Search

Advanced Search

Eastern Coalfields Limited (ECL), the oldest subsidiary of Coal India Limited (CIL) joined in GePNIC movement

A. K. Hota, Odisha ak[dot]hota[at]nic[dot]in
  |   Aug 2, 2012
Demonstration of GePNIC
Demonstration of GePNIC

Hands on Session in progress
Hands on Session in progress

Eastern Coalfields Limited, which boasts of the deepest underground coal mine in Asia is the oldest subsidiary of Coal India Limited situated in West Bengal and parts of Jharkhand. It is known for its superior grade of coal with high heat content suitable for steel making.

 

ECL, inspired by successful implementation of e-Procurement at MCL expressed their interest to adopt GePNIC to bring transparency in the tendering process in early 2011. NIC Odisha teams headed by Shri A. K. Hota, Technical Director visited ECL in May and July 2011 to present the software to the board of Directors of the company. The project was duly approved by ECL board in the month of June 2012.

 

The first sensitization workshop was conducted at ECL headquarters, Sanctoria, Asansol, West Bengal from 18/07/2012 to 20/07/2012 by team NIC comprising Shri M. Manivannan, STD, NIC Chennai, Shri Tapan Prakash Ray, TD and Shri Nihar Ranjan Biswal, PSA, from NIC Bhubaneswar.

 

All directors, CGMs, GMs and senior officers from 14 different areas of ECL participated in the workshop. On day one presentation on journey of GepNIC since 2007 was given by Shri Manivannan, STD followed by general features, security aspects etc.  Next, a full cycle of tendering was demonