Search

Advanced Search

Jan Suvidha Kendra - A new hope for Pilibhit, Uttar Pradesh.

Anshu Rohatgi, Uttar Pradesh anshu[dot]rohatgi[at]nic[dot]in
  |   Jul 9, 2012
Jan Suvidha Kendra Website
Jan Suvidha Kendra Website

Grievance Redressal since Launch
Grievance Redressal since Launch

The most awaited Jan Suvidha Kendra of Pilibhit has now marked its existence in the web world with URL address www.jskpilibhit.com. It was inaugurated by commissioner of Bareilly Sri K. Ram Mohan Rao as on 22nd May 2012. JSK offers a unique way to address public grievances. It records the public grievances and passes it to the concerned government department for immediate action.  A complainant just needs to have an access to telephone for getting the grievance recorded. For registering grievances, specific phone numbers are publicized through mass media. The phone calls are attended and complaints are recorded by the operators on the software and an automatic grievance number is generated which can be used for tracking of the complaint on the website. Jan Suvidha Kendra is active 24x7, earlier the timings for registering complaints was limited to the office timings, but now they are just a phone call away to register their complaint at any time of the day. Moreover, people are not required to visit government offices again and again for filing of grievances.   Just after registering of grievance two SMS are sent. The first SMS is sent to the complainant, informing the name and department of the official who will examine the complaint. The second SMS is sent to the officer informing the name of complainant as well as the details of the complaint. Depending upon the criticality and nature of the complaint they are classified into 5 categories.  The A category or urgent complaints are to be resolved within 24 hours of filing. The B category complaints are to be resolved within 72 hours of the filing while the C category complaints need to be addressed within 7 days of filing. A fourth category of complaint logs in the allegations against any government official and the fifth category records complaints against public representatives. The fourth and fifth categories of complaints are required to be registered with an affidavit and have to undergo specific legal procedures.   Since its launch in May 2012, about 1885 complaints have been recorded; the redressal rate is about 74.16 percent, while 7 percent complaints are pending. Currently 18.83 percent complaints are defaults. However, the administration if working hrd to reduce both the pendency and defaults.

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...