to bail on parity.
2. This Court considered the evidence collected after disclosure statements of co accused which point out three relevant facts: -
(i)The petitioner had worked with the said center.
(ii) After Jasvir Kumar left the center, the petitioner had worked there.
(iii) There are various communications between the petitioner and other accused which
the petitioner had failed to explain.
3. The allegations against the petitioner and co-accused are grave. There is sufficient evidence that the candidates who had appeared from the said center had got suspiciously more marks than their calibre.
4. Given the nature of allegations, custodial interrogation is required. An analysis of the allegations and evidence collected does not warrant the grant of bail to the petitioner.
5. The petitioner fails to make a case for bail at this stage.
6. This court will fail in its duty if it closes this order at this point.
7. If this scam had not come to light, so many corrupt and unethical people would have got appointed to the sensitive post of Sub Inspector by giving money, and it can be well imagined what kind of officers they would have become and how much injustice such officers would have caused to the communities and the State.
8. A highly sensitive and essential recruitment in the police, because of hacking not only got impaired but also got derailed. It also exposed the vulnerability of the examination system and the usage of breach-able and unsafe software.
9. It is for the Executive to ensure that software used for such sensitive matters is fool-proof as well as secured and its code is written considering the present-day exponential technological advancements and to prevent the misuse of artificial intelligence by hackers.
10. There can be no leniency while dealing with bail petitions of cyber-thugs in the matters of cyber-crime.
11. Cyber criminals must be dealt with stringently and custodial interrogation of these cyber thugs in these kinds of sensitive matters is required not only to unfold the involvement of other persons but also to find out the vulnerability in the systems to stop future breaches.
Decision
Anticipatory Bail Petition was dismissed and Interim bail order was also recalled.
Seema Bhatnagar
#cybercrime#onlinerecruitment#policesubinspector#hacking#cyberthug#remoteanswering#recruitmentprocessderailed#regularbail#anticipatorybail#seekingparity#custodialinvestigation#punjabandharyanahighcourtatchandigarh#offenceunderITAct
1 note
·
View note
Text
EOW Unearths a Cyber-Financial Fraud )!). |
Bureau,Odishabarta Fraudster duping Crores of rupees, by faking courier services and blackmailing victims in the name of Narcotics Control Bureau, CBI, Police, ED etc. Bhubaneswar:Economic Offences Wing, Bhubaneswar registered EOW PS Case No 20/2023 U/s. 419/420/467/468/471/120-B IPC, R/w Sec. 66 (D) of IT Act,2000 on the report of Ms. Ratna Tripathy of Nayapalli,Bhubaneswar. Investigation, so…

View On WordPress
0 notes
Video
youtube
Indian Penal Code (IPC) - Abetment Sec. 107 - 120 भारतीय दंड संहिता दुष्...
#youtube#Followers Friends Students Law People Judiciary Legal community teachers education knowledge LLB.Students Crime societyPublic Rights Kanoon
0 notes
Text
The 498A, 406, 328, 377, 323 & 120-B IPC, S125 CrPC, DV cocktail (Large #COCKTAIL !!)
IF there is something that REALLY crosses #religious, #caste and #linguistic boundaries, is available in every state and every strata of society, can affect the #young and the #old, rich and poor, tall and short, that is anti male cases LIKE #498a #Sec125 #Sec377 #DV etc etc by Indian women !! These #antiMale cases are close to #AIR and Sunlight for they can be found everywhere :-) :-)
Here is another abala who has filed 498A, 406, 328, 377, 323 & 120-B IPC. in addition to Sec 125 CrPC and DV cases on husband !! ( Large cocktail juice !! :-)
Looks like nothing much has happened even though the case is progressing the last six years !! (charge sheet since 2011) !!
She is now seeking transfer of divorce case from his town to hers !!
===========================
HIGH COURT OF JUDICATURE FOR RAJASTHAN AT JODHPUR.
