Search

Advanced Search

Chief Minister, Jammu and Kashmir inaugurates CM Grievances Cell

Jit Raj, Jammu and Kashmir jit[dot]raj[at]nic[dot]in
  |   Aug 8, 2009
Chief Minister, Jenab Omar Abdullah formally inaugurating CM Grievances Cell
Chief Minister, Jenab Omar Abdullah formally inaugurating CM Grievances Cell

Chief Minister, J&K Mr. Omar Abdullah formally inaugurated the Chief Minister’s Grievance Cell at Civil Secretariat Srinagar on 4th September 2009 there by creating an opportunity for the people of Jammu and Kashmir to register their complaints through web based application and get details about the status and nature of disposals. Describing the cell an effective mechanism to entertain the complaints of general public, Chief Minister said that people should receive the prompt, to the point and appropriate response from the cell. “The complainant should get all information about the status of their complaints, progress and the action taken”, he said adding that he would personally monitored the working of the cell regularly. Chief Minister also appreciated the efforts of NIC J&K for developing & hosting of web based application for Online Registration and Monitoring of complaints on NICNET. The people can personally register their complaints through the Community Information Centres(CIC) available at each block and get feedbacks about the same from these Centres. The complaints received in the Grievance Cell shall be segregated, analyzed and transferred to the concerned departments for reply/action taken within five days. The reminder for the pending complaints shall go to the concerned on every Monday. The information about the status, progress and action taken shall be available on the website or can be got from CICs or directly from the Grievance Cell.

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...