Search

Advanced Search

Launch of Online Grievances Monitoring System in Chandigarh UT

Vivek Verma, Chandigarh vivek[dot]verma[at]nic[dot]in
  |   Jun 4, 2012
Mr K K Sharma, IAS Adviser to the Administrator launching the application
Mr K K Sharma, IAS Adviser to the Administrator launching the application

The Online Grievance Monitoring System was formally launched by Shri. K.K. Sharma, IAS, Adviser to the Administrator, UT Chandigarh on 1st June 2012 at UT Secretariat.  The Online Grievance Monitoring System would enable the citizens of Chandigarh to submit their grievances online through the website  chandigarh.gov.in ,  as well as through the Sampark Centres. The unique feature of this model is its integration with the SMS gateway.  A registration number of the grievance submitted by the citizen would be generated and communicated to the complainant by way of an SMS on his mobile.   The same registration number can be used by the citizen to check the status of  grievance online.
CPIOs of various departments of the Chandigarh Administration have been designated as the Grievance Officers and have been imparted with requisite training for handling the Online Grievance Monitoring System.  The CPIO would also get an SMS alert on his mobile number regarding the receipt of the grievance. The grievances would have to be disposed off within 15 days from the day of receipt. The Heads of the respective Departments would also be able to monitor the status of the complaints pertaining to their departments through the same software. 
Shri. Anil Kumar, IAS, Home Secretary, Shri. V K Singh, IAS, Finance Secretary, Ms Prerna Puri, IAS, Secretary IT, Ms Tanvi Garg, IAS, Director IT and Shri Ajay Rampal, SIO, NIC were also present during the launch.
 

 

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...