S.B.Civil Transfer Appl. No. 141 / 2015
Smt. Salma W/o Mohammad Sohel, D/o Shri Mohammed Safi, By caste Musalman, Aged 22 years, Resident of Near Sugani Devi Hospital, Gurjaron Ki Guwar, Bikaner. ----Petitioner
Versus
Mohammad Sohel S/o Shri Mohammad Shafi, By caste Musalman, R/o in front of Ship House, Nagori Gate, Jodhpur. ----Respondent
________________________________________________
For Petitioner : Mr. M.S.Purohit. ________________________________________________
HON'BLE MR. JUSTICE DEEPAK MAHESHWARI Judgment
09/03/2017
This petition has been preferred by wife petitioner Smt. Salma for getting Civil Misc. Case No.216/2015 titled as Mohammad Sohel V/s Smt. Salma pending in Family Court No.1, Jodhpur seeking divorce transferred to Family Court, Bikaner.
Heard learned counsel for the petitioner. None present on behalf of the respondent despite service. Learned counsel for the petitioner submits that the petitioner was dragged out of her matrimonial home after making demand of dowry. Thereafter, the petitioner is living in her parental house at Bikaner. It has been further submitted that in view of the matrimonial dispute and existing circumstances, an FIR No. 161/2011 was filed by the wife petitioner at Mahila Police Station for the offenes under sections 498A, 406, 328, 377, 323 & 120-B IPC. After investigation, charge sheet was filed on 15.11.2011. Further, a petition under section 125 Cr.PC filed by the wife petitioner is pending before Family Court, Bikaner. Thirdly, the complaint filed under section 12 of the Prevention of Domestic Violence Act, 2005 is also before the court of Additional Chief Judicial Magistrate No.1, Bikaner. It has been stated that in retaliation of these proceedings, a petition for divorce was filed by the non-petitioner Mohammad Sohel on 20.02.2015 which is pending in family court No.1, Jodhpur. Learned counsel for the petitioner submits that the petitioner being a lady has to face a lot of hardships to come from Bikaner to Jodhpur to contest the matter pending before the Family Court No.1, Jodhpur. Moreover, she is apprehending danger to her life while coming to Jodhpur.
On the contrary, non-petitioner is regularly coming to Bikaner to attend the cases pending against him before the courts situated at Bikaner.
In light of these circumstances, it has been prayed that the divorce petition pending before Family Court No.1, Jodhpur may kindly be transferred to Family Court, Bikaner.
None has appeared on behalf of the non-applicant to contest the application and to revert the contentions raised therein. Moreover, in view of the facts and circumstances stated in the petition as also mentioned before this court by learned counsel for the petitioner, this court deems it fit to order transfer of the divorce pending pending before Family Court No.1, Jodhpur to Family Court, Bikaner. Thus, the application is allowed and it is ordered that Civil Misc. Case No.216/2015 pending before Family Court No.1, Jodhpur be transferred to Family Court, Bikaner.
The petition stands allowed accordingly.
(DEEPAK MAHESHWARI)J.
Anil Singh/40
0 notes
Text
Cyber Law in India – Meaning, Introduction, History, Need, Important terms and Amendments
What does Cyber Means?
A combining form meaning “computer,” “computer network,” or “virtual reality,” used in the formation of compound words.[1] Involving, using or relating to computers, especially the internet.[2]
Introduction to Cyber Laws
“Internet Law” is the well-defined area of law that suggests regulations to people about the use of the internet. Categorically cyber laws are divided into criminal laws and civil laws. Any law or regulation that involves how people use computers, smartphones, the internet and other related technology is cyber law.[3]
The virtual world of the internet is known as cyberspace and the laws governing this area are known as Cyber Laws and all the citizens of this space come under the ambit of these laws as it carries a kind of universal jurisdiction.
Cyberlaw is important because it touches almost all aspects of transactions and activities on and involving the internet, World Wide Web and cyberspace.
Cyberlaw encompasses laws relating to –
Cybercrimes
Electronic and digital signatures
Intellectual property
Data protection and privacy
History of Cyber Laws in India
The resolution of the General Assembly of United Nations dated 30th January 1997 gave birth to the Information Technology Act which leads to the adoption of Modern Law on Electronic Commerce on International Trade Law.
