Search

Advanced Search

Honorable Chief Minister Jammu & Kashmir Launches J&K RTI Online Portal to Enhance Transparency

Anil Kumar Sharma, Jammu and Kashmir anil[dot]ksharma[at]nic[dot]in
  |   Jan 10, 2025
Honoble Chief Minister Omar Abdullah, accompanied by Honorable Deputy Chief Minister Surinder Kumar Choudhary and senior officials, presides over the
Honoble Chief Minister Omar Abdullah, accompanied by Honorable Deputy Chief Minister Surinder Kumar Choudhary and senior officials, presides over the

The Honorable Chief Minister Omar Abdullah inaugurated the Jammu & Kashmir Right to Information (RTI) Online Portal at the Civil Secretariat on January 10, 2025 at Jammu, marking a significant advancement in promoting transparency and accountability within the regions governance.

The launch event was attended by Honorable Deputy Chief Minister Surinder Kumar Choudhary, Cabinet Ministers Sakeena Itoo, Javed Ahmad Rana, and Javed Ahmad Dar, along with Chief Secretary Atal Dulloo, Additional Chief Secretary to the Chief Minister Dheeraj Gupta, administrative secretaries, and senior officials.

In his address, Honorable Chief Minister lauded the efforts of the NIC Jammu and Kashmir in developing the portal, emphasizing its potential to streamline the RTI application process for citizens. He stated, "This initiative will provide easy access to government information under the RTI Act, empowering citizens with a faster, more transparent, and cost-efficient mechanism."

The Chief Minister also called for widespread publicity of the portal to ensure that citizens across Jammu & Kashmir are aware of its benefits.

Developed by NIC Jammu and Kashmir, the portal transitions the RTI application process from manual to online, enabling citizens to submit requests, track their status, and receive responses electronically, thereby eliminating the need for physical visits to government offices.

A notable feature of the portal is the issuance of a registration number to applicants via SMS and email for future reference, facilitating easy tracking of RTI applications.

The portal integrates 61 government departments, 272 nodal officers/public authorities, 720 First Appellate Authorities (FAAs), and 3,419 Central Public Information Officers (CPIOs) and Public Information Officers (PIOs), ensuring comprehensive coverage and keeping citizens informed about government activities.

This initiative represents a significant step towards enhancing transparency and accountability in governance, aligning with the administration's commitment to empowering citizens through accessible information.

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...