Search

Advanced Search

Launch of eDistrict Services for Social Welfare Department, Government of Tamil Nadu

R.Gayatri, Tamil Nadu r[dot]gayatri[at]nic[dot]in
  |   May 4, 2010

The eDistrict application for Social  Welfare Department was launched by the Hon’ble Social Welfare Minister and Hon’ble Minister for Information Technology, Government of Tamil Nadu  in Chennai on 27th April 2010.  Social Welfare Secretary, IT Secretary, Commissioner of Social Welfare and CEO of TNeGA, Government of Tamil Nadu were present during the launch.

A computerized workflow system has been designed and developed by NIC, Tamil Nadu State Centre as part of the eDistrict portal for the end-to-end processing of applications for Marriage Assistance Scheme.  The applications are submitted through Common Service Centres by citizens  for availing services of the Social Welfare Department.  The processing of the application form involves the following stages:

1.   Movement of application from CSC to Block Office
2.   Recording of field verification details at Block Development Office (BDO)
3.   Forwarding to District Social Welfare officer(DSWO) by BDO after scrutiny of application and verification details
4.  Approval by DSWO
5.  Generation of Sanction Proceedings
6.  Disbursement of the Cheque to the Beneficiary

The Services that have been launched initially are:

i) Moovalur Ramamirtham Ammaiyar Ninaivu Marriage Assistance Scheme
ii) EVR Maniammaiyar Ninaivu Widow Daughter Marriage Assistance Scheme
iii) Annai Theresa Ammaiyar Ninaivu Orphan Girls Marriage Assistance Scheme

Features of the System

-       Application through CSC
-       Workflow based
-       Application generated along with Acknowledgement
-       Citizen can track status of the application
-       Generation of Sanction Proceedings
-       Monitoring Reports for Commissioners and District Level Officers

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...