The Department of Electronics (DoE) in July 1998 drafted the bill. However, it could only be introduced in the House on December 16, 1999 when the new IT Ministry was formed. However it underwent some alteration with the commerce industry due to some suggestions related to e-commerce and matters about the World Trade Organization (WTO) obligations. After the bill was introduced in the Parliament, the bill was referred to the 42-member Parliamentary Standing Committee following demands and suggestions from the Members. One of the suggestions that was highly debated upon was that a cyber café owner must maintain a register to record the names and addresses of all people visiting his café and also a list of the websites that they surfed. This suggestion was made as an attempt to curb cybercrime and to facilitate speedy locating of a cyber-criminal. However, at the same time it was ridiculed, as it would invade upon a net surfer’s privacy and would not be economically viable. Finally, this suggestion was dropped by the IT Ministry in its final draft.[4]
Need for Cyber Laws in India
In Techno-savvy world like today, People are becoming more digitally sophisticated. As time passed by it became more transactional with e-business, e-commerce, e-governance and e-procurement etc. All legal issues related to internet crime are dealt with through cyber laws.
Number of Cyber Crime Cases Reported in the year 2015-16
Source- National Crime Record Bureau
In today’s highly digitalized world, almost everyone is affected by cyber law. For example.
•Almost all exchanges in shares are in Demat form.
•Almost all organizations widely rely on their PC systems, what’s more, keep their significant information in electronic form.
•Government structures including personal assessment forms, organization law structures and so on are presently filled in electronic forms.
•Consumers are progressively utilizing Visas for shopping.
•Most individuals are utilizing email, PDAs and SMS messages for communication.
•Even in “non-digital wrongdoing” cases, significant proof is found in
PCs/PDAs for example in instances of separation, murder, capturing, charge
avoidance, sorted out wrongdoing, psychological militant tasks, fake money, etc.
•Cyber wrongdoing cases, for example, web-based financial fakes, online offer exchanging extortion, source code burglary, Visa misrepresentation, tax avoidance, infection assaults.
•cyber damage, phishing assaults, email seizing, forswearing of administration, hacking, sex entertainment and so on are turning out to be common.[5]
Important terms related to cyber laws
“Affixing Electronic Signature” with its grammatical variations and cognate expressions means the adoption of any methodology or procedure by a person to authenticate an electronic record by means of Electronic Signature. (Sec.2(1)(d) of IT Act, 2000)
“Access” with its grammatical variations and cognate expressions means gaining entry into, instructing or communicating with the logical, arithmetical, or memory function resources of a computer, computer system or computer network. (Sec.2(1)(a) of IT Act, 2000)
“Asymmetric Crypto System” means a system of a secure key pair consisting of a private key for creating a digital signature and a public key to verify the digital signature. (Sec.2(1)(f) of IT Act, 2000)
“Certifying Authority” means a person who has been granted a license to issue an Electronic Signature Certificate under section 24. (Sec.2(1)(g) of IT Act, 2000)
“Communication Device” means Cell Phones, Personal Digital Assistants (Sic), or combination of both or any other device used to communicate, send or transmit any text, video, audio, or image. (Sec.2(1)(ha) of IT Act, 2000)
“Computer” means any electronic, magnetic, optical or other high-speed data processing device or system which performs logical, arithmetic, and memory functions by manipulations of electronic, magnetic or optical impulses, and includes all input, output, processing, storage, computer software, or communication facilities which are connected or related to the computer in a computer system or computer network (Sec.2(1)(i) of IT Act, 2000)
“Computer Network” means the interconnection of one or more Computers or Computer systems or Communication device through-(i) the use of satellite, microwave, terrestrial line, wire, wireless or other communication media.
