Skip to main content

Aadhaar-social media linking case: PIL filed in Delhi HC to curb paid, fake news

A PIL was on Wednesday moved in the Delhi High Court seeking directions to the Centre to take steps for linking social media accounts with Aadhaar, PAN or voter ID card to weed out fake accounts.

The plea by BJP leader Ashwini Kumar Upadhyay has sought the relief, alleging that fake social media accounts are used to propagate "fake and paid news" during elections.

He has sought directions to the Centre to deactivate the fake social media accounts to prevent the spread of fake and paid news, especially when the model code of conduct is in force.

social-media-new-1024

Upadhyay, also a lawyer, has claimed in his plea that amendments need to be made in the Indian Penal Code, Representation of People Act and the Information Technology law to stop publishing or abetting the publication of paid and fake news. He moved the high court after the Supreme Court on 14 October refused to entertain the plea.

(Also read: All Aadhaar-social media linking cases have been transferred to SC: Report)

The apex court, however, had granted him the liberty to approach the high court. On Tuesday, the top court transferred to itself all the cases related to the linkage of social media profiles with Aadhaar and related matters to itself from different High Courts.

Upadhyay's plea has sought a direction to the government to link profiles on social media platforms, including those on Facebook and Twitter, with Aadhaar and also a direction to the Election Commission and the Press Council of India for suitable steps to control fake and paid news.

(Also read: Aadhaar-social media account linking case: UIDAI asks government to make a new law)

The plea has also sought directions to the Centre for taking steps to declare publication of paid news and political advertisements 48 hours before an election as a "corrupt practice" under the Representation of People Act, 1951.
It has claimed that 10 percent of the 3.5 crores Twitter handles were duplicate, which included hundreds in the names of eminent people such as chief ministers and even the president and the prime minister of the country.

The plea claimed that millions of Facebook accounts were bogus, which used real photos of constitutional authorities and were used to promote casteism, communalism and separatism, endangering national integration and were also the root cause of several riots.



Udimi - Buy Solo Ads from Firstpost Tech Latest News https://ift.tt/33T8P3X
via IFTTT

Comments

Popular posts from this blog

9 VCs in Madrid and Barcelona discuss the COVID-19 era and look to the future

Spain’s startup ecosystem has two main hubs: Madrid and Barcelona. Most observers place Barcelona first and Madrid second, but the gap appears to close every year. Barcelona has benefitted from attracting expats in search of sun, beach and lifestyle who tend to produce more internationally minded startups. Madrid’s startups have predominantly been Spain or Latin America-focused, but have become increasingly international in nature. Although not part of this survey, we expect Valencia to join next year, as city authorities have been going all-out to attract entrepreneurs and investors. The overall Spanish ecosystem is generally less mature than those in the U.K., France, Sweden and Germany, but it has been improving at a fast clip. More recently, entrepreneurs in Spain have moved away from emulating success in pursuit of innovative technologies. Following the financial crisis, the Spanish government supported the creation of startups with the launch of FOND-ICO GLOBAL, a €1.5 billi...

Emulating USB Dongle – Introducing HASP Dongle Emulator Software

Information Technology Blog - - Emulating USB Dongle – Introducing HASP Dongle Emulator Software - Information Technology Blog Over the years the methods used by software developers and producers to limit the amount of users to a specific number in a licensing agreement have become more complex.  The aim of copy protection is to protect the intellectual rights and financial investment of the individual developers and manufacturing companies.   A way of getting around this protection is to reproduce the media through which you can deliver the application to other users,  meaning that the software can be replicated far in excess of that specified in the license. One of the most common methods has been to use hardware keys or dongles which will enable the user to activate an application, unlocking its full functionality without using a device.  In addition, it offers good protection against attempts to pirate the software. In this article, we will look at th...

Advantages and Disadvantages of using Vouchers in eCommerce

Information Technology Blog - - Advantages and Disadvantages of using Vouchers in eCommerce - Information Technology Blog To decide whether vouchers and coupons are the right tool to add to your online marketing strategy, it is essential that you consider the benefit and the cost of using coupons. In this article, we will use Gtech coupon marketing strategy as an example a successful coupon strategy.  Also check out these great books on coupon codes for ecommerce . Advantages of Using Coupons Increase Sales This is the obvious benefit. Coupons serve to increase sales especially for high ticket items such as luxury gadgets. Gtech discount codes is a good example as Gtech quality is reflected on the price of both the Gtech eBike and Gtech AirRam. In order to boost sales, the company releases 10% off offers certain times of the year when online sales would normally be low. Enlarge Email List Acquiring a customer can be expensive in terms of advertising and marketing. If yo...