Search

Advanced Search

Sensitization cum Gap Analysis Session on Electronic Service Delivery of Chief Minister’s Relief Fund (e-CMRF), Orissa

A. K. Hota, Odisha ak[dot]hota[at]nic[dot]in
  |   Jul 11, 2011
Initiation of the Session
Initiation of the Session

Initiation of the Session
Initiation of the Session

Chief Minister’s Relief Fund (CMRF) is meant to distribute relief measures to the distressed. In Orissa, it was created in the year 1954 to provide immediate relief to the people of the state affected by the major natural calamities like flood, drought, fire accident etc, and it also provides the financial assistance to the needy individuals for their treatment of major diseases. This fund depends upon budgetary allocation provided by the Government of Orissa and Voluntary donations received from the general people and several organizations related to social responsibility.
 

For the effective monitoring and management of the Fund, NIC Orissa state unit was requested by the CM’s Office, Govt. of Orissa to bring the whole activities to e-Mode so that the service to the citizen can be delivered electronically.  A team headed by Shri A. K. Hota, TD under the guidance of Shri S.K. Panda, Sr. Tech. Director & SIO, NIC, Orissa, was assigned with the responsibility for developing an e-Governance oriented Web Portal catering to both G2C and G2G domains with an intention to bring transparency & accountability at every level and promote timely assistance from CMRF to the needy citizen.

 

The team had the system study at Khordha and Puri Districts as well as at CMRF Cell in General Administration Department, Govt. of Orissa and accordingly the application is being developed.
Recently, a Sensitization cum Gap Analysis Session was organized at NIC Orissa State Centre to sensitize the users & authorities of General Administration Department & obtain their feedback on gaps & further improvement, if any.
Shri A. K. Hota, TD and Shri Mrutyunjaya Kanhar, Under Secretary, GA Dept. initiated the session. Detailed process flow was presented by Shri Siba Prasad Dash, Scientist-C. The participants were provided with their credentials to handle the application & go through the entire process.
Participating in the session Smt. Shalini Pandit, I.A.S, Additional Secretary to Govt., GA Dept., shared her expectations. Shri D.K. Mandhata, Scientist-D noted the Gaps observed & suggestions received for the betterment of the application.


After integration of the suggestions received, the presentation would be organized at Honorable C.M’s Office for necessary acceptance & launching.
- e-CMRF team, NIC, Orissa

 
 

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...