Consumer Rbi Guidlines
Consumer Rbi Guidlines
6789 of 2021
Reserved on 27.02.2023
Pronounced on 28.04.2023
CORAM
WP(Cri).No.6789 of 2021
and
WMP.Nos.7343 & 7345 of 2021
1/44
https://www.mhc.tn.gov.in/judis
WP(Cri).No.6789 of 2021
9.The Manager,
City Union Bank,
Irungalur Branch,
Opposite SRM Campus,
Irungalur, Trichy.
2/44
https://www.mhc.tn.gov.in/judis
WP(Cri).No.6789 of 2021
3/44
https://www.mhc.tn.gov.in/judis
WP(Cri).No.6789 of 2021
ORDER
21 dated 01.03.2021 on the file of the 7th respondent, and to quash the same
as illegal and without jurisdiction and consequently to direct the 3 rd and 4th
respondents to conduct a free and fair investigation into the cyber crime
4/44
https://www.mhc.tn.gov.in/judis
WP(Cri).No.6789 of 2021
doctor to attend the patients affected with COVID-19. She was being paid
and the amount would be credited to her bank account with the 8th
respondent. Out of the said earnings, she had saved a sum of Rs. 3,20,000/-
and was planning to utilise the same to meet her final year fees during April-
bank.
2.1.The said fact was known to her through an alert SMS. She noticed
the said message only on 11.02.2021, on which date she received another
SMS alert at 14:15 hrs and 22:15 hrs. She immediately sent a message at
22.59 hours to the Bank asking them to block the account. She was under
the impression that the account had been blocked pursuant to her request.
5/44
https://www.mhc.tn.gov.in/judis
WP(Cri).No.6789 of 2021
Once again, on 13.02.2021, she received another SMS informing her that
there had been an attempt to break into her savings account. The petitioner
sent another message to the bank along with her registered mobile number,
2.2. In fact, she had issued messages to block her account only as she
12.33 p.m., she received an SMS informing her that someone had hacked
her account. Within a few minutes, there was an unauthorised debit from
and one more Rs.1,00,000/- at 12.45 pm. The miscreants had hacked her
account and stolen her money. The petitioner called the 7th respondent bank
at 12.43 pm itself and asked them to block her account. However, her
money had been illegally siphoned off; no OTP for withdrawal has been
received on her mobile phone and she has not shared her bank details or
personal details with anyone. Thereafter, she rushed to the City Union Bank
6/44
https://www.mhc.tn.gov.in/judis
WP(Cri).No.6789 of 2021
acknowledged by the bank at 2 p.m. on the very same day, and she had also
given a police complaint to the 4th respondent at 3 p.m. on the same day.
She received the information from the City Union Bank at Aminjikarai
branch that her money had been transferred fraudulently to the PayTM
money was taken away from her account and transferred to the accounts of
some unknown accused. PayTM had shared the customer ID, bank account
details, etc. of the accused through P2P wallet transfers. The money
appeared to have been illegally transferred from her account to six accounts
in the State Bank of India and Fincare Small Finance Bank, Bangalore and
the accounts are said to be belonging to one Uthham Kumar and one Balram
the accused person attempted once again to hack the account and an SMS
alert was received by her at 18.30 hours. Immediately, she had called the
City Union Bank at the Aminjikarai branch and they advised her to reset her
SMS message at 21.26 hours that the reset was successful. However, on
16.02.2021 the accused once again illegally logged onto the petitioner's
7/44
https://www.mhc.tn.gov.in/judis
WP(Cri).No.6789 of 2021
account; since the transfer of funds had been blocked, he was not able to
transfer the funds. So it traces a suspicion about the security system of the
7th respondent bank, and there is also a possibility that any insider of the
that the accused had once again logged onto her account. So the petitioner
called the bank and informed them, and thereafter her account was
completely blocked. The City Union Bank at Aminjikarai branch has been
utterly careless during the entire process. However, the 7th respondent has
sent a letter dated 01.03.2021 denying its liability to refund the loss
sustained by the petitioner. The bank was fully aware of the request made by
the petitioner to block her account on 11.02.2021 itself, and now they are
shifting the blame upon the petitioner. The petitioner has enclosed the
messages she has received. The City Union Bank at Aminjikarai branch
now seeks to fulfill its responsibility under the RBI's circular dated
the part of the customer. Hence, the petitioner is entitled to get the reversal
8/44
https://www.mhc.tn.gov.in/judis
WP(Cri).No.6789 of 2021
branch has attempted to shift the blame on the petitioner, and this raises a
the mischief. In view of the stress and shock suffered due to the above
referred to as the RBI), the 7th respondent is the City Union Bank and the
