Search

Advanced Search

Honorable Minister Health and Medical Education J&K Government reviewed e-Hospital@NIC

Jit Raj, Jammu and Kashmir jit[dot]raj[at]nic[dot]in
  |   May 22, 2018
Hon'ble Minister reviewing e-Hospital also present NIC TEAM
Hon'ble Minister reviewing e-Hospital also present NIC TEAM

Hon'ble Minister in the reviewing meeting
Hon'ble Minister in the reviewing meeting

Hon’ble Minister for Health and Medical Education, J&K Government, Dr. Devinder Kumar Manyal chaired maiden meeting of Health Department and also reviewed the functioning of e-Hospital@NIC project running at Govt Hospital Gandhi Nagar Jammu as well as at 02 District Hospitals, 04 sub-district Hospitals and 10 Primary Health Centres in J&K.

Hon’ble Minister evinced keen interest during the demonstration on various e-Hospitals modules such as New Patient Registration, Follow-up, Revisit, Admission, Discharge, Scheduling, Laboratory, Blood Bank, Pharmaceutical/ General Stores, New Born Baby and recently developed and implemented Partograph module. The workflow of Partograph module in e-Hospital matches with the procedural steps being followed in case of a pregnant woman well from her LMP stage to the delivery.

Hon’ble Minister appreciated excellent team work responsible for successful implementation of e-Hospital project in J&K and issued necessary instructions to work out possibilities for the replication of the solution in Govt Medical College Jammu/ Kashmir, along with other Health Institutes in J&K.

 The Hon’ble Minister was accompanied by the Finance Secretary, Director Health Services Jammu, along with senior officers of e-Hospital team from NIC in J&K.

 

eHospital Team

NIC J&K

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...