Search

Advanced Search

DG, NIC reviewed pan-India NIC activities during COVID-19 Lockdown in India

Informatics News Desk, NIC-HQ newsdesk[dot]info[at]nic[dot]in
  |   May 2, 2020
Director General, NIC interacted with Heads of Groups at National Informatics Centre across the country
Director General, NIC interacted with Heads of Groups at National Informatics Centre across the country

A video conference meeting of Group Heads of National Informatics Centre (NIC) was held on 1st May 2020 under the chairmanship of Dr. Neeta Verma, Director General,  NIC. The VC meeting  centred at its head quarters in New Delhi was facilitated using the ‘Vidyo VC’, the video conferencing services of NIC keeping the norms of social distancing and government guidelines.

With the objective of reviewing the important activities of NIC during the COVID-19 Lockdown situation, the meeting started with appreciation to all NIC officers and NIC outsourced support staff who are contributing beyond their routine work and rendering ICT services. These officers and support staff of the Centre, States and Districts have been relentlessly working despite challenges due to the on-going Lock-down across the country. NIC’s various  administrative,  financial  and service support sections who worked tirelessly  for the activities of financial year closing were specially praised during the occasion.

During the meeting, all the head of groups made their brief presentations on the activities respective to their work domain. NIC has been on the limelight due to the hard work and tireless efforts put in for Aarogya Setu, the COVID-19 App built for mapping the contacts of users by analysing GPS data, so  that contact tracing becomes easy if a user gets infected.  The NIC team worked on the App development was applauded for their efforts for making it a big success. Shri Prashant Mittal, Managing Dirctor, NICSI  appraised about the Prayas initiatives during the Lockdown period.

One of the key action points emerged during the meeting was on using Lockdown situation as an opportunity for involving in useful activities such as enhancing products through rewriting modules, documentation of products and services, capacity building, preparation of manuals, creating presentations and various collaborative initiatives.

Necessary priority action for clearing pending bills and pending payments of manpower deployed for various projects and services was another point of action. Another point was ensuring continuous following up and participating in social media platforms regarding NIC’s activities in general and specially the efforts for controlling the pandemic.

The meeting ended with the DG thanking all the participant officers and cheered them to continue their unstinted efforts and endurance.

 

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...