National Industrial Exhibition- cum- Seminar

Micro, Small and Medium Enterprises- Development Institute (MSME-DI), Ranchi, Ministry of MSME, Government of India and Management Studies and Research Centre, Bokaro have proposed to organise National Industrial Exhibition- cum”- Seminar at Bokaro from 26 December to 28 December 2008 which will provide an opportunity to the micro, small and medium enterprises(M5Es) to show their capabilities by displaying their products on one hand and large PSUs like steel plants, coal India, HEC, railways, P&T, automobile industries, and other large corporate bodies in private sector to select their vendors by displaying their requirements on the other hand. In addition to above objective, it has also been proposed to organise seminars on different subjects relevant to industrial development during this period. As the programme bears national character, about 200 MSEs and good no. of PSUs/ corporate bodies from different states are likely to participate in the programme.

2. It will be highly appreciated if you give wide publicity of the National Industrial Exhibition – cum – Seminar at Bokaro among your members and motivate both MSEs and PSUs/ corporate bodies to participate in the programme (a copy of the brochure is available at GSIA office).

Cyber Security Tip ST07-001 Shopping Safely Online

Cyber Security Tip ST07-001 Shopping Safely Online

Online shopping has become a popular way to purchase items without yhe hassles of traffic and crowds. However, the Internet has unique risks,so it is important to take steps to protect yourself when shopping online.

Why do online shoppers have to take special precautions?
The Internet offers a convenience that is not available from any
other shopping outlet. From the comfort of your home, you can search
for items from countless vendors, compare prices with a few simple
mouse clicks, and make purchases without waiting in line. However,
the Internet is also convenient for attackers, giving them multiple
ways to access the personal and financial information of
unsuspecting shoppers. Attackers who are able to obtain this information may use
it for their own financial gain, either by making purchases themselves
or by selling the information to someone else.

How do attackers target online shoppers?

There are three common ways that attackers can take advantage
of online shoppers:
* Targeting vulnerable computers – If you do not take steps
to protect your computer from viruses or other malicious code,
an attacker may be able to gain access to your computer and all
of the information on it. It is also important for vendors to
protect their computers to prevent attackers from accessing
customer databases.
* Creating fraudulent sites and email messages – Unlike traditional
shopping, where you know that a store is actually the store
it claims to be, attackers can create malicious web sites that
mimic legitimate ones or create email messages that appear to have
been sent from a legitimate source. Charities may also
be misrepresented in this way, especially after natural disasters
or during holiday seasons. Attackers create these malicious sites
and email messages to try to convince you to supply personal
and financial information.
* Intercepting insecure transactions – If a vendor does not
use encryption, an attacker may be able to intercept your
information as it is being transmitted.

How can you protect yourself?

* Use and maintain anti-virus software, a firewall, and
anti-spyware software – Protect yourself against viruses and Trojan horses
that may steal or modify the data on your own computer and leave
you vulnerable by using anti-virus software and a firewall
(see understanding Anti-Virus Software and Understanding Firewalls
formore information). Make sure to keep your virus definitions up
to date. Spyware or adware hidden in software programs may also
give attackers access to your data, so use a legitimate
anti-spyware program to scan your computer and remove any of these files
(see Recognizing and Avoiding Spyware for more information).
* Keep software, particularly your web browser, up to date -Install
software patches so that attackers cannot take advantage of
known problems or vulnerabilities (see Understanding Patches for
more information). Many operating systems offer automatic updates.
If this option is available, you should enable it.
* Evaluate your software’s settings – The default settings of
most software enable all available functionality. However,
attackers may be able to take advantage of this functionality to access
your computer (see Evaluating Your Web Browser’s Security Settings
for more information). It is especially important to check
the settings for software that connects to the Internet
(browsers,email clients, etc.). Apply the highest level of
security available that still gives you the functionality you need.
* Do business with reputable vendors – Before providing any
personal or financial information, make sure that you are interacting
with a reputable, established vendor. Some attackers may try to
trick you by creating malicious web sites that appear to be
legitimate,so you should verify the legitimacy before supplying
any information (see Avoiding Social Engineering and Phishing
Attacks and Understanding Web Site Certificates for more
information). Locate and note phone numbers and physical addresses of vendors
in case there is a problem with your transaction or your bill.
* Take advantage of security features – Passwords and other
security features add layers of protection if used appropriately
(see Choosing and Protecting Passwords and Supplementing Passwords
for more information).
* Be wary of emails requesting information – Attackers may
attempt to gather information by sending emails requesting that
you confirm purchase or account information (see Avoiding
Social Engineering and Phishing Attacks for more information).
Legitimate businesses will not solicit this type of information
through email.
* Check privacy policies – Before providing personal or
financial information, check the web site’s privacy policy. Make sure
you understand how your information will be stored and used
(see Protecting Your Privacy for more information).
* Make sure your information is being encrypted – Many sites
use SSL, or secure sockets layer, to encrypt information.
Indications that your information will be encrypted include a URL that
begins with “https:” instead of “http:” and a lock icon in the
bottom right corner of the window.
* Use a credit card – Unlike debit cards, credit cards may have
a limit on the monetary amount you will be responsible for paying
if your information is stolen and used by someone else. You
can further minimize damage by using a single credit card with a
low credit line for all of your online purchases.
* Check your statements – Keep a record of your purchases and
copies of confirmation pages, and compare them to your bank
If there is a discrepancy, report it immediately (see
Preventing and Responding to Identity Theft for more information).

