Search

Advanced Search

Haryana:- Direct Benefit Transfer Regional Level Workshop at Chandigarh on September 11, 2018

Deepak Sawant, Haryana sawant[dot]deepak[at]nic[dot]in
  |   Sep 24, 2018
Dr. Susheel Kumar, Senior Technical Director, NIC Haryana Presenting DBT status in Haryana
Dr. Susheel Kumar, Senior Technical Director, NIC Haryana Presenting DBT status in Haryana

Ms Indira Murthy, Joint Secretary, DBT Mission, Cabinet Secretariat, Government of India with prominent participants
Ms Indira Murthy, Joint Secretary, DBT Mission, Cabinet Secretariat, Government of India with prominent participants

One day regional workshop on DBT was organised by DBT Mission, Cabinet Secretariat,  Delhi and NCAER (National Council of Applied Economics Research) on 11th September 2018 at Chandigarh. Representative of all northern states Jammu & Kashmir, Himachal Pradesh, Haryana, Punjab, Uttarakhand, Delhi, Rajasthan and UT Chandigarh participated and presented status of DBT implementation in their states in line with State DBT portal and Bharat DBT portal.  The foremost objective of the workshop was to review the DBT implementation in the states and knowledge sharing of effective usage of Aadhaar.

The inaugural session was addressed by Ms  Indira Murthy, IAS, Joint Secretary, DBT Mission, Cabinet Secretariat, Government of India followed by Sh. Sunil Sharan, Secretary-cum-Advisor, Finance, Haryana and Dr. Rajesh Chadha, Senior Research Counsellor, NCAER. During this session, Mr. Soumitra Mandal, Director, DBT Mission, Cabinet Secretariat, Government of India, introduced the key enablers of DBT within the present framework of DBT. He also shared about  recent developments and progress/ performance of participating states.

The Post Lunch session was dedicated to States where participating states presented their DBT implementation status, progress and prospects. Haryana was the first participating state and  Dr. Susheel Kumar, Senior Technical Director, NIC Haryana presented the Haryana DBT status and also shared the best practices and challenges being faced in maintaining and updation of beneficiaries data and response files received from banking agencies.

During presentation, he talked about data cleaning and de-duplication status, live status of Haryana DBT portal, methodology used during the process, capacity building and progress review, change management requirement, benefits, challenges and roadmap. He also explained how the RGI death data has been integrated with social sector pension schemes and flagged the death as it was not reported by banks or field officers.

The DBT Mission Delhi team appreciated the efforts made by NIC Haryana.

Recent Issues

Highlights

Apr. ‘ 25 Issue


Decoding Data Governance & Strategy: Strategies for Data Protection, Compliance, and Optimization

In today digital era, data is the cornerstone of innovation, business growth, and governance. As India witnesses an ...


AI-Based Face Search: Transforming Archives with Facial Search Intelligence

Face search technology uses AI to identify and match faces across large photo collections. It extracts unique facial ...


Puduvai Kalal: Strengthening Governance Through Digital Transformation

The State Excise Department of Puducherry is a key government agency responsible for regulating excise activities within ...

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks: A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...