Search

Advanced Search

Launch of eProsecution in Uttarakhand State - A pillar under ICJS Portal

Arvind Dadhichi, Uttaranchal ak[dot]dadhichi[at]nic[dot]in
  |   Feb 25, 2020
During the occassion DG Police, Uttarakhand, District Judge Dehradun,Sri S K Sharma, Sr TD, Sri Rakesh Sharma, PSA NIC and other senior officers
During the occassion DG Police, Uttarakhand, District Judge Dehradun,Sri S K Sharma, Sr TD, Sri Rakesh Sharma, PSA NIC and other senior officers

Joint launch by DG police Uttarakhand, District Judge Dehradun and Sri S K Sharma, Sr TD NIC. Standing Sri Rakesh Sharma, NIC  explaining portal
Joint launch by DG police Uttarakhand, District Judge Dehradun and Sri S K Sharma, Sr TD NIC. Standing Sri Rakesh Sharma, NIC explaining portal

eProsecution, a pillar of ICJS Portal for Uttarakhand State was launched for Pilot District of Dehradun by Shri Ashok Kumar, D.G. Police (Law and Order), GoUK, Shri Prashant Joshi, District Judge Dehradun and Shri S.K. Sharma, Sr. Technical Director at Prosecution Office, Dehradun.

During the occasion, a presentation on eProsecution was given by NIC ICJS Project coordinator Shri Rakesh Kumar Sharma, Principal System Analyst. A few records of criminals on the portal were checked randomly by D.G. Police (Law & Order) and the instant results displayed were found satisfactory.  Further the District Judge, Dehradun enquired about witnesses examination feature of eProsecution Portal, and the NIC team present there explained things thoroughly.

After inauguration during a press briefing various queries were raised by media persons, which one by one were replied to by NIC & the Dignitaries. The D.G and District Judge highly appreciated the efforts of NIC for ICJS and eProsecution portal and informed that this will be rolled out throughout Uttarakhand shortly.

The Session was concluded with vote of thanks from Shri Hari Vinod Joshi, Additional Director Prosecution.

 

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...