“Computer Resource” means computer, communication device, computer system, computer network, data, computer database or software. (Sec.2(1)(k) of IT Act, 2000)
“Computer System” means a device or collection of devices, including inputand output support devices and excluding calculators which are not programmable and capable of being used in conjunction with external files, which contain computer programs, electronic instructions, input data, and output data, that performs logic, arithmetic, data storage and retrieval, communication control and other functions. (Sec.2(1)(l) of IT Act, 2000)
“Cybercafe” means any facility from where access to the Internet is offered by any person in the ordinary course of business to the members of the public.
(Sec.2(1)(a) of IT Act, 2000)
“Cyber Security” means protecting information, equipment, devices, computer, Computer resources, communication devices, and information stored therein from unauthorized access, use, disclosure, disruption, modification or destruction.
(Sec.2(1)(nb) of IT Act, 2000)[6]
Amendments made in Indian Penal Code, 1860 by the IT Act, 2000
Amendments related to IPC were contained in Sec.91 and the First Schedule of the IT Act, 2000. Under the enactment of the Information Technology (Amendment) Act, 2008, Sec.91 was deleted and the provisions concerning the Indian Penal Code were mentioned in Part III of the amendment Act.
The amendments made to the Indian Penal Code are as follows –
1) Amendment to Sec.4 –
In section 4, – i) after clause (2), the following clause shall be inserted namely: – (3) any person in any place without and beyond India committing offense targeting a computer resource located in India ii) for the Explanation, the following Explanation shall be substituted, namely:- (a) the word “offense” includes every act committed outside India which, if committed in India would be punishable under this code. (b) the expression “computer resource” shall have the meaning assigned to it in clause (k) of subsection (1) of section 2 of the Information Technology Act, 2000.
2) Amendment of Sec.40 –
In clause (2), after the figure “117”, the figures “118,119 and 120” shall be inserted.
3) Amendment of Sec.118 –
In section 118, for the words “voluntarily conceals, by any act or illegal omission, the existence of a design”, the words “voluntarily conceals by any act or omission or by the use of encryption or any other information hiding tool, the existence of a design” shall be substituted.
4) Amendment of Sec.119 –
In section 119, for the words “voluntarily conceals, by any act or illegal omission, the existence of a design”, the words “voluntarily conceals by any act or omission or by the use of encryption or any other information hiding tool, the existence of a design” shall be substituted.
5) Amendment of Sec.464 –
In section 464, for the words “digital signature” wherever they occur, the words “electronic signature” shall be substituted.[7]
Amendments made in Indian Evidence,1872 Act by the IT Act,2000
Amendments related to the evidence Act were contained in Sec.92 and the Second Schedule of the IT Act, 2000. According to the enactment of the Information Technology (Amendment) Act, 2008, Sec.92 was deleted and the provisions concerning the Indian Evidence Act were mentioned in Part IV of the amendment Act.
1) Amendment of Sec.3 –
In section 3 relating to interpretation clause, in the paragraph appearing at the end, for the words “digital signature” and “Digital Signature Certificate”, the words “Electronic signature” and “Electronic Signature Certificate” shall be respectively substituted.
2) Insertion of new Sec.45A – Opinion of Examiner of Electronic evidence – 45A:
When in a proceeding, the Court has to form an opinion on any matter relating to any information transmitted or stored in any computer resource or any other electronic or digital form, the opinion of the Examiner of Electronic Evidence referred to in section 79A of the Information Technology Act, 2000, is a relevant fact. Explanation: For this section, an Examiner of Electronic Evidence shall be an expert
3) Amendment of Sec.47A –
In section 47A,- (i) for the words “digital signature”, the words “electronic signature” shall be substituted; (ii) for the words “Digital Signature Certificate”, the words “Electronic Signature Certificate” shall be substituted.
4) Amendment of Sec.67A –
In section 67 A, – for the words “digital signature”, the words “electronic signature” shall be substituted.
5) Amendment of Sec.85A –
In section 85A, for the words “digital signature”, wherever they occur, the words “electronic signature” shall be substituted.
6) Amendment of Sec.85B –
In section 85B, – for the words “digital signature”, wherever they occur, the words “electronic signature” shall be substituted.
