Search

Advanced Search

Haryana: Annual Budget of Haryana state for the year 2012-13

Poonam Gupta, Haryana poonam[dot]g[at]nic[dot]in
  |   Mar 16, 2012
Cover Page
Cover Page

The Annual Budget of Haryana state for the year 2012-13 was presented by the Hon’ble Finance Minister Sh. Harmohinder Singh Chattha on 5th March, 2012 in Haryana Vidhan Sabha.

NIC, Finance Department Unit provided complete IT support for successful preparation as well as its timely presentation in the Vidhan Sabha by putting all efforts.  In all, 12 documents were effectively prepared and presented. Documents covered FM Speech (English and Hindi) , Budget at a Glance, Non plan Budget, Plan Budget, Receipt Budget, Supplementary Estimates 2011-12 Second Installment (English and Hindi), Annual Financial Statement and Explanatory Memorandum, Plan Schemes Memorandum, Document of Budgetary Transfers to Local Bodies and PRIs, Document on FRBM Act.

The efforts put in by NIC officers were appreciated by the Finance Minister in his budget speech.

NIC had prepared 70 CDs containing FM Speech both English and Hindi, Budget at a Glance, Annual Financial Statement of Disbursement and Receipt, Complete Non plan, Plan and Receipt Budget, Economic Survey 2011-12 and Archives since 2004-05. The CDs were distributed to Media in a press conference held after presentation of Budget on 5th March, 2012.

After the presentation of Budget in Vidhan Sabha on 5th March, 2012, it was updated on official website of Haryana Finance Department.

Features of Budget 2012-13 are as follows:
1. This time, English version of Supplementary Estimates of 2011-12 Second Installment has been completely automated. This has been developed by NIC which is an extension to the existing OBAMA (On-line Budget Allocation, Monitoring and Analysis) System already developed by NIC.

2. Every branch of Finance Department has been assigned User Id and Password to access this system. The users enter the details of additional information required under different objects in a scheme along with remarks. With this, all reports are generated and used by department.

3. Reports include the complete supplementary book, associated statements like Demand wise additionality (English & Hindi both), Schedule (English and Hindi), Revenue/Capital wise additionality, Nonplan/Plan Wise additionality, Voted/Charged wise additionality and Object wise additionality. These reports had brought accuracy and uniformity in the working of department.

4. This time, schemewise/objectwise expenditure report generated for Finance Department in OBAMA System act as the base of budget forecast for 2012-13.

Success of OBAMA System encouraged the state government to take a further step regarding delegation of powers for disbursal of loans. Since 1st April 2011, the Marriage and Computer loan disbursement process is on-line. Now, the Finance Minister in his budget speech has extended this facility of delegation of powers for House Building and Vehicle Advance through OBAMA System. This would increase the strength of this System in Haryana State.

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...