Search

Advanced Search

DG NIC highlighted the features of Aarogya Setu Mobile App during a press conference for COVID-19

Shashi Kant Pandey, Delhi sk[dot]pandey[at]nic[dot]in
  |   Apr 2, 2020
DG, NIC speaking at a press conference for COVID-19
DG, NIC speaking at a press conference for COVID-19

DG, NIC briefing DDNews on Aarogya Setu App
DG, NIC briefing DDNews on Aarogya Setu App

The Government of India launched a mobile app called AarogyaSetu developed in public-private partnership to bring the people of India together in a resolute fight against COVID-19.

Dr. Neeta Verma, Director General, NIC highlighted the features of Aarogya Setu Mobile App, during a press conference for COVID-19.  Available in 11 languages, the app is ready for pan-India use from day 1 and has highly scalable architecture. It will enable people to assess themselves the risk of catching the Corona Virus infection. It will calculate this based on their interaction with others, using cutting edge Bluetooth technology, algorithms and artificial intelligence. Aarogya Setu App empowers the users by informing about potential risk of infection through Bluetooth contact tracing; and equips people with self-assessment tools and contextual advice.

Once installed in a smart phone through an easy and user-friendly process, the app detects other devices with AarogyaSetu installed that come in the proximity of that phone. The app can then calculate the risk of infection based on sophisticated parameters if any of these contacts is tested positive.

The App will help the Government take necessary timely steps for assessing risk of spread of COVID-19 infection, and ensuring isolation where required.

The Apps design ensures privacy-first. The personal data collected by the App is encrypted using state-of-the-art technology and stays secure on the phone till it is needed for facilitating medical intervention. Later, DG, NIC also briefed DDNews about the features of Aarogya Setu mobile app.

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...