Authors: Mindi McDowell, Monica Maher

Produced 2007 by US-CERT, a government organization.

Note: This tip was previously published and is being re-distributed

to increase awareness.

Terms of use


This document can also be found at


SIMS B2B Expo’09

TRINITY – an ISO 9001:2000 company has informed vide email dated 23rd November,2008 that they are organising SIMS B2B Expo’09 in Panaji-Goa. Detial are as follows;

SME, Industrial Automation & Tools, Mining – Material Handling, Solutions….
16 – 18, January, 2009, Panaji, Goa

– Industrial & Technology Business Event
A Few Supporting Agencies……….
Ø Chambers of Commerce & Industry….
Ø Housing & Construction Association
Ø Mineral Ore Exporters Association
Ø Professional & Engineering Orgs.
Ø Industry Media & Publications…
Space Tariff : Rs.16,000 /- Only for Earlybirds.
Thanks to the overwhelming support received, the region’s Annual Industry Event is fast filling-up. The Hon’ble Governor, Chief Minister & Ministers, have sent in their good wishes and have been invited to attend, as they have been our guests in the past. This indicates the level of awareness & importance attached to the show.

As in the past, over 100 world-market leaders from India & abroad are expected to participate. This mega event draws thousands of business visitors from different parts of the country, especially the western & southern region. Our wide media campaign ensures a good turnout & participation rates too are cost-effective – Rs.3,000 per sq mt space only.

The producers & managers are TRINITY – an ISO 9001:2000 company, supported by the concerned professional associations & trade organizations, besides government agencies, like the Navy & Coast Guards. Do send us your contact details and we would courier you more information or you may log on to

For further detials you are requested to contact;
Ln. Joseph Dias, MA (Eco)
Ex-Special Executive Magistrate / SEO, Govt. of Maharashtra
Chairman & Mg. Director, Trinity Group
09769 55 56 57 / 09869481357
alternative emails :

Business & General Visitors
Industry, Corporates & Engineering Professionals
Government & Private Sector Management
Bulk Buyers & Heads of PSUs
Distributors, Dealers & Trade
High Net Worth Individuals
Influential Decision-makers
Engineers, Technicians, etc
Mega Media Campaign

The show is promoted extensively through multi-pronged strategies, pre-during-post event, comprising –

· Presidential Invites to Associations & Professionals

· Newspaper & Industry Journals

· Direct Invitations & Television

· Banners & Outdoor Publicity

· Email & Internet Marketing

· Radio & Other Media


SME, Process, Logistics, Industrial, Automation, Pumps & Valves, Instrumentation….

Machine Tools and Accessories for the Auto OEM and General Engineering
• Abrasive Tools, Hand and Power Tools, Pneumatic and Hydraulic tools
• CAD / CAM / CAE systems
• Clamping devices, Fasteners
• Chucks
• Forging, foundry & casting equipment
• CNC Controls
• Machining centers
• Hydraulic / pneumatic presses, mechanical presses
• Boring, milling, grinding machines etc.
• CNC wire cut, de-burring, drilling, EDM/ECM
• Bending, laser cutting, roll forming, shearing, stamping etc.
• Precision measuring, testing, calibration and inspection systems
• Gauges
• Prototyping systems, Moulds and dies
• Special purpose machine
• Surface treatment & finishing
• Welding Equipment
• Work and Tool Holders
Control and Automation
• Advanced Process Control
• Programmable Logic Controllers (PLC) and
Supervisory Control And Data Acquisition (SCADA).
• Industrial Robotics
• HMI/Monitors/Displays
Instrumentation, Industrial Electronics and Electrical
• Instrumentation – Temperature, Pressure, Flow & Level Analytical Instruments,
Oscilloscopes, Signal Generators
• Weight Measurement Systems
• Sensors
• Data Communication Protocols
• Enclosures and Panels
• Cable/Connectors/ Fittings/Terminal Blocks/Relays
• Switches, Switchgears & Control Panels
• UPS, Generator sets and Inverters
Power Transmission and Motion control
• Variable Speed Drives
• Bearings and Ball screws
• Chain and Belt Drives, Couplings
• Brakes and Clutches
• Gears and Gear Drives
Hydraulics and Pneumatics
• Pumps
• Mechanical Seals, connectors
• Valves, Air Cylinders, FRL
• Actuators
• Pipings, Fittings and Tubing
• Compressed Air solutions
Plant Equipment
• Heat Exchangers / Heat Management Systems
• Boilers and Reaction vessels
• Air and Water Treatment & Pollution Control systems
• Energy Management / Conservation Equipment & devices
• Industrial Cleaning, Polishing and Ultrasonic machines
• Filtration and Separation systems
• Tanks, reactors
Industrial Safety and Security
• Protective Gear
• Alarms & Detectors
• Fans, Blowers & Ventilators
• Security
• CCTV Equipment
• Biometrics & Access Control System
Material Handling and Logistics
• Racking and Storage systems
• Conveyors
• Cranes, hoisting equipment and other loading equipment
• Logistics management and transport services
• Pallets & palletizing
Industrial Packaging Systems
• Cushioning materials & systems
• Corrosion preventives including desiccants, VPI paper / powder / films.
• Wooden cases / crates / pallets
• Reinforcement materials (straps, bundling devices)
• Shrink and stretch wrapping films and machines
• Microbial / Insect infestation – treatment sources
• Corrugated fiber board / box suppliers
• PP Corrugated box suppliers
• PLC, control system suppliers
• BAR code / RFID solution providers
• Coding marking system suppliers

