Tax Management India. Com
Law and Practice  :  Digital eBook
Research is most exciting & rewarding


  TMI - Tax Management India. Com
Follow us:
  Facebook   Twitter   Linkedin   Telegram
Article Section

Home Articles Goods and Services Tax - GST Mr. M. GOVINDARAJAN Experts This

VERIFICATION OF DOCUMENTS AND CONVEYANCES

Submit New Article
VERIFICATION OF DOCUMENTS AND CONVEYANCES
Mr. M. GOVINDARAJAN By: Mr. M. GOVINDARAJAN
July 11, 2018
All Articles by: Mr. M. GOVINDARAJAN       View Profile
  • Contents

Rule 138B provides for verification of documents and conveyances.  Rule 138 B(1) provides that the Commissioner or an Officer empowered by him in this behalf may authorize the proper officer to intercept any conveyance to verify the e-way bill or the e-way bill number in physical form for all inter-State and intra-State movement of goods.

The Commissioner shall get Radio Frequency Identification Device readers installed at places where the verification of movement of goods is required to be carried out and verification of movement of vehicles shall be done through such device readers where the e-way bill has been mapped with the said device.

RFID Device

RFID stands for Radio Frequency Identification Device.   RFID uses electromagnetic fields to automatically identify and track tags attached to objects.  The tags contain electronically stored information.   Passive tags collect energy from a nearby RFID reader’s interrogating radio wave.  Active tags have a local power source such as a battery and may operate at hundreds of meters from the RFID reader.   Unlike a barcode, the tag need not be within the line of sight of the reader, so it may be embedded in the tracked object.  RFID is one method for automatic identification and data capture (AIDC).  RFID tags are used in many industries, for example an RFID tag attached to an automobile during production can be used to track its progress through the assembly line; RFID tagged pharmaceuticals can be tracked through warehouses; and implanting, RFID microchips in livestock and pets allows positive identification on animals.

The physical verification of conveyances shall be carried out by the proper officer as authorized by the Commissioner or an officer empowered by him in this behalf.

On receipt of specific information on evasion of tax, physical verification of a specific conveyance can also be carried out by any other officer after obtaining necessary approval of the Commissioner or an officer authorized by him in this behalf.

RFID system

An RFID system consists of three components-

  • a scanning antenna and transceiver (often combined into one reader, also known as an interrogator);
  • transponder,  and
  • the RFID tag.

An RFID tag consists of a microchip, memory and antenna.

The RFID reader is a network-connected device that can be permanently attached or portable. It uses radio frequency waves to transmit signals that activate the tag. Once activated, the tag sends a wave back to the antenna, where it is translated into data.

There are two main types of RFID tags-

  • active RFID; and
  • passive RFID.

An active RFID tag has its own power source, often a battery. A passive RFID tag, on the other hand, does not require batteries; rather it receives its power from the reading antenna, whose electromagnetic wave induces a current in the RFID tag's antenna. There are also semi-passive RFID tags, meaning a battery runs the circuitry while communication is powered by the RFID reader.

RFID tags typically hold less than 2,000 KB of data, including a unique identifier/serial number. Tags can be read-only or read-write, where data can be added by the reader or existing data overwritten.

The read range for RFID tags varies based on factors including type of tag, type of reader, RFID frequency, and interference in the surrounding environment or from other RFID tags and readers. Generally speaking, active RFID tags have a longer read range than passive RFID tags due to the stronger power source.

RFID frequencies: Types of RFID systems

 There are three main types of RFID systems-

  • low frequency (LF),
  • high frequency (HF); and
  • ultra-high frequency (UHF).

Microwave RFID is also available. Frequencies vary greatly by country and region.

Low Frequency

Low-frequency RFID systems range from 30 KHz to 500 KHz, though the typical frequency is 125 KHz. LF RFID has short transmission ranges, generally anywhere from a few inches to less than six feet.

High Frequency

High-frequency RFID systems range from 3 MHz to 30 MHz, with the typical HF frequency being 13.56 MHz. The standard range is anywhere from a few inches to several feet.

Ultra High Frequency

 UHF RFID systems range from 300 MHz to 960 MHz, with the typical frequency of 433 MHz and can generally be read from 25-plus feet away.

Microwave RFID systems run at 2.45 GHz and can be read from more than 30-plus feet away.

The frequency used will depend on the RFID application, with actual obtained distances sometimes varying considerably from what might be expected. For example, when the U.S. State Department announced it was to issue electronic passports enabled with an RFID chip, it said the chips would only be able to be read from approximately four inches away. However, the State Department was soon confronted with evidence that RFID readers could skim the information from the RFID tags from much farther than 4 inches, some claiming upward of 33 feet away, proving the difference between advertised and actual range can vary immensely.

If read longer ranges are needed, using particular tags with additional power can boost read ranges to 300-plus feet.

RFID applications and use cases

RFID dates back to the 1940s; it was used more frequently in the 1970s. However, the high cost of the tags and readers has prohibited widespread commercial use. As hardware costs have decreased, RFID adoption has increased.

The most common RFID application is for tracking and management. This includes pet and livestock tracking, inventory management and asset tracking, cargo and supply chain logistics, and vehicle tracking. RFID can also be used in retail for advertising customer service and loss control; in the supply chain for improved visibility and distribution; and in security situations for access control.

Multiple industries use RFID applications, including healthcare, manufacturing, retail, business and home use.