7) Amendment of Sec.85C –
In section 85C, for the words “Digital Signature Certificate”, the words “Electronic Signature Certificate” shall be substituted.
8) Amendment of Sec.90A –
In section 90A, the words “digital signature”, at both places where they occur, the words “electronic signature” shall be substituted.[8]
[1] https://www.dictionary.com/browse/cyber- retrieved at 12:58 PM on 10 April 2020
[2] https://dictionary.cambridge.org/dictionary/english/cyber retrieved at 3:04 PM on 10 April 2020
[3] https://legalcareerpath.com/what-is-cyber-law/ retrieved at 5:19 PM on 10 April 2020
[4] http://www.indiancybersecurity.com/cyber_law/8_history_of_cyber_law_in_india.html retrieved at 8:45 PM on 10 April 2020
[5] http://www.legalserviceindia.com/legal/article-1019-importance-of-cyber-law-in-india.html retrieved at 2 PM on 11 April 2020
[6] http://www.indiancybersecurity.com/cyber_law/5_important_terms_related_to_cyber_law.html retrieved at 3:33 PM on 11 April 2020
[7]https://www.advocatekhoj.com/library/bareacts/informationtechnology/schedule1.php?Title=Information%20Technology%20Act&STitle=Amendments%20to%20the%20Indian%20Penal%20Code retrieved at 3:55 PM on 11 April 2020
[8] https://indiankanoon.org/doc/1953529/ retrieved at 1 PM on 12 April 2020
The post Cyber Law in India – Meaning, Introduction, History, Need, Important terms and Amendments appeared first on Legal Desire.
Cyber Law in India – Meaning, Introduction, History, Need, Important terms and Amendments published first on https://immigrationlawyerto.tumblr.com/
0 notes
Link
Drivers: Global Trade Surveillance Market
RAPIDLY INCREASING DEMAND FOR MONITORING TRADE ACTIVITIES
The monitoring trade activities played a crucial role in trade surveillance market due to the complex form of trading which is offered by the financial instruments. On normal, the market structure is quite complicated and more variable, thus increasing the transaction volumes in financial market.
Access Full Report: https://databridgemarketresearch.com/reports/global-trade-surveillance-market/
It has been observed that financial institutions have taken several measures to tackle the risk based conditions such as suspicion of money laundering, terrorist financing and insider trading in between the financial institutions.
According to FINTRAIL LTD. in between October 2015 to march 2017, nearly 6.5 lakhs money laundering activities were detected through the trade activities in financial institutions. All this money laundering cases are submitted to the U.K. Financial Intelligence Unit (FIU) for verification of financial data and documents. It has been estimated that nearly 600 billion to 1.5 trillion of dirty money are laundered every year in the world.
BENEFITS PROVIDED BY SURVEILLANCE TO REDUCE THE MARKET ABUSE
The market abuse witnessed many circumstances in financial investors market, where the investors and employees of financial institutions were involved in the misleading or sharing of information about the price setting mechanism and takeover bid, which caused manipulation of data and insider dealing.
The surveillance is used to identify and protect the market abuse in financial and banking industries, where they analyze the order data book, benchmark services, suspicious transaction and reporting data. It is also used to protect them from corporate information occurring such as decrease of capital, insolvency, issuing of stocks and liquidation.
On May 2010, the Securities and Exchange Commission (SEC) implemented an enforcement surveillance that is used to plan and maintain the consolidated audit trail of perspective computerized trading activities.
Restraint:
DIFFICULT TO ANALYZE THE REAL TIME FRAUD DETECTION
Although the application of trade surveillance is increasing day by day in many developed and developing countries for detecting and protecting the capital and stock market from market abuse and manipulation but it gets challenged by the real-time detection of fraud related issue at financial and banking sectors. Most of the time, cyber hackers target the real-time operations such as online channel transactions, enhanced credit and fraud risk management because in such cases criminals can change their tactics with which they will be able to access multiple portfolio and business lines.
