Search

Advanced Search

Hon'ble Chief Minister, Himachal Pradesh Interacts with Cabinet Ministers and Public during JanManch using NIC VC

Ajay Singh Chahal, Himachal Pradesh ajay[dot]chahal[at]nic[dot]in
  |   Jan 21, 2019
Hon'ble Chief Minsiter interacting with Ministers and Public through VC
Hon'ble Chief Minsiter interacting with Ministers and Public through VC

Hon'ble Ministers and Public Interacting from Panchayats
Hon'ble Ministers and Public Interacting from Panchayats

Sh. Jai Ram Thakur, Hon’ble Chief Minister, Himachal Pradesh interacted with 10 Cabinet Ministers of Himachal Pradesh on 6th January 2019 from Shimla, using NIC VC facility, during the Jan Manch program, which is held at Panchayat level, every first Sunday of the month, and is presided over by a Cabinet Minister. Public in large numbers come to these Jan Manch programs to have their grievances redressed on the spot.

Hon’ble Chief Minister interacted with the Cabinet Ministers and also listened to the grievances and demands of general public who were present in these 10 locations. He informed that the Hon’ble Prime Minister has appreciated the Jan Manch program during his visit to the State on 22nd December 2018 and the program’s real objective is to provide Government services at the doorsteps of citizens and redress their long pending grievances in an effective manner.

Other activities during the Jan Manch include, demands of public, cleanliness drives, inspection of public works, health camps, interaction with district level officers, issuance of various certificates, assistance in filling up of application forms of welfare schemes, distribution of gas connections etc. 

The NIC VC was conducted from the residence of the Hon’ble Chief Minister and DIOs/ADIOs of NIC provided the assistance at field level in various Panchayats. The reporting of Jan Manch is done through a software developed by NIC for this purpose.

Recent Issues

Highlights

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...