Search

Advanced Search

COVID19 ePass System and Surveillance of Citizens in District Kangra

Ajay Singh Chahal, Himachal Pradesh ajay[dot]chahal[at]nic[dot]in
  |   May 16, 2020
Sh. Rakesh Prajapati, DC Kangra launching the ePass and Surveillance System
Sh. Rakesh Prajapati, DC Kangra launching the ePass and Surveillance System

District Kangra Website at https://hpkangra.nic.in
District Kangra Website at https://hpkangra.nic.in

Sh. Rakesh Prajapati, IAS Deputy Commissioner, Kangra took the initiative to utilize Service Plus framework for configuring the Covid-19 ePass Surveillance System for citizens of Kangra District. The Service Plus Team at New Delhi, in coordination with Sh. Bhupinder Pathak, Scientist-F/DIO Kangra completed the task in a very short time and implemented the system having various features. The system has been appreciated in many national magazines and newspapers. The Administration is able to monitor the Covid19 suspects, users of ePass, their surveillance in the District. 

Two services have been made in District Kangra for issuance of ePass for those who have to move out from District and 2nd service was added later for those who have to Enter from Outside the State. This 2nd service is further extended for Surveillance of those who have come from other States.

The best use of this application is not only for issuance of ePass but availability of crucial data being captured for   further using it in Primary and Secondary contact tracing, surveillance  etc.

As and when someone is detected positive and having travel history, the Administration looks for the travel details, vehicle number in which travelled and the co-passengers. The Driver details, owner information, who else have travelled in that particular vehicle on other dates, resident of which Block, Panchayat etc. are also available. 

All these persons are then contacted by Administration and are then being tested for Covid-19 test. Hence, the collected data is immensely helping the District Administration.

The reason of Travel is also being captured along with Job Loss reason is being captured to work out how many people are coming back after job loss from big cities. This data will help Administration in making the rehabilitation policy for the workers or residents who have come back and can be helpful in State level economic activities.

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...