According to Central Bureau of Investigation (CBI), the bank frauds have been increased by 120% of 23,900, where 10,400 cases are reported due to individual fraudsters and hackers syndicates. They use the knowledge of banking, technology and insider data to execute the fraudulent transactions.
LACK OF KNOWLEDGE REGARDING PROFESSIONAL TRADING
For survival at the financial market each and every individual needs some knowledge about the stock market and capital markets. So, the professional traders need to grasp some ideas and plans to secure and protect their market shares and capital holdings from fraudsters.
Lack of financial market knowledge leads to carry out the inherent risks of security breaches because most of the beginners try to do the financial transactions from mobile banking apps or from social media channels which are more prone to malware attack.
In 2016, The Securities Investors Protection Corporation (SIPC) estimated that Americans fraud investments cost nearly USD 45 billion a year by the beginner’s traders that offers a protection and secured services against the fraudsters and scammers.
OPPORTUNITIES:
RISING DEMAND FOR TIME SERIES DATABASES AND LOW LATENCY
The increasing demand for trade surveillance in financial markets environment over the past several years has been driven by the need for time series database and low latency. Now a day, the automated capital market focuses on managing information through latest technology based applications.
But most of the financial institutions and banking sectors uses relational database management systems (RDBMSs), which is unable to offer appropriate reliability, speed and flexibility due to lack of low latency database system.
For instance, eXtremeDB embedded DBMS from McObject, LLC offers a better result in low latency database management which is highly proficient for In-memory database system (IMDS) design structure. It is enhanced with a memory manager and an internal transaction that delivers maximum efficiency while working in multi-processor systems and multi-threaded applications. The time series database gradually provides hybrid storage which can be supported in both real time and historical data with the single database architecture and streaming data.
CHALLENGES
COMPLICATED DESIGN OF SURVEILLANCE SYSTEMS
The trade surveillance system design is complex as it needs to maintain the clear prioritization according to the device which is being integrated. The design also needs to maintain the features such as real time automated system for detecting several transactions. This requires the designers to be cautious while selecting the design surveillance system.
Most of the time the database is built with a core in-memory database system which is more secure and protective as well as more complex due to availability of low-latency database technology. It also provides financial applications which ensures the persistence, data integrity and supports clustering of multiple servers.
In 2011, TCS (Tata Consultancy Services) launched a trading and surveillance platform solutions which offers low TCO, robust architecture and high performance in market infrastructure space. The solution prevails about current inefficiency in disparate systems and usage of expensive infrastructure.
RUTHLESS BUSINESS MODEL AND NON- STANDARDIZATION OF COMPLIANCES
The trade surveillance business model of financial institution and banking sector is quite ruthless due to many processes and little value. In many cases over standardizing process is rigid and decreases the responsiveness of the traders while transacting the capitals in stock markets and financial institutions.
The non-standardization of compliances creates an unexpected problem during the employee individual evaluation processes, and tracing the quality of data related to transactional markets. Most of the companies today use the old RDBMS (relational database management system) technology, which is low proficient and mostly prone to cyber-attacks.
Now companies are focusing on eliminating a lot of duplicates and cut down from the sheer numbers of processes in transactional trading of capitals. The financial institutions use the time frame tracking and variant costing to calculate the cost and time between standard process and variations.
Market Trends:
On the basis of component the market is segmented into solution and services. The solution is sub- segmented into services reporting and monitoring, risk and compliance, case management, surveillance and analytics and others. The service is sub-segmented into professional services and managed services. The professional services is further sub-segmented into support and maintenance, system integration and consulting.
On the basis of deployment model the market is segmented into on-premises, cloud and hybrid.
On the basis of organization size the market is segmented into large enterprises and small and medium-sized enterprises (SMES).
On the basis of vertical the market is segmented into banking, financial services, and insurance (BFSI) and capital markets. The capital market is sub-segmented into securities, hedge funds, wealth management, asset management and others.
