Which of the following are not the objectives of the Competition Act, 2002? (A) Ensure freedom of trade for other participants in incidental and connected markets. (B) Provide a reasonable level of reliability and connect operation. (C) Adhere to generally accepted security procedures. (D) Protect the interests of consumers. Choose the correct answer from the options given below:

Which of the following are not the objectives of the Competition Act, 2002? (A) Ensure freedom of trade for other participants in incidental and connected markets. (B) Provide a reasonable level of reliability and connect operation. (C) Adhere to generally accepted security procedures. (D) Protect the interests of consumers. Choose the correct answer from the options given below: Correct Answer B, C only

The incorrect answer is  B, C only

Important Points

(A) Ensure freedom of trade for other participants in incidental and connected markets.

  • This is one of the objectives of The Competition Act, 2002.
  • The Competition Act, 2002 ensures freedom of trade carried on by other participants in markets, in India, and for matters connected therewith or incidental thereto.

(B) Provide a reasonable level of reliability and connect operation.

  • This is not the objective of The Competition Act, 2002.
     

(C) Adhere to generally accepted security procedures.

  • This is not the objective of The Competition Act, 2002.
     

(D) Protect the interests of consumers.

  • This is one of the objectives of The Competition Act, 2002.
  • The Competition Act, 2002 ensures protection of interests of consumers.

Additional Information

The Competitors Act, 2002 Competition is the act of sellers seeking to gain the protection of buyers in order to gain personal profit or market share.

This Act, enacted by the Parliament of India in 2002 and the Monopolies and Restrictive Trade Practices Act, 1969 was replaced.

It is effective to control Indian competition.

Its objectives are as follows:

  • To prepare a roadmap for the establishment of the Competition Commission
  • To prevent monopoly and promote competition in the market.
  • To protect consumer interests.
  • Ensuring the freedom of the people participating in the business.

Related Questions

In the question below, are given a statement followed by three courses of actions numbered I, II and III. On the basis of the information given, you have to assume everything in the statement to be true, and then decide which of the suggested course of action logically follow (s) for pursuing. Statement: The India Risk Survey 2017 report ranks 'Information & Cyber Insecurity' as the biggest risk facing Indian companies. Indian organizations, both public and private, had witnessed over 27,000 incidents of security threat, from January 2017 till June 2017 alone. Phishing, scanning/probing, website intrusions and defacements, virus/malicious code, ransomware, Denial of Service attacks, and data breaches are some ways in which hackers attack business websites, which can cause operational disruptions and potentially steal sensitive information. Small and medium businesses (SMBs), unfortunately, have been seeing rising incidences of cybercrime. In fact, 70 percent of cyberattacks occur at organizations with lesser than 100 employees  Courses of action: I. Mandate basic security practices and policies for all employees, such as 2-factor authentication, internet use guidelines and create and enforce rules on handling and protecting sensitive data. Conduct frequent training to sensitize employees about opening suspicious emails, encrypting their data, using strong passwords on their devices, installing security apps, and limiting activity over public Wi-Fi. Implement and enforce incident reporting to help ensure that even the smallest breach is report to management as well as the IT teams. II. Basics still matter and are some of the best defenses against viruses, malware, and other online threats. Assess the assets that are most at risk - data, servers, network - and ensure that the systems are updated with the latest security software, web browser, and operating system. Implement firewall security and run antivirus software after each update.  III. Ensure regular backup of all critical data - whether stored in-house or on the cloud. Run scheduled attack drills and stress tests to identify vulnerabilities and ensure that data restoration and business continuity are executed as planned.