Adopters, Aerial Lift Platform, After Coolers, Air Cooled Concrete Mixers, Aluminium Castings, Automatic Block , Making Plants, Automatic Fly Ash Brick Making Machines, Axle Parts, Backhoe, Backhoe Loaders, Motor Graders, Backhoe Replacement Parts, Backhoe Spare Parts, Basement Excavation Movers, Earth Relays Components, Bearings, Belt Conveyors, Block Machines, Boom Stick Pins, Brick Machinery, Brick Making Machine, Bucket Elevators, Builder Hoist, Building Machinery, Bulldozers, Bushes, Bushings & Check Valves For Diesel Engines, Cabin Base, Camshafts, Cement & Fly Ash Silo System, Cement Block Making Machine, Cement Concrete Mixer Machine, Cement Mixer Truck, Centre Joint, CFT Concrete Mixer, Chain Links, Chain Pulley Blocks, Chain Sprockets, Clamshell Grab, Clay Brick Making Machinery, CNC Machined, CNC Machined Components, CNC Turned Components, Compact Plant RMC Series, Compactors, Compressors, Concrete Batcher, Concrete Batching Mixing Plant, Concrete Batching Plants, Concrete Block Machine, Concrete Block Making Machine, Concrete Kerbing Machines, Concrete Mixers, Concrete Mixing Plants, Concrete Paver, Concrete Transit Mixer, Concrete Vibrator Motors, Construction Equipment, Construction & Mining Equipment, Construction Equipment, Construction Machinery, Crane Tipper, Crane Spare Parts, Crawler Mounted Cranes, Customized Concrete Mixers, Cylinder Head, Diesel Engine Concrete Mixers, Diesel Engines, Diesel Generating Sets, Double Girder Cranes, Dozers, Dried Flower, Drive Shafts, Driver’s Cabin, Dumper, Dumpers, E.O.T / H.O.T Cranes – 1 To 65 Tons Cap, Earth Compactor, Earth Filling Movers, Earth Moving Machinery, Earth Moving Tools, Earth Ramer, Earthmoving & Construction Machines, Earthmoving Machine Spares, Electric Cement Mixer, Electric Concrete Mixers, Electric Vibrators, EOT Cranes, Excavator, Excavator Parts, Excavators Backhoe, Excavators Front-End, Fabricated Assemblies, Fabricating Spare Parts, Fiber CAGE Bearing, Food Processing Equipment, Forged Teeth, Forklift, Forklift Spare Parts, Fouler, Foundry Equipment, Friction Plate, Front End Loaders, Furnace Charger, Gears, Goliath Crane, Goods Elevators, Grabs For Hydra Cranes, Ground Engaging Tools, Ground Engaging Tools, Ground Support Equipment, Grouting Pump, Hardened Ground Pins, Harvester Combine Parts, Heavy Construction Machinery, Heavy Duty Winches, Heavy Fabricated Parts, HEM Equipments, High Compressive Paving Block Making Machines, High Pressure Hydraulic Cylinders, High Reach Stacker, High Tensile Nut Bolts, Hinge Pins, Hopper Mixer, Horizontal Shaft Impact Crusher, Hot Metal Ladle, Hydraulic Concrete Block Machine, Hydraulic Cranes, Hydraulic Cylinders, Hydraulic Cylinders For Dozer, Hydraulic Drive Hopper Concrete Mixers, Hydraulic Dump Trailers, Hydraulic Elevators, Hydraulic Excavators, Hydraulic Forklifts, Hydraulic Gears, Hydraulic Hoses, Hydraulic Pumps, Hydraulic Truck Cranes, Hydrostatic Road Roller, Industrial Earth Moving Machinery, Inter Locking Soil Block Making Machines, JCB Spare Parts, JIB Crane, KPC Shafts, Lay Shafts, Leather Wallets, Light Fabrication Components, Liner Bushes, Liners, Loaders, Loaders Backhoe, Loaders Front-End, Lock Pins, Locking Bushes, Locking Devices, Main Shafts, Manual Block Making Machines, Manual Concrete Block, Making Machine, Material Handling, Material Movement Equipment, Mini Dumpers, Mining Equipment, Mixer Muller, Mobile Concrete Batching, Mobile Cranes, Mobile Mixing Plants, Mold Testing Machines, Monorails, Motor Grader, Moving Equipment, Oil Coolers, Overhead Crane, Overhead Cranes, Pallet Jack, Pallet Truck, Pan Mixer Machine, Paver Block Machine, Paver Cutting Machines, Paving Block Making Machine, Pillow Block, Pins, Piston Rods, Piston Rods Of Hydraulic Cylinder, Pistons, Pivot Pins, Plain Spherical Bearings, Pneumatic Cylinders, Pressings, Primary Jaw Crusher, Rear Dump Trucks, Replacement Parts, Reverse Mixers, Rims, Rings, Road Construction Machinery, Road Roller, Rock Breaker, Roller Chain Links, Rope Drive Hopper Concrete Mixers, Rope Shovels, Sand Sieving Machine, Screw Conveyors, Secondary Jaw Crusher, Semi Automatic Brick Making Press, Sensor Paver, Sheet Metal Components, Single Girder Cranes, Soil Compactor, Soil Crushing Machine, Static Road Roller, Static Tandem Road Roller, Stationary Crane, Stationary Engines, Stationery Block Machine, Steering Parts, Steering Shaft, Studs, Tabular Scaffolding, Tandem Vibratory Roller, Taper Rollers, Telescopic Hydraulic Cylinders, TEREX, Tierod End, Tilting Bucket Trolley, Tipper, Tooth Points, Track Roller, Traction Battery, Traction Charger, Tractor Parts, Tractor Spares, Tractors, Transmission Parts, Transmission Spare Parts, Trenching, Truck Mounted Crane, Turbo Chargers, Turned Components For Auto Ancillary, Undercarriage Parts, Under-Slung Cranes, Valve Train Components, Valves, Vibra Design Block, Vibrator, Vibrator Sand Screening Machine, Vibratory Compactor, Vibratory Plate Compactor, Vibratory Rollers, Vibro-Feeder, Volumetric Concrete Mixers, Washers, Water Tanker, Weight Batcher, Wet Mix Macadam Plant, Wheel Barrow, Wheel Loaders, Wire Rope Electric Hoist, Zinc Castings……..