Major Players: Global Trade Surveillance Market
Some of the major players operating in this market Software AG, FIS, SIA S.P.A., Celent, ACA Compliance Group Holdings, LLC, Scila AB, CINNOBER FINANCIAL TECHNOLOGY, Trapets AB, Abel Noser Holdings LLC, Crisil Limited, Cognizant, IPC System, Inc., Aquis Technologies, OneMarketData, B-next, IBM, Accenture, Nasdaq, Inc., and others.
0 notes
Text
Dahua NVR4208-8P-4K 8 Channel 1U 8PoE NVR Network Video Recorder Installed 2TB HDD
Dahua NVR4208-8P-4K 8 Channel 1U 8PoE NVR Network Video Recorder Installed 2TB HDD
Do not miss this chance to get this product on most reasonably priced value.
Pros:
DAHUA 4K NVR eight CHANNEL NVR WITH eight PORT POE NVR4208-8P-4K Put in 2TB HDD
>As much as eight channel IP digital camera enter
>H.265/H.264/MJPEG twin codec decoding >Max 256Mbps incoming bandwidth
>As much as 8ch@1080P([email protected][email protected]) realtime live-view >As much as 12Mp decision preview & playback
>HDMI/VGA simultaneous video output
Get this Dahua NVR4208-8P-4K eight Channel 1U 8PoE NVR Community Video Recorder Put in 2TB HDD
>eight channel synchronous realtime playback, GRID interface >Help Multi-brand community cameras: Dahua, Arecont Imaginative and prescient, AXIS, Bosch, Brickcom, Canon, CP Plus, Honeywell, Panasonic, Pelco, Samsung, Sanyo, Sony, Videotec, Vivotek and and so on. >ONVIF Model 2.four conformance >3D clever positioning with Dahua PTZ digital camera >Help 2 SATA HDDs as much as 12TB, 2 USB(1 USB3.zero) >Help IPC UPnP, 8PoE ports (for -8P mannequin) >Help P2P, QR code scan & add >A number of community monitoring: Internet viewer, CMS(DSS/Good PSS) & Good Cellphone(DMSS) Mannequin DH-NVR4208-8P-4K System Important Processor Twin-core embedded processor Working System Embedded LINUX Video& Audio IP Digicam Enter eight channel Two-way Speak 1channel Enter, 1channel Output, RCA Show Interface 1 HDMI , 1 VGA Decision 3840×2160, 1920×1080, 1280×1024, 1280×720, 1024×768 Show Break up 1/four/eight/9 OSD Digicam title, Time, Video loss, Digicam lock, Movement detection, Recording Recording Compression H.265/H.264/MJPEG Decision 12Mp, 8Mp, 6Mp, 5Mp, 3Mp, 1080P, 1.3Mp, 720P & and so on. Document Charge 192Mbps Bit Charge 1~ 20Mbps Document Mode Guide, Schedule(Common(Steady), MD, Alarm), Cease Document Interval 1~120 min (default: 60 min), Pre-record: 1~30 sec, Publish-record: 10~300 sec
It’s all the time higher to purchase Dahua NVR4208-8P-4K eight Channel 1U 8PoE NVR Community Video Recorder Put in 2TB HDD from the the chief on this eCommerce business. They’ve proved their potential in delivering high quality service after shopping for unbelievable merchandise from them.
YouTube Video
The post Dahua NVR4208-8P-4K 8 Channel 1U 8PoE NVR Network Video Recorder Installed 2TB HDD appeared first on IPCAMVOX.
