Search

Advanced Search

SARAL Haryana Project received CSI-Nihilent eGovernance Award - The Award of Excellence

Deepak Sawant, Haryana sawant[dot]deepak[at]nic[dot]in
  |   May 3, 2019
Award Photo
Award Photo

Award Certificate Photo
Award Certificate Photo

SARAL – The flagship programme of Government of Haryana and executed by NIC Haryana, today received the CSI-Nihilent eGovernance Award 2017-18 (The Award of Excellence) under the “Projects Category”. Riding on ServicePlus framework this programme transformed  the Service Delivery Mechanism in the State by bringing all G2C services/schemes on an integrated online platform, Revamp of all citizen touch points across the state, All G2C services/schemes available on all touch points, Service delivery within RTS timelines, Active communication b/w citizens & government AND Better visibility to both citizens & officials. A total of 490 Schemes and Services (225 Services and 265 Schemes), across 37 departments are available on this single online platform with provision for Online Applications and status tracking, proactive Status through SMS, Review Dashboards and Department Notifications. The Review dashboards help in identifying thrust areas for enhancing the effectiveness of Service Delivery by identifying lagging departments, lagging services or specific workflow stages causing bottleneck in service delivery causing delay in service delivery. All these schemes and services are available at 115 centres viz Antyodaya Kendras and SARAL Kendras at the District headquarters and Antyodaya-SARAL Kendras at the Sub Division and Tehsil Levels and 4000+ Atal Sewa Kendras (CSCs) at Village Level.

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...