ARC Truss, Asphalt Cutting Machine, Asphalt Drum Mix Plant, Asphalt Paver Finishers, Automatic Block Making Plants, Automatic Fly Ash Brick Plants, Automatic Road Marking Machines, Back Hoe Loader, Loader, Bitumen Pressure Distributor, Bitumen Sprayers, Block Machines, Block System Hydraulic Motor, Boiler, Brick Making Machine, Broomer, Builder Hoist, Building Machines, Bull-float Machines, Cement Concrete Batching Machine, Cement Floor Finishing Machines, Cement Silo, Cera Press Machines, Chip Spreader, Civil Machinery, Clamshell Bucket, Clay Brick Making Machines, Clay Mixer, Combined Bar Bending Machine, Concrete Batching Mixing Plant, Concrete Batching Plants, Concrete Block Machines, Concrete Buckets, Concrete Cutter, Concrete Cutter Machinery, Concrete Kerbing Machine, Concrete Mixer, Concrete Pan Mixer, Concrete Power Trowel, Concrete Pump, Concrete Transit Mixer, Concrete Vibrator Motors, Consolidated Machines, Construction Equipment, Construction Machinery, Construction Tool, Conveyors, Cooler Shell Assembly, Cradle Spacer, Crank Shaft Assembly, Cutting Edge For Bridge Pier, Cutting Machine, De-Airing Pug-mill Machines, Diaphragm Wall Equipment, Diesel Road Roller, Double Beam Screed Vibrator, Drum Mix Asphalt Plant, Dust Collectors, E.O.T Cranes, Earth Compactor, Earth Rammer, Electronic Pallet Feeder, Engineered Sugarcane Crusher, Floor Finishing Construction Machines, Floor Polishing Machines, Fly Ash Brick Making Machine, Fly Ash Silo, Fore-bay Gates, Fully Automatic Concrete Mixing Plant, Groove Cutter, H.O.T Cranes, Hand Operated Mobile Vibrator, Hand Operated Single Block Press Type Vibrator, Head Regulator, Hoist, Hollow Block Mixer Machine, Horizontal Concrete Batching Mixing, Horizontal Shaft Impact Crusher, Hydraulic Assembly, Hydraulic Components, Hydraulic Concrete Block Making Machine, Hydraulic Machine, Hydraulic Hoses, Hydraulic Jacks, Hydraulic Mosaic Press, Hydraulic Pallet Truck Trolley, Hydraulic Pavers, Hydraulic Pumps, Hydro Gates, Hydrostatic Road Roller, Incinerator, Industrial Vibrator, Intake Gate, JIB Crane, Light Weight Machines, Machinery Winches, Machines Earth Compactor, Manual Block Making Machine, Mechanical Broom, Mechanical Pave Finisher, Medium Weight Machines, Mini Drum Mix Plant, Mini Drum Mixer, Mini Mobile Batching Plant, Mixing Drum, Mobile Construction Machine, Mobile Hot-mix Plant, Mobile Vibrator, Needle Vibrator, Orange Peel Grab, Pallet Truck, Pan Mixer, Paver Block Cutting Machine, Paver Cutting Machines, Paver Finishers, Paving Block Machinery, Pedal Pan Mixer, Piling Equipments, Plaster Sprayers, Plate Vibrator, Portable Asphalt Mix Plant, Pothole Repairing Machine, Potter Wheel, Power Driven Cutting Tools, Power Floater, Power Trowel, Precision Sugarcane Crusher, Primary Jaw Crusher, Radial Gate, Rear Axle Housing STR, Rehandling Clamshell, Reinforcing Bar Bending Machines, Reverse Drum Mixture, Reverse Mixers, RMC Machine, Road Roller, Rotary Drilling Tools, Round Shuttering, Sand Screen Machinery, Scaffolding Equipment, Screed Vibrator, Secondary Jaw Crusher, Semi Automatic Brick Making Press, Sensor Paver Finishers, Shearing Machine, Skimflotters, Slab Trolley With Rails, Soil Block Making Machines, Soil Compactor, Stainless Steel Vessels, Static Road Roller, Stationary Drum Mix Asphalt Plants, Steel Casting, Steering Parts, Stirrup Forming Machines, Stirrup Forming Machines, Stone Crusher, TBM Spacer, Thrust Frame Assembly, Tile Making Machine, Top Mat Filter-mat, Tower Hoist, Tower Hoist, Transit Mixer, Trowels, Vacuum Dewatering System, Valves, Vibrating Earth Rammer Machine, Vibrator Sand Screening Machinery, Vibratory Compactor, Vibratory Plate Compactor, Vibratory Plate Compactor, Vibratory Roller, Vibratory Tandem Rollers, Vibro Feeder, Wall Frame Assembly, Wall Grew Cutting Machines, Wall Roove Cutting Machines, Waste Solid Cyclone, Water Pump, Water Sprinkler Tank, Weigh Batcher, Weigh Batcher, Wet Mix Macadam Plant, Wet Mix Macadam Plants, Wet Mix Plant……..



G.S.R. 254 (E) – Whereas certain draft rules further to amend the Employees’ State Insurance (Central)Rules, 1950, were published as required under sub-section (1) of Section 95 of the Employees’ StateInsurance Act 1948 (34 of 1948) , in the notification of the Government of India, in the Ministry of Labour and Employment vide Number, G.S.R.86(E), dated the 14th February, 2008, in the Gazette of of India, PartII, Section 3, sub-section (i) inviting objections and suggestions from all persons likely to be affected thereby within a period of forty-five days from the date on which the copies of the Gazette of India in which the said notification was published were made available to the public;

And whereas, the copies of the said Gazette were made available to the public on 14th February, 2008 ;

And Whereas, no objections and suggestions have been received in respect of proposed draft rules;

NOW, THEREFORE, in exercise of the powers conferred by Section 95 of the Employees’ State Insurance Act, 1948 (34 of 1948), the Central Government after consultation with the Employees’ State Insurance Corporation, hereby makes the following rules further to amend the Employees’ State Insurance (Central)Rules, 1950, namely:-

1. Short Title and Commencement – (1) These rules may be called the Employees’ State Insurance (Central) (Amendment) Rules, 2008. (2) They shall come into force with effect from 1st April, 2008.

2. Amendment of Rule 50. – In the Employees’ State Insurance (Central) Rules, 1950 – (hereinafter referred to as the said rules), in rule 50, after the proviso, the following proviso shall be inserted, namely,

“Provided further that the wage limit for coverage of an employee who is a person with disability under the persons with disabilities (Equal Opportunities Protection of Rights and Full Participation) Act,1995 (1 of 1996), and under the National Trust for Welfare of persons with Autism, Cerebral Palsy, Mental Retardation and Multiple Disabilities Act, 1999 (44 of 1999) respectively, shall be twenty five thousand rupees per month”.

3. New Rule 51-A – After RUle 51 of the said rules, the following rule shall be inserted, namely:-
“51-(A) (1) Employer’s contribution in respect of certain employees. – (1) In respect of an employee who is a person with disability under the Persons with disabilities (Equal Protection of Rights and Full Participation) Act, 1995 (1 of 1996), and under the National Trust for Welfare of Persons with Autism, Cerebral Palsy, Mental Retardation and Multiple Disabilities Act, 1999 (44 of 1999), the employer shall not be required to pay employer’s share of contribution upto a maximum period of three years from the date of commencement of the contribution period.

(2) The employer’s share of contribution in respect of such employees and for such period under sub-section 91) shall be reimbursed to the Corporation by the Central Government;

4. Amendment of Rule 54- In rule 54 of the said rules, –
(i)in the TABLE, against Serial Number 42, for the abbreviation, figures and words “Rs.380 and above”, the abbreviation, figures and words “Rs.380 and above but below Rs.390” shall be substituted;
(iii) After serial Number 42 and the entries relating thereto the following serial numbers and entries shall be inserted, namely, –

“43.Rs.390& above but below Rs.400= 200.00
44. Rs.400& above but below Rs.410= 205.00
45. Rs.410& above but below Rs.420= 210.00
46. Rs.420& above but below Rs.430= 215.00
47. Rs.430& above but below Rs.440= 220.00
48. Rs.440& above but below Rs.450= 225.00
49. Rs.450& above but below Rs.460= 230.00
50. Rs.460& above but below Rs.470= 235.00
51. Rs.470& above but below Rs.480= 240.00
52. Rs.480& above but below Rs.490= 245.00
53. Rs.490& above but below Rs.500= 250.00
54. Rs.500&above but below RS.510= 255.00
55. Rs.510& above but below Rs.520= 260.00
56. Rs.520& above but below Rs.530= 265.00
57. Rs.530& above but below Rs.540= 270.00
58. Rs.540& above but below Rs.550= 275.00
59. Rs.550& above but below Rs.560= 280.00
60. Rs.560& above but below Rs.570= 285.00
61. Rs.570& above but below Rs.580= 290.00
62. Rs.580& above but below Rs.590 = 295.00
63. Rs.590& above but below Rs.600 = 300.00
64. Rs.600& above but below Rs.610 = 305.00
65. Rs.610& above but below Rs.620 = 310.00
66. Rs.620& above but below Rs.630 = 315.00
67. Rs.630& above but below Rs.640 = 320.00
68. Rs.640& above but below Rs.650 = 325.00
69. Rs.650& above but below Rs.660 = 330.00
70. Rs.660& above but below Rs.670 = 335.00
71. Rs.670& above but below Rs.680 = 340.00
72. Rs.680& above but below Rs.690 = 345.00
73. Rs.690& above but below Rs.700 = 350.00
74. Rs.700& above but below Rs.710 = 355.00
75. Rs.710& above but below Rs.720 = 360.00
76. Rs.720& above but below Rs.730 = 365.00
77. Rs.730& above but below Rs.740 = 370.00
78. Rs.740& above but below Rs.750 = 375.00
79. Rs.750& above but below Rs.760 = 380.00
80. Rs.760& above but below Rs.770 = 385.00
81. Rs.770& above but below Rs.780= 390.00
82. Rs.780& above but below Rs.790= 395.00
83. Rs.790& above but below Rs.800= 400.00
84. Rs.800& above but below Rs.810= 405.00
85. Rs.810& above but below Rs.820= 410.00
86. Rs.820& above but below Rs.830= 415.00
87. Rs.830& above but below Rs.840= 420.00
88. Rs.840& above but below Rs.850= 425.00
89. Rs.850& above but below Rs.860= 430.00
90. Rs.860& above but below Rs.870= 435.00
91. Rs.870& above but below Rs.880= 440.00
92. Rs.880& above but below Rs.890= 445.00
93. Rs.890& above but below Rs.900= 450.00
94. Rs.900& above but below Rs.910= 455.00
95. Rs.910& above but below Rs.920= 460.00
96. Rs.920& above but below Rs.930= 465.00
97. Rs.930& above but below Rs.940= 470.00
98. Rs.940& above but below Rs.950= 475.00
99. Rs.950& above but below Rs.960=480.00”