10th respondent is PayTM. Even though the petition was filed only against
the 10th respondent, the State Bank of India and Fincare Small Finance
Bank have also been suo moto impleaded as parties to the proceedings by
virtue of the orders of this Court dated 02.11.2022. However, the existing
9/44
https://www.mhc.tn.gov.in/judis
WP(Cri).No.6789 of 2021
4. The RBI has filed the counter by stating that the responsibility of
the RBI is to regulate and supervise the banking sector to the benefit of the
economy in the country under the provisions of the Banking Regulation Act
1949. Various directions and guidelines have been issued by the Reserve
transactions between the regulated entities and their customers, the RBI
does not interfere. Only in the event that the regulated entity violates or
contravenes the directions issued by the RBI, the latter would take
within the ambit of the scheme and appropriate redressal will be given
4.1. The petitioner had filed a complaint before the RBI Ombudsman
referred as the BOS-2006], inter alia, alleging that the money in her savings
bank account, maintained by the 7th respondent, was siphoned off through
10/44
https://www.mhc.tn.gov.in/judis
WP(Cri).No.6789 of 2021
documents and comments from the bank, i.e., City Union Bank, the
file a complaint against the bank. The RBI has issued directions and
protection and has defined the extent of the liability of the customers and
the relevant regulated entity. The RBI had issued a circular dated
4.2. Paragraph 6(b) of the below mentioned circular, states about the
customer's liability in cases where the deficiency lies neither with the PPI
issuer nor with the customer but elsewhere in the system and the customer
11/44
https://www.mhc.tn.gov.in/judis
WP(Cri).No.6789 of 2021
notifies the PPI issuer or the customer regarding the unauthorised payment
follows:
“6.A customer’s liability arising out of an unauthorized payment transaction will be limited to:
# The number of days mentioned above shall be counted excluding the date of
receiving the communication from the PPI issuer.
The above shall be clearly communicated to all PPI holders”
12/44
https://www.mhc.tn.gov.in/judis
WP(Cri).No.6789 of 2021
paragraphs Nos. 6 and 7 of the above circular dated July 6, 2017, the bank is
banking transactions lies neither with the bank nor with the customer but
extracted hereunder:
“Limited Liability of a Customer
7. A customer shall be liable for the loss occurring due to unauthorized transactions in the
following cases:
i.In cases where the loss is due to negligence by a customer, such as where he has
shared the payment credentials, the customer will bear the entire loss until he
reports the unauthorized transaction to the bank. Any loss occurring after the
13/44
https://www.mhc.tn.gov.in/judis
WP(Cri).No.6789 of 2021
14/44
https://www.mhc.tn.gov.in/judis
WP(Cri).No.6789 of 2021
Table 2
Summary of Customer’s Liability
Time taken to report the Customer’s liability (Rs.)
fraudulent transaction from the
date of receiving the
communication
Within 3 working days Zero liability
Within 4 to 7 working days The transaction value or the
amount mentioned in Table 1,
whichever is lower
Beyond 7 working days As per bank’s Board
approved policy
No.12 of the circular dated 06.07.2017 also the burden of proving the
The 7th respondent /the City Union Bank submitted that the petitioner
has suppressed and misinterpreted several material facts. The present cash
15/44
https://www.mhc.tn.gov.in/judis
WP(Cri).No.6789 of 2021
through a Unified Payment Interface (UPI). The petitioner has been using
one such UPI ie. Pay TM app, who is impleaded as 10th respondent in this
case. As per the guidelines laid down by the RBI vide master directions
protection. Any user using the UPI through its applications, such as Google
Pay, Amazon Pay, PayTM etc., has to first complete the KYC [Know Your
Customer] formality and only then he is allowed to use the UPI. The UPI is
registered with the mobile number. The UPI can be used only if the user is
using the same mobile number that has been registered in the bank with
which he accedes his bank account. After registering the UPI with the
mobile numbers only, the user can use the mobile applications for
16/44
https://www.mhc.tn.gov.in/judis
WP(Cri).No.6789 of 2021
UPI typically has a 4 to 6 digit numeric pin (MPIN). In some cases, it is also
to the registered mobile number of the user. The MPIN, ATM PIN are set
by the user and known only to the user, and the OTP is accessed only
under the control of the user and no one else, unless it has been accessed by
an unauthorised third party. All these processes are totally automated, and
there is no human intervention at any level. The only way that could be
compromised is if the details in the UPI are accessed by a third party by way
of hacking.
5.2. In the case in hand, the petitioner had lost her money through
PayTM i.e. 10th respondent herein, and not from the seventh respondent's
system. The perpetrators had gained access to the petitioner's bank account
through PayTM and not through the 7th respondent's bank system. The
petitioner's bank statement would show that the petitioner has been regularly
using PayTM for on-line shopping as well. On 09.02.2021 there was a login
17/44
https://www.mhc.tn.gov.in/judis
WP(Cri).No.6789 of 2021
5.3. The multiple Short Messaging Service (SMS) messages were sent
every time there was an attempt to log into the petitioner's account. The
real time, with no human intervention. The SMS Log report would show
that multiple attempts have been made since 09.02.2021 and every time an
attempt has been made, a message has been sent to the petitioner's registered
mobile number. The number of SMS sent from the bank with dates is
tabulated under:
5.4. The petitioner never took cognizance of the SMS that was sent
18/44
https://www.mhc.tn.gov.in/judis
WP(Cri).No.6789 of 2021
When repeated messages are sent on February 11th, 13th, 14th, and 15th,
2021, the petitioner ought to have called the bank's customer care number
and escalated the issue immediately by blocking her account. But the same
was not done by her. The RBI's circular dated 06.07.2021 referred to by the
petitioner will not be applicable to the present case because the entire issue
is with the UPI service provider, i.e., PayTM, the 10th respondent herein.
Without asserting these facts, the 7th respondent cannot be held liable.
5.5. It is seen from the reports that the petitioner's phone has been
hacked by some third party. Every time the petitioner tried to change the
MPIN, the hackers managed to access her account. If the phone is hacked,
it is beyond the control of the bank to protect the account. The perpetrators
had gained access to the petitioner's account through the 10th respondent
and not this respondent's banking system on both occasions, i.e., 09.02.2021
and 11.02.2021. With regard to the mobile banking block request sent by
sent by the petitioner was in an incorrect format it was rejected. In fact the
19/44
https://www.mhc.tn.gov.in/judis
WP(Cri).No.6789 of 2021
5.6. The SMS alert sent by the petitioner was not received by the
bankers system since it was not correct. The following four unauthorized
Card & PIN. The reported fraudulent transactions are PayTM transactions
done using Mobile Banking (MB) ID and authorised with MB PIN for login,
and Card PIN was used for second factor authentication for the transaction.
20/44
https://www.mhc.tn.gov.in/judis
WP(Cri).No.6789 of 2021
below:
5.8. Despite the efforts of the bank to secure the account of the
managed to get access. Even after the MPIN was changed by the petitioner,
the hackers still managed to gain access to her account. On 15.02.2021 the
ought to have sent her mobile for forensic examination. The petitioner could
have immediately called the customer care number to block her account by
reporting the unauthorised transactions. The petitioner has not reported the
matter to PayTM, which is the main gateway from where the unauthorised
transactions had taken place. There is no lapse on the part of the 7th
respondent. The petitioner had also raised a complaint with the Banking
Ombudsman. The hacking has actually taken place on 16.02.2021 and not
21/44
https://www.mhc.tn.gov.in/judis
WP(Cri).No.6789 of 2021
customers until RBI completes its IT audit of the 10th respondent. There
are issues with the 10th respondent, i.e., PayTM's mobile application, that
could have led to this incident. The petitioner ought to have given a
6. The 10th respondent PayTM has filed his counter and the 10 th
the new set of differentiated banks introduced by the Reserve Bank of India
unbanked and under banked Indians. It has been granted with a licence by
the Reserve Bank of India to carry on payment bank business under the
Banking Regulation Act, 1949. This is also in line with the government of
the PayTM payment bank is concerned, the petitioner has been impleaded
22/44
https://www.mhc.tn.gov.in/judis
WP(Cri).No.6789 of 2021
6.1. The 10th respondent is not a bank or other authority under Article
of contract between the respondent No.10 PayTM payments bank. The 10th
web based platform and mobile application have been verified by the CVV
and the One-Time Password (OTP) of the credit and debit cards of the
holders. The OTP has been delivered to the mobile number registered with
such credit and debit card service providers and once the same is verified by
the issuing bank and subsequent to the receipt of information from such a
bank regarding the validity of the mode of payment, the technical server of
23/44
https://www.mhc.tn.gov.in/judis
