Search

Advanced Search

Launching of Meghalaya Public Grievance Redressal System

Sabyasachi Choudhury, West Bengal sabyasachi[dot]choudhury[at]nic[dot]in
  |   Mar 16, 2012
Chief Minister Launching the System
Chief Minister Launching the System

View of the Gathering at the Inaugural Function
View of the Gathering at the Inaugural Function

The Chief Minister of Meghalaya, Dr Mukul Sangma launched the online Meghalaya Public Grievance Redressal and Monitoring System on 1 March, 2012 in Shillong. The system - designed and developed by National Informatics Centre (NIC) -  enables citizens of the state to register their grievances against various government departments online and to keep track of the status of their complaints.

Speaking on the occasion, Dr Sangma said that the implementation of this system would help the Government to identify the lacunae in the functioning of government departments and to take  remedial measures. “We have a major challenge at hand as now the people would expect the Government to respond to their grievances,” the Chief Minister said.

Each department has notified nodal officers who would respond to the complaints of the public. Shri W M S Pariat, Chief Secretary to the Government of Meghalaya said that the success of the system would hinge on how the nodal officers respond to the grievances.  Shri P K Jha, Joint Secretary to the Government of India, Department of Personnel and Training, said the system would enable the government to dispose of public grievances speedily.

An in-depth presentation on the system was made by Shri Alfred Kirubakaran, Technical Director, National Informatics Centre, New Delhi and the vote of thanks was given by Shri Timothy Dkhar, State Informatics Officer, National Informatics Centre, Meghalaya.
 

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...