from Dahua NVR4208-8P-4K 8 Channel 1U 8PoE NVR Network Video Recorder Installed 2TB HDD
0 notes
Text
EOW ARRESTS THE DIRECTOR OF ODYSSA HOMES & COMMERCIALS Pvt.Ltd. FOR CHEATING OF Rs.9 Crs. |
Bureau,Odishabarta Bhubaneswar:Economic Offences Wing, Bhubaneswar has arrested Saroj Kumar Panda, one of the Directors of M/s Odyssa Homes & Commercials Pvt. Ltd. On 31.05.2023 from Jeypore, Koraput, in EOW PS Case No.09 dt.07.03.2023 U/s420/467/468/471/120-B IPC r/w Sec.6 OPID Act. The arrested accused is going to be produced before the Hon’ble Designated Court under OPID, Cuttack today. The…

View On WordPress
0 notes
Text
EOW Arrests M.D.of Mishra Creations Pvt Ltd in Connection of Cheating to the tune of more than Rs.15 Crs. |
Bureau Pdishabarta Bhubaneswar:Economic Offences Wing, Bhubaneswar arrested accused Jyoti Ranjan Mishra, Managing Directors of M/s Mishra Creations Pvt. Ltd. a Real Estate company, today i.e. on 16.05.2023 from Bhubaneswar in EOW PS Case No.17 dated 01.05.2023 u/s 406/420/467/468/471/120-B IPC r.w. Sec. 6 of OPID Act, 2011. The arrested accused is going to be produced before the Designated Court…

View On WordPress
0 notes
Text
Dahua NVR4208-8P-4K 8 Channel 1U 8PoE NVR Network Video Recorder Installed 2TB HDD
Dahua NVR4208-8P-4K 8 Channel 1U 8PoE NVR Network Video Recorder Installed 2TB HDD
Do not miss this chance to get this product on most reasonably priced value.
Pros:
DAHUA 4K NVR eight CHANNEL NVR WITH eight PORT POE NVR4208-8P-4K Put in 2TB HDD
>As much as eight channel IP digital camera enter
>H.265/H.264/MJPEG twin codec decoding >Max 256Mbps incoming bandwidth
>As much as 8ch@1080P([email protected][email protected]) realtime live-view >As much as 12Mp decision preview & playback
>HDMI/VGA simultaneous video output
Get this Dahua NVR4208-8P-4K eight Channel 1U 8PoE NVR Community Video Recorder Put in 2TB HDD
>eight channel synchronous realtime playback, GRID interface >Help Multi-brand community cameras: Dahua, Arecont Imaginative and prescient, AXIS, Bosch, Brickcom, Canon, CP Plus, Honeywell, Panasonic, Pelco, Samsung, Sanyo, Sony, Videotec, Vivotek and and so on. >ONVIF Model 2.four conformance >3D clever positioning with Dahua PTZ digital camera >Help 2 SATA HDDs as much as 12TB, 2 USB(1 USB3.zero) >Help IPC UPnP, 8PoE ports (for -8P mannequin) >Help P2P, QR code scan & add >A number of community monitoring: Internet viewer, CMS(DSS/Good PSS) & Good Cellphone(DMSS) Mannequin DH-NVR4208-8P-4K System Important Processor Twin-core embedded processor Working System Embedded LINUX Video& Audio IP Digicam Enter eight channel Two-way Speak 1channel Enter, 1channel Output, RCA Show Interface 1 HDMI , 1 VGA Decision 3840×2160, 1920×1080, 1280×1024, 1280×720, 1024×768 Show Break up 1/four/eight/9 OSD Digicam title, Time, Video loss, Digicam lock, Movement detection, Recording Recording Compression H.265/H.264/MJPEG Decision 12Mp, 8Mp, 6Mp, 5Mp, 3Mp, 1080P, 1.3Mp, 720P & and so on. Document Charge 192Mbps Bit Charge 1~ 20Mbps Document Mode Guide, Schedule(Common(Steady), MD, Alarm), Cease Document Interval 1~120 min (default: 60 min), Pre-record: 1~30 sec, Publish-record: 10~300 sec
It’s all the time higher to purchase Dahua NVR4208-8P-4K eight Channel 1U 8PoE NVR Community Video Recorder Put in 2TB HDD from the the chief on this eCommerce business. They’ve proved their potential in delivering high quality service after shopping for unbelievable merchandise from them.
YouTube Video
The post Dahua NVR4208-8P-4K 8 Channel 1U 8PoE NVR Network Video Recorder Installed 2TB HDD appeared first on IPCAMVOX.
from Dahua NVR4208-8P-4K 8 Channel 1U 8PoE NVR Network Video Recorder Installed 2TB HDD
0 notes