Search

Advanced Search

Launch of Recruitment Rules and Vacancy Management System

Vivek Verma, Chandigarh vivek[dot]verma[at]nic[dot]in
  |   Jul 24, 2020
H.E. Sh. V.P. Singh Badnore, Governor of Punjab and Administrator UT Chandigarh launching Recruitment Rules & Vacancy Management System
H.E. Sh. V.P. Singh Badnore, Governor of Punjab and Administrator UT Chandigarh launching Recruitment Rules & Vacancy Management System

Mr Sanjay Kumar Jha, IAS Secretary Personnel explaining  Recruitment Rules & Vacancy Management System
Mr Sanjay Kumar Jha, IAS Secretary Personnel explaining Recruitment Rules & Vacancy Management System

Hon’ble Punjab Governor and UT Administrator Sh. V.P. Singh Badnore on 6th July 2020 launched “Recruitment Rules and Vacancy Management System” developed by NIC for Personnel Department of Administration, at Raj Bhawan, in the presence of senior U.T. officers.  

Secretary Personnel, Sh. S.K. Jha briefed about the features of the system which include allowing the HODs to monitor on their dashboards the information gap related to updation of Recruitment Rules and vacancies, sending automated quarterly alerts to the Branch In-charges to provide the information, online to-and-fro information sharing with Recruitment Agencies and tracking of the joining of officers and officials.  

This will help the departments to fill up the vacancies expeditiously and, in turn, provide an opportunity of regular appointments to the youths.  Filling up the vacancies will also improve the quality of delivery of administration. It is important to note that because of the decision regarding retirement, larger number of people have retired from the administration.  The system will also capture a life cycle of the recruitment process.  The system will provide timely reminders to the HODs to take action so that the posts do not lapse after two years of remaining vacant. This will also help the cadre management in various cadres.  

Hon’ble Administrator appreciated the efforts of the Personnel Department and NIC to devise a system which will address the key challenges in the current system while providing opportunity of regular appointment to the youths.  He wanted the features of the software to be utilised by the HODs by taking a holistic view to streamline the administrative machinery.

 

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...