Search

Advanced Search

Jharkhand State Legal Services Authority Website & VC System inaugurated by Hon’ble Mr. Justice Altamas Kabir, Supreme Court of India.

informatics, NIC-HQ editor[dot]info[at]nic[dot]in
  |   Nov 4, 2009
(Hon’ble Justice Altamas Kabir inaugurating the JHALSA Website)
(Hon’ble Justice Altamas Kabir inaugurating the JHALSA Website)

Jharkhand State Legal Services Authority launched its website (http://jhalsa.nic.in ) and Video Conferencing System on 10th October’2009 at “Nyaya Sadan”, Ranchi - the headquarters of the JHALSA. The VC system of the state legal services authority is the first launch of its kind any where in the country. In the vibrant atmosphere, the Nyaya Sadan conference room was graced by the presence of the Chief guest, Hon’ble Mr. Justice Altamas Kabir, Supreme Court of India, Chairman of the Legal Services Committee, Hon’ble Mrs. Justice Gyan Sudha Misra, Chief Justice, Jharkhand High Court cum Patron in Chief, JHALSA, Hon’ble Mr. Justice M Y Eqbal, Executice Chairman, JHALSA, other esteemed judges of the High Court and members of the legal fraternity and the media.

Hon’ble Mr. Justice M Y Eqbal, viewed that the VC system and the website will monitor the functioning the Lok Adalats organized by the District Legal Services Authorities and expressed that more and more people of the state will start utilizing the facility. The program was initiated by a welcome address by Hon’ble Justice Eqbal, following which Hon’ble Justice Altamas Kabir and Hon’ble Justice Gyan Sudha Misra jointly activated the video conferencing system. Hon’ble Justice Kabir pointed out that the website is like an encyclopedia with all related information about JHALSA is readily available while Hon’ble Justice Gyan Sudha Misra quipped that the program was a phenomenal success.

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...