WP(Cri).No.6789 of 2021
6.2. All transactions carried out on the PayTM Platform are secured
generated by the respective card /Bank service provider and known only to
the individual customer / card holder / petitioner. If there had been any
number / Account No., OTP/UPI PIN etc, the said transaction could never
have been successful and the amount in question in said transaction could
service provider, and hence, in case any customer is willing to perform any
payment, i.e., Debit/Credit card, net banking, UPI and upon entering correct
and genuine banking credentials along with OTP / PIN etc., the said
24/44
https://www.mhc.tn.gov.in/judis
WP(Cri).No.6789 of 2021
Electronic Banking Transaction has clearly specified that the customer shall
be liable for the loss occurred due to unauthorised transactions if the loss
credentials, etc., Neither in the petition nor in the legal notice, no grievance
has been made against the respondent No.10 and hence the 10th
adjudicatory authority under the Information Technology Act and the writ
petition is barred in view of the alternate remedy. The 10th respondent has
6.4. As per the ratio laid down by the Hon'ble Supreme Court in
State of Rajasthan V. Bhawani Singh & Ors, AIR 1992 SC 1018, if there
are disputed and mixed questions of fact that cannot be adjudicated in writ
frauds.
25/44
https://www.mhc.tn.gov.in/judis
WP(Cri).No.6789 of 2021
submitted that there are materials to show that the impugned transactions
were fraudulent and it was not done by the petitioner; even though the RBI
transactions is done within three days, the customer does not have any
(PPI) to make good the loss suffered by the customers; the unfortunate
petitioner who held her account with the 7th respondent, City Union Bank,
their liability by stating that there was no deficiency of service on the part of
the 7th respondent bank and hence the 7th respondent is not liable to
banks have been introduced by the RBI. The aim of such a promotion of
26/44
https://www.mhc.tn.gov.in/judis
WP(Cri).No.6789 of 2021
10. Even though the public is encouraged to use payment banks such
as PayTM, Google Pay, Amazan Pay, etc., the customer is made to run from
fraudulent intervention. What is surprising is that even when the RBI has
issued detailed master directions for both banks and Prepaid Payment
Instruments [PPI], every institution shifts the blame upon the other and no
one has come up with a concrete idea as to who has to bear the loss suffered
the petitioner's account with the City Union Bank through the PayTM app
from 09.02.2021. The City Union Bank had alerted her by sending an SMS
27/44
https://www.mhc.tn.gov.in/judis
WP(Cri).No.6789 of 2021
notice the message on 11.02.2021 and she had sent an SMS to block her
and things went beyond the control of the petitioners and the bankers.
liability ends with alerting the customer and they were not able to block her
account because the SMS was not sent in a proper manner. The petitioner
omitted to call the branch directly to see that her account is blocked. After
the advent of on-line transactions, the life style of the individuals has
with the branch has become obsolete. In view of the various online
mechanisms provided by the banks for almost all banking services, no one
surprise that the petitioner did not make any direct contact with the bank
and that she followed scrupulously how she was instructed in the alert SMS.
28/44
https://www.mhc.tn.gov.in/judis
WP(Cri).No.6789 of 2021
registered with much difficulty. As per the status report submitted by the 4th
respondent, the fraudsters were identified by their names and they have
accounts with SBI. The fraudsters had acted smartly by transferring the
order to prevent the reversal. After the complaint was made to the 7th
fraudsters had used the PayTM mobile app and managed to access the
account and mobile number. After installing the PPI applications, the
customer has to link his registered mobile number with his bank account
and the application. By opening the app, either by using a biometric method
or a PIN number, the app will be accessed and transactions will be done by
typing the PPI-PIN numbers and the money can be transferred within
moments. No doubt such applications are time saving and convenient, but
29/44
https://www.mhc.tn.gov.in/judis
WP(Cri).No.6789 of 2021
the user does not know how to address his grievance if anyone tampers with
the accounts by fraudulent means and siphons off the money lying in his
account.
neither the case of the 7th respondent bank nor the 10th respondent PayTM
that the transactions were done by the petitioner herself, and she is making
the persons involved and in the status report it is stated that the fraudsters
have managed to access the app by being in some other states, like Bihar.
