Search

Advanced Search

First Time experimented in the Elections Process - Successful Live Web Casting of Polling from 04 booths during Assembly bye-elections of Ratia & Adampur

Poonam Gupta, Haryana poonam[dot]g[at]nic[dot]in
  |   Dec 9, 2011

On the directions of Election Commission of India /  CEO Haryana, the  district Administration of Hisar and Fatehabad were asked to make arrangements for live Web casting from 02 polling booths each from 47-Adampur (District Hisar ) & 41-Ratia (District Fatehabad) Assembly Constituencies of Haryana where Bye-elections were conducted on 30th November, 2011. 

The technological responsibility was assigned to NIC Haryana. By extending the NIC-IP, Leased Lines from BSNL and with the help of Web cast division of NIC, the web casting from polling booth no.  47 & 48 of 47-Adampur Assembly Constituency and booth no. 70 & 75 of 41-Ratia Assembly Constituency was done successfully on 30th November, 2011 (i.e. poll day of Bye-Election) from 8.00 AM to 6.00 PM. The web casting was done with exceptionally professionalism way and every member involved in the process put his ultimate efforts.

The first experiment of live web casting of polling at Booths in Election process has been conducted from Haryana. The NIC-Haryana with joint efforts from NIC-HQ, BSNL, CEO Haryana & District Administration & DIOs of Hisar and Fatehabad successfully completed the activity.  ECI Delhi, CEO Haryana and Officers of District Administration took deep interest and appreciated the efforts.

In addition, the following ICT services were provided effectively for successful conductance of the bye-elections:
(a)    Four kinds of Voters Help Lines - Touch Screen Kiosk, SMS based, Web based, Telephone based call center.
(b)   Establishing the ICT enabled office for election observers as well in the room of observers.
(c)    Collecting the data of Control Unit (CU) and Ballot Unit (BU) for randomization purposes & First and second levels of randomization before the RO and observers.
(d)   Randomization of polling personnel (PO/APO).
(e)    Digitization of exhaustive data of BLO/PO/Micro Observer/Police personal/ Neutral person/duty magistrate/ supervisor/ CRPF personal and detailing of booths about sensitive/hyper sensitive/Critical,
(f)     Deployment of Micro Observers,
(g)    EVM-Tracking MIS etc.
(h)    On-line  declaration of counting information during the process. The result was uploaded  on http://e-hisar.in  from the counting center dynamically & instantly and were further  disseminated  on four websites simultaneously.

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...