EmployAbility – Diversity Recruitment Portal

Supriya Banerji, Deputy Director General, Confederation of Indian Industry (CII)has informed vide email dated 03rd nov. 2008 as follows;

Human resource diversity has been recognized as an effective tool for innovation and also critical for business sustainability. People with physical disabilities represent a large pool of untapped workforce of our society. Though, they are committed, skilled and are willing to work, but face difficulty in finding employment in the private sector. On the other hand, companies engaged with People with Disabilities have experienced decline in attrition rate, sensitivity at workplace, and increase in productivity.

To bridge this divide and further promote their engagement with private sector, AccessAbility, an NGO and, member of CII Ability forum has developed an easy to use web based Diversity Recruitment Portal called EmployAbility.

We request you to please log on to the portal and source your diversity needs.

CII member will be offered the following services on the portal:

§ Free Registration

§ Free Job Postings (Multiple)

§ Free Application Alerts (Email)
§ View Candidate Profiles Online (Applicants Only)
§ Access to Information and Resources
§ The first 100 CII Members to register will get;
Ø Their Company Logo (on the Home page of the portal)
Ø Plus a Profile Page for the Company (Personalised space where you can promote your organisation)

You may like to take a tour of the Portal at


Avoiding the Pitfalls of Online Trading

Cyber Security Tip ST06-004: Avoiding the Pitfalls of Online Trading

Online trading can be an easy, cost-effective way to manage
However, online investors are often targets of scams, so take
precautions to
ensure that you do not become a victim.

What is online trading?

Online trading allows you to conduct investment transactions over
internet. The accessibility of the internet makes it possible for you
research and invest in opportunities from any location at any time.
It also
reduces the amount of resources (time, effort, and money) you have to
to managing these accounts and transactions.

What are the risks?

Recognizing the importance of safeguarding your money, legitimate
take steps to ensure that their transactions are secure. However,
brokerages and the investors who use them are appealing targets
attackers. The amount of financial information in a brokerage’s
makes it valuable; this information can be traded or sold for
profit. Also, because money is regularly transferred through these
malicious activity may not be noticed immediately. To gain access to
databases, attackers may use Trojan horses or other types of
malicious code
(see Why is Cyber Security a Problem? for more information).

Attackers may also attempt to collect financial information by
targeting the
current or potential investors directly. These attempts may take the
form of
social engineering or phishing attacks (see Avoiding Social
Engineering and
Phishing Attacks for more information). With methods that include
setting up
fraudulent investment opportunities or redirecting users to malicious
that appear to be legitimate, attackers try to convince you to
provide them
with financial information that they can then use or sell. If you
have been
victimized, both your money and your identity may be at risk (see
and Responding to Identity Theft for more information).

How can you protect yourself?

* Research your investment opportunities – Take advantage of
such as the U.S. Securities and Exchange Commission’s EDGAR
database and
your state’s securities commission (found through the North
Securities Administrators Association) to investigate companies.
* Be wary of online information – Anyone can publish information on
internet, so try to verify any online research through other
before investing any money. Also be cautious of “hot”
opportunities advertised online or in email.
* Check privacy policies – Before providing personal or
information, check the web site’s privacy policy. Make sure
understand how your information will be stored and used (see
Your Privacy for more information).
* Make sure that your transactions are encrypted – When information
sent over the internet, attackers may be able to intercept
Encryption prevents the attackers from being able to view
* Verify that the web site is legitimate – Attackers may redirect
you to a
malicious web site that looks identical to a legitimate one. They
convince you to submit your personal and financial information,
they use for their own gain. Check the web site’s certificate to
sure it is legitimate (see Understanding Web Site Certificates
for more
* Monitor your investments – Regularly check your accounts for any
activity. Report unauthorized transactions immediately.
* Use and maintain anti-virus software – Anti-virus software
and protects your computer against most known viruses. However,
attackers are continually writing new viruses, it is important to
your virus definitions current (see Understanding Anti-Virus
for more information).
* Use anti-spyware tools – Spyware is a common source of viruses,
attackers may use it to access information on your computer. You
minimize the number of infections by using a legitimate program
identifies and removes spyware (see Recognizing and Avoiding
Spyware for
more information).
* Keep software up to date – Install software patches so that
can’t take advantage of known problems or vulnerabilities
Understanding Patches for more information). Enable automatic
updates if
the option is available.
* Evaluate your security settings – By adjusting the security
settings in
your browser, you may limit your risk of certain attacks (see
Your Web Browser’s Security Settings for more information).