Whatever might be the modus operandi adopted by the fraudsters, the fact
remains that it was not the petitioner who had revealed the details of her
unknowingly. The fraudsters had used PayTM application and not the net
no security compromise at their end, and hence, the banker is not liable to
30/44
https://www.mhc.tn.gov.in/judis
WP(Cri).No.6789 of 2021
16. The records would make it clear that the access was done through
a payment bank named PayTM. In fact, with the details furnished by the 7th
officer could know the persons who transacted and who made the fraudulent
India, and after a series of court orders, Fincare India was obliged to reverse
the said sum to the petitioner's account. Since the City Union Bank and
PayTM shifted the blame upon each other and did not come forward to take
RBI, has been asked to come out with their stand and to clarify who is liable
17. The 6th respondent, RBI, has filed his counter affidavit and stated
about the various guidelines issued by the Reserve Bank of India in the
interest of customer protection. The counter affidavit of the RBI was also
diplomatic to the extent that the RBI did not pinpoint either the 7th
31/44
https://www.mhc.tn.gov.in/judis
WP(Cri).No.6789 of 2021
the petitioner. The above exercise of fixing the liability was left to the court
in light of the guidelines of the RBI, which the 6th respondent reiterated in
his counter. In fact, the RBI guidelines are customer-friendly, and if the
fixed on the customer. The above position is similar for both banks and
Prepaid Payment Instruments, except for the fact that they were through
different circulars. Since the transaction was not done through any `Net
18. The case in hand does fall within the clause (b) of the following
32/44
https://www.mhc.tn.gov.in/judis
WP(Cri).No.6789 of 2021
if the complaint has been made within 4 to 7 days and if beyond 7 days, it is
as per the policy of the prepaid payment instrument issuer. In the case in
hand, the petitioner had given her complaint to her banker immediately after
33/44
https://www.mhc.tn.gov.in/judis
WP(Cri).No.6789 of 2021
the petitioner ought to have given her complaint to the 10th respondent
instead of the 7th respondent. Because even the petitioner was not able to
know how the fraud was committed. The matter came to light after the
initiative taken by the 7th respondent bank. In fact, the 7th respondent bank
cannot be said that the 10th respondent is not aware of the fraud just because
that the 10th respondent payment bank is a private corporation and not a
of this Court. The 6th respondent RBI, has stated that the primary function
of the RBI is to regulate and supervise the banking sector for the benefit of
this country's economy under the provisions of the Banking Regulation Act
1949. It is further submitted that the RBI would not normally interfere with
the transactions between the regulated entities and their customers. But that
this would not preclude the RBI from taking cognizance of the matter when
34/44
https://www.mhc.tn.gov.in/judis
WP(Cri).No.6789 of 2021
21. It is further submitted that the customer could approach the RBI
Ombudsman under the Ombudsman Scheme and the same will be examined
even if they fall within the ambit of the Scheme. Since a customer's savings
economy, it cannot be said that the customer's interest is alien to the interest
of the economy of the country. If all the customers switch over to physical
mode of money transactions and abstain from doing transactions through the
banking sector, that would grossly affect the economy of the country and
hence, the customer's interest is also paramount. So, the RBI has an
true when it comes to the knowledge of the RBI that a payment bank like
PayTM evades to comply RBI guidelines and shrieks away its liability to
22. Even though the petitioner has sought compensation from the 7th
35/44
https://www.mhc.tn.gov.in/judis
WP(Cri).No.6789 of 2021
above would only fix the liability on the payment bank [the 10th respondent]
and not upon the 7th respondent bank. Though a straight away directions
can not be given against the 10th respondent, since it is a private body, this
Court can mould the relief in such a way that directions should be given to
the 6th respondent, RBI, to take action against the 10th respondent for
violating its own guidelines. The RBI guidelines are issued not as a
formality, but the entities subjected to the RBI regulations should comply
with the conditions of the master circular in its true letter and spirit.
