Search

Advanced Search

VC Facility Inaugurated by the Hon’ble Chief Justice, between Civil Court and District Jail at Jamtara, Jharkhand.

informatics, NIC-HQ editor[dot]info[at]nic[dot]in
  |   Aug 8, 2009
Hon’ble Chief Justice, Smt. Mishra (L),after inaugurating the VC facility
Hon’ble Chief Justice, Smt. Mishra (L),after inaugurating the VC facility

The Hon’ble Chief Justice Smt. Gyan Sudha Mishra, Jharkhand High Court inaugurated the videoconferencing facility between Jamtara District Civil Court and Jail, on 2nd August ’09 in the presence of Hon’ble Justice Amrashwar Sahay, Justice N.N. Tiwari, District & Sessions Judge Shri C.P.Asthana, Shri Kripa Nand Jha, Deputy Commissioner and other senior officials. At the other end Shri M. Hussian A.I.G. Prisons, Government of Jharkhand was present on the occasion. He explained to the Chief Justice about the e -governance project under implementation with the support of NIC and gave other details about the District Jail, Jamtara.

The VC inauguration facility was preceded by the inauguration of the new Civil Court and Bar Association Building by the Chief Justice. Speaking on the historic occasion the Chief Justice emphasized that only ‘Truth Should Prevail’ and called upon the Bar to help in the delivery of quick and timely justice. She also exhorted the advocates to remain updated in their profession.

The VC facility between the Civil court and District Jail was implemented by NIC Jharkhand under the e-governance project for the Department of Home (Jail), Govt of Jharkhand.

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...