The following sites offer additional information and guidance:
* U.S. Securities and Exchange Commission
* National Consumers League –

Author: Mindi McDowell

Produced 2006 by US-CERT, a government organization.

Note: This tip was previously published and is being re-distributed

to increase awareness.

Terms of use


This document can also be found at



Following information on “DATA SECURITY COUNCIL OF INDIA” received by Mr. Nagendra Venkobarao, Lead Auditor-Det Norske Veritas AS

A Self Regulatory initiative in Data Security and Privacy Protection
1. Background
The phenomenon of globalization has led to creation of innovative business models and provided unprecedented benefits for the global economy. The Indian IT and ITeS/BPO sector had played a pivotal role in this irreversible trend and contributed to the national economy in no small measure. However, the unbundling of business processes has also brought in its wake some unforeseen challenges in the area of data security and privacy.

The Indian ITeS and BPO industry, which started with the advantage of low-cost human resources, has now moved on to add quality and diversity as it differentiators. With companies maturing and successfully coping with the issue of scaling up and expanding, will now need to tackle the problem of offering consistent data security to the customers at an affordable cost. The security landscape is constantly evolving, as the threats, consumer perceptions and legislative and regulatory strategies keep changing. These are the challenges that will need to be met with effective responses.

The Indian ITES/BPO companies are striving hard to ensure the security of data and privacy protection. They are following the stringent security controls specified by their customers through contracts. However, many a times, the problem can not be contained by an individual company, irrespective of the cost incurred, and requires industry-level solutions. Successful security solutions require a convergence of the three components, viz. technology, people and processes. Further, a single instance of information security breach can tarnish the entire industry’s image and the country’s reputation as a safe destination for data. Smaller companies lack dedicated resources for handling security and need cost-effective approaches for demonstrative security levels. There is an urgent need to provide a protected environment for data and privacy for IT and ITeS sector in India, through the establishment of rules and standards that promote ethics, quality and best practices.

NASSCOM has been proactive in pushing this cause for ensuring that the Indian Information Security environment benchmarks with the best across the globe. As a part of its Trusted Sourcing initiative, NASSCOM is in the process of setting up the Data Security Council of India (DSCI) as a Self Regulatory Organization (SRO) to establish, popularize, monitor and enforce privacy and data protection standards for India’s ITeS-BPO industry.

2. Guiding Principles
DSCI is envisaged as a credible and committed body to uphold a high level of data privacy and security standards. DSCI shall be based on the following five guiding principles:

1. Self-Regulation: The structure and operating procedures of DSCI rely primarily upon self-regulation. Industry, rather than a governmental body, is best positioned to develop appropriate data privacy and security standards based upon its greater knowledge and understanding with the practical commercial issues involved. A self regulatory approach will allow DSCI to evolve and respond more effectively to developments in overseas and domestic markets.

2. Adoption of best global practices:
DSCI shall adopt the best global practices, drawing upon U.S. laws, the European Union Directive and Safe Harbor Framework, OECD guidelines, and Asia Pacific Economic Cooperation (APEC) Framework in designing the Code of conduct, which in turn, will continue to evolve with time and experience.

3. Independent Oversight:
The composition of governing body of DSCI shall be balanced with adequate representation of independent directors and industry specialists.

4. Focused Mission:
Initial focus of DSCI shall be its core mission of establishing itself with significant membership with focus on evolving the Code of Conduct and promoting a culture of privacy and security through education and outreach.

5. Enforcement Mechanism:
DSCI shall promote and encourage voluntary compliance of the code, but, in due course, will seek to create a mechanism for enforcement of the code to enhance its credibility among a variety of stakeholders.

3. Structure
DSCI shall be a not-for-profit organization, registered under section 25 of the Companies Act. It would have a diversified membership associated with Data Security and Privacy Protection. This could include: companies in information technology (IT) and IT enabled services (ITeS) sector, companies other than in IT/ITeS sector, Academic or research Institutions and universities. DSCI will thus seek to develop a diverse membership, unified in its pursuit of its objectives. Activities of DSCI members could be in the fields of provision of IT/ITES services, consultancy, research and development and manufacturing. Irrespective of the field of specialization, all DSCI members will be expected to share and support the objectives of DSCI and to operate in a manner consistent therewith.

DSCI shall be headed by a Board of Directors with balanced representation from industry and independent individuals. In the technical aspects, it will be guided by a Steering Committee, which will have experts from the various domains of security.

4. Mission
The key objectives of DSCI will be:

To enable Indian IT/ITeS organizations to provide high standard of security and data protection by adopting the best practices.
To develop, monitor and enforce an appropriate security and data protection standard for the Indian IT/ITES industry that would be adequate, cost effective, adaptable and comparable with the global standards
To build capacity to provide security certification for organizations.
To create a common platform for promoting sharing of knowledge about information security and foster a community of security professionals and firms.
To create awareness among industry professionals and other stakeholders about security and privacy issues.
5. Activities
DSCI shall function as an enabler to the IT and ITeS industry to grow at a rapid pace by facilitating the adoption and enforcement of the prescribed security standards and best practices. It plans to undertake the following activities.