23. In fact, as per the guidelines No. 16.4.8, the non bank Prepaid
Payment Instrument issuers shall ensure that a complaint is resolved and the
liability of the customer is established within the said time not exceeding 90
days. But the 10th respondent has not come forward to take cognizance of
the grievances suffered by the petitioner, who was the user of the PayTM
banking services. It is further stated in the above guidelines that if the PPI
liability within 90 days, the amount as prescribed under guideline No. 16.4.8
36/44
https://www.mhc.tn.gov.in/judis
WP(Cri).No.6789 of 2021
24. In the case in hand the 10th respondent had failed to resolve the
dispute within 90 days and he has not come out with any concrete structure
Within 90 days from the date of the complaint i.e. from 16.02.202,1 the 10 th
respondent did not prove how the customer is liable. In fact with the
informations furnished by the 7th respondent and the 10th respondent itself, it
is made clear that there is no fraudulent actions on the part of the petitioner
has brought to the attention of this Court that it is at the discretion of the
payment banks to waive the customers liability, if any, even if the customer
Corporate Company by name One 97, which owns the consumer brand
PayTM, along with PayTM Payments Bank Ltd have filed a writ petition
before the Delhi High Court for seeking directions against the department of
37/44
https://www.mhc.tn.gov.in/judis
WP(Cri).No.6789 of 2021
any other regulations issued from time to time to curb fraudulent unsolicited
Such frauds are committed thorough spying activities done by using the
PayTM before the Delhi High court that its customers alone have
cumulatively lost nearly 10 Crores Rupees between the period from July
customers.
26. The modus adopted by the fraudsters is like taking the customers
to a malicious link or a phone number sent through SMS and when the
38/44
https://www.mhc.tn.gov.in/judis
WP(Cri).No.6789 of 2021
customer dials the number or clicks the link so given, that would lead to
withdraw funds from the victim's bank account. Such kind of spying attacks
have a deleterious effect upon the customers similar to the case in hand. It is
also brought to the knowledge of the Court by the learned counsel for the
petitioner that PayTM was banned from enrolling new customers. The RBI
has taken action against PayTM under Sec.35-A of the Banking Regulation
27. In fact, it is stated by the RBI that such an action has been taken
the bank itself. So the system audit is required for the IT system adopted by
petitioner is one among the several users and hence the 10th respondent is
liable to make out the loss suffered by the petitioner. As it has been stated
already that the complaint has been made by the customer to her banker, and
39/44
https://www.mhc.tn.gov.in/judis
WP(Cri).No.6789 of 2021
the banker has kept in touch with PayTM, PayTM can not disown its
liability.
28. Since the RBI has been issuing directions to PayTM, as already
settle the loss suffered by the petitioner within the next two weeks. It is
emphasised that the 10th respondent had failed to establish the liability on
the part of the customer within 90 days as prescribed in the guidelines of the
RBI, and hence the 10th respondent cannot state that the matter in issue
involves a lot of facts to be gone into. The violations are crystal clear, and
the 6th respondent has got the obligation to intervene when to the knowledge
of the 6th respondent, the 10th respondent continues to violate the RBI
modified to the effect that the 6th respondent is directed to issue directions
to the 10th respondent to make good the loss suffered by the petitioner
without any other reduction, except the reduction of the amount, if any
40/44
https://www.mhc.tn.gov.in/judis
WP(Cri).No.6789 of 2021
28.04.2023
Index : Yes
Internet : Yes
Speaking:Yes
Neutral : Yes
jrs
To
1.The Commissioner of Police,
Office of the Commissioner of Police,
Vepery, Chennai-600 007.
41/44
https://www.mhc.tn.gov.in/judis
WP(Cri).No.6789 of 2021
Vigilance Department,
24-B, Gandhi Nagar,
Kumbakonam 612 001.
8.The Manager,
City Union Bank,
Irungalur Branch,
Oppositte SRM Campus,
Irungalur, Trichy.
42/44
https://www.mhc.tn.gov.in/judis
WP(Cri).No.6789 of 2021
43/44
https://www.mhc.tn.gov.in/judis
WP(Cri).No.6789 of 2021
R.N.MANJULA, J.
jrs
Pre-delivery Order in
WP(Cri).No.6789 of 2021
and
WMP.Nos.7343 & 7345 of 2021
28.04.2023
44/44
https://www.mhc.tn.gov.in/judis