fbpx

Security in Gig Economy

Security in Gig Economy

Gig Economy:

  • A gig economy is a free market system in which temporary positions are common and organizations contract with independent workers for short-term engagements.
  • It is also called as “flex economy” or “mobile economy,”
  • Workers perform “gigs,” in which they are employed for a specific task or time. This is done to achieve advantage of cost, quality, and flexibility. Once the task is complete, the worker is free to move on.
  • Global Gig Economy Index report has ranked India among the top 10 countries.
  • The report says there has been an increase in freelancers in India from 11% in 2018 to 52% in 2019, thanks to various initiatives including Startup India and Skill India.

Significance of Gig Economy

  • Augmenting Social Services
  • Providing Employment In Urban Areas
  • Enabling Jobs For All Scenario

Factors aiding the rise of the gig economy:

  • Seasonal increase in demand of the workers
  • Technology
  • Cost Factor

Need for Protection of Platform Workers:

  • International Experience
  • Vulnerability of Debt Trap
  • Arbitrary Action
  • Platform delivery people can claim benefits, but not labour rights(eg:swiggy)

New version of labour code :

  • The three new labour codes passed by Parliament recently acknowledge platform and gig workers as new occupational categories in the making
  • Defining gig workers is done in a bid to keep India’s young workforce secure as it embraces ‘new kinds of work’, like delivery, in the digital economy.
  • In the Code on Social Security, 2020, platform workers are now eligible for benefits like maternity benefits, life and disability cover, old age protection, provident fund, employment injury benefits, and so on.

Issues in the Security Code:

  • Eligibility does not mean that the benefits are guaranteed.
  • No Fixed Responsibility
  • Labour codes

Way Forward:

  • Concerted Efforts
  • Joint Accountability
  • Need For Clarity
  • Offering some basic privacy training or resources
  • Strengthen mobile device security processes and protocols to mitigate the risks associated with many external connections.

Leave a Reply

Your email address will not be published. Required fields are marked *