Awareness through Security Forums: Creation and functioning of Security Forums throughout the country for creating awareness among the involved entities and individuals about the importance and measures for data protection.
GAP analysis: Analyzing the existing standards and best practices adopted by the industry in India and industry at the international level.
Devising standards and best practices: Consolidating, devising and enforcing ethical standards and best practices in line with international standards for creating a secured environment for data in India that would be cost effective and easily adoptable.
Research: Carrying out research in the field of data privacy and protection in the context of Indian situation.
Conferences: Organizing national and regional conferences on data security issues.
Certification: Certifying the companies who adopt the standard proposed by DSCI.
Keeping in view the broad objectives, DSCI, as a Self Regulatory Organization, would be a credible and committed body for upholding an effective data privacy and security standard in India, thereby enabling member companies with competitive edge to sustain their rate of rapid growth.

“A Complete Guide to Industries & Enterprises in Goa 2008”

GSIAs publication“A Complete Guide to Industries & Enterprises in Goa 2008”

As on date there is no compilation giving details about how to set up a MSME in the State of Goa; types of formalities required to be completed by an Entrepreneur for setting up the enterprise; different types of NOCs required to be obtained from various Government Departments, Autonomous Bodies etc. and Laws & Rules applicable to MSMEs in Goa.

Therefore, GSIA undertook to bring out a compilation in the form of this publication in two parts namely Part -I contains Procedures to set up an Industry, types and consents / NOCs required, Infrastructure, Marketing and Financial Assistance available as well as the various Laws and Regulations applicable to Industries. Part-II is a directory listing the details of most of the industries functioning in all the Industrial Estates in Goa as well as those outside the Industrial Estates.

The compilation of the information presented in the book serves as a very useful preliminary information for each one to have some knowledge and appreciation about the various formalities concerning the various departments. It is, in this context, that the book might serve as a useful guide introducing the entrepreneurs to other agencies and departments so that they are better placed to appreciate the difficulties of their enterprise and help them as a consortia. GSIA hopes that this publication will satisfy a long felt need by the Entrepreneurs in Goa and would welcome any suggestions from the entrepreneurs to make this book more meaningful.

Priced Publication @Rs.215/- is available for sale at GSIA office, 4th Floor, Goa-IDC House, Patto Plaza, Panaji-Goa.***

Tender Notice received from ASRTU, New Delhi

NEW DELHI- 110049
PHONE: 26499784/85/86,26498019,26496864,16490482,26495710
FAX: 91-11-26491137,26495771
Email: Jendereellasrtu(ti)

Association of State Road Transport Undertakings (ASRTU) is an association representing 58 Public Sector Bus Transport Organisations (STUs) in India. Its member STUs own nearly 1.15 lakh buses (Leyland and Tata) and purchase spares worth about Rs.800 crores a year. ASRTU invites National Competitive Bids and concludes Rate Contracts (RCs) for automobile spares and accessories common to all the STUs. ASRTU’s policy is to encourage qaality and competition. For easy and quick access of the vendors to participate in tenders, ASRTU has introduced Electronic Tendering (E-tendering).

Details of the Tender may please be collected from GSIA office, 4th Floor, Goa-IDC House, Patto Plaza, Panaji-Goa.

CII Summit: Marketing to the Bottom of the Pyramid, Early Registration Offer closes 15th July 2008

CII has been successfully organising the Marketing Summit for the past 8 years, the forthcoming editions being the Ninth in succession. The earlier Summits have attracted an extremely senior audience and authoritative speakers from a number of prestigious organisations from all verticals across the country to discuss and argue inspiring issues associated with the Indian Marketing scenario.

Our next edition of the Marketing Summit is a one-and-a-half day initiative titled – Marketing to the Bottom of the Pyramid – How relevant and in what measure achievable in the Indian context?, which is scheduled to be held on August 19 –20, 2008, at Hotel Taj Palace in New Delhi. You can download the detailed agenda, along with the registration forms by clicking on the respective links.

Eminent speakers at the Summit, who will be involved in addressing and engaging in discussions on topical issues impacting and nurturing theIndian market include:

Mr Thomas Puliyel, President, IMRB International
Mr Arvind Singhal, Chairman, Technopak
Mr Anil Dua, Senior Vice-President, Marketing & Sales, Hero Honda Motors
Ms Rama Bijapurkar, Srategic Marketing Consulting
Mr Prashun Dutta, Whole Time Director, Reliance Energy
Mr Rajiv Sabharwal, Senior General Manager, Head- Retail & Rural Finance Group, ICICI Bank
Mr Arvind Subramanian, Partner & Director, BCG India
Mr Sandip Patel, Asia pacific IBM India
Mr Abdul Khan, Head – marketing, Tata Indicom
Mr Thomas Muthoot, Director (Strategy Development), Muthoot Fincorp
Mr Rohtash Mal, Executive Director & CEO, Escorts
Mr Piyush Pandey, Executive Chairman & National Creative Director, Ogilvy & Mather
Mr Alyque Padamsee, President, A P Associates
Mr Suhel Seth, Chairman Marketing Summit 2008 & managing Partner, Counselage India
You and your colleagues are cordially invited to attend this major event and benefit from the experience particularly since marketing is an important component of every organization.

Whilst we will keep you updated on the programme details, You can fill the Registration Form Online by clicking on this Link and send the printout to us along with the Registration fees. Do avail of the early-bird discount offers which is applicable only till the 15th of July.

We look forward to your participation and are confident that you will find your time well-spent.

Kind regards

Aparna Dutt Sharma
India Brand Equity Foundation
C/o Confederation of Indian Industry
249 F, Sector 18, Udyog Vihar, Phase IV
Gurgaon – 122015, Haryana

Booking Teledesk: +91 11 47591013-14
Fax: +91 124 4013873/75