RFID vs. barcodes

Using RFID as an alternative for barcodes is increasing in use. Among its benefits, RFID can identify individual objects, animals or people without direct line of sight, can identify many items -- often a thousand or more -- simultaneously, and can scan items anywhere from inches to feet away depending on the type of tag and RFID reader. Read time for RFID tags is typically less than 100 milliseconds.

Barcodes, on the other hand, require direct line of sight and closer proximity than an RFID tag. They also take longer to read, generally ½ second or more per tag. Because barcodes represent a product type versus an individual object represented by an RFID tag, additional information cannot be gleaned from them. In addition, barcodes are not read-write, and because they are printed on the outside of the object are limited in terms of reuse thanks to wear and tear. RFID tags are more rugged and better protected, often in a plastic cover. However, RFID tags cost more than a printed barcode.

RFID challenges

RFID is prone to two main issues: reader collision and tag collision. Reader collision, when a signal from one RFID reader interferes with a second reader, can be prevented by using an anti-collision protocol to make RFID tags take turns transmitting to their appropriate reader.

Tag collision occurs when too many tags confuse an RFID reader by transmitting data at the same time. Choosing a reader that gathers tag info one at a time will prevent this issue.

RFID security and privacy

A common RFID security or privacy concern is that RFID tag data can be read by anyone with a compatible reader. Additionally, tags can often be read after the item leaves the store or supply chain. Tags can also be read without the user's knowledge, and if the tag has a unique serial number, it can be associated to a consumer. While a privacy concern for individuals, in military or medical settings this can be a national security concern or life-or-death matter.

Because RFID tags do not have a lot of compute power, they are unable to accommodate encryption, such as might be used in a challenge-response authentication system. One exception to this, however, is specific to the RFID tags used in passports, basic access control (BAC). Here, the chip has sufficient compute power to decode an encrypted token from the reader, thus proving the validity of the reader. At the reader, in turn, information printed on the passport is machine-scanned and used to derive a key for the passport. There are three pieces of information used -- the passport number, the birth date of the passport holder and the passport's expiration date -- along with a checksum digit for each of the three. Researchers have pointed out that this means passports are protected by a password with considerably less entropy than is normally used in e-commerce, and further that the key is static for the life of the passport, so that once an entity has had one-time access to the printed key information, the passport is readable with or without the consent of the passport bearer until the passport expires. The U.S. State Department, which adopted the BAC system in 2007, additionally has added an anti-skimming material to electronic passports to mitigate the threat of undetected attempts to steal users' personal information.

RFID standards

There are a number of guidelines and specifications for RFID technology, with the main ones being the International Organization for Standardization (ISO), Electronics Product Code Global Incorporated (EPCglobal) and International Electrotechnical Commission (IEC).

Each radio frequency has associated standards, including ISO 14223 and ISO/IEC 18000-2 for LF RFID, ISO 15693 and ISO/IEC 14443 for HF RFID, and ISO 18000-6C for UHF RFID.

Next-generation RFID use

RFID systems are becoming increasingly used to support internet of things deployments. Combining the technology with smart sensors and/or GPS technology allows sensor data including temperature, movement and location to be wirelessly transmitted.

Inspection and detention of goods

Rule 138C provides for inspection and verification of goods.  Rule 138C(1) provides that a summary report of every inspection of goods in transit shall  be recorded online by the proper officer in Part A of Form GST EWB – 03 within twenty four hours of inspection and the final report in Part B of Form GST EWB – 03 shall be recorded within three days of such inspection.

Rule 138C(2) provides that where the physical verification of goods being transported on any conveyance has been done during transit at one place within the State or in any other States no physical verification of the said conveyance shall be carried out in the Statement, unless a specific information  relating to evasion of tax is made available subsequently.

Form GST EWB – 3

The form GST EWB – 3 has two parts, as Part A and Part B.   The proper officer has to furnish the following information in Part A of this form-

  • Name of the Officer
  • Place of inspection
  • Time of inspection
  • Vehicle number
  • E-Way bill Number
  • Invoice or challan or Bill date
  • Invoice or challan or bill Number
  • Name of person in charge of vehicles
  • Description of goods;
  • Declared quantity of goods;
  • Declared value of goods;
  • Brief description of the discrepancy

(The discrepancy is to be stated in brief)

  • Whether goods were detained?
  • If not, date and time of release of vehicle

In Part B of the said form the following information is to be furnished-

  • Actual quantity of goods;
  • Actual value of the goods;
  • Tax payable-
  • Integrated tax;
  • Central tax;
  • State or Union territory tax;
  • cess
  • Penalty payable
  • Integrated tax
  • Central tax
  • State or Union territory tax;
  • cess
  • Details of notice
  • Date
  • Number
  • Summary of findings.

Uploading information about detention of vehicle

Rule 138D provides that where a vehicle has been intercepted and detained for a period exceeding 30 minutes, the transporter may upload the said information in Form GST EWB – 04 on the common portal.  For the purposes, the expressions ‘transported by railways’, ‘transportation of goods by railways’, ‘transport of goods by rail’ and ‘movement of goods by rail’ does not include cases where leasing of parcel space by Railways takes place.

The following information is to be given in Form GST EWB – 04 as report of detention.

  • E-way Bill Number;
  • Approximate Location of detention;
  • Period of detention;
  • Name of officer in charge (if known);
  • Date
  • Time

 

By: Mr. M. GOVINDARAJAN - July 11, 2018

 

 

 

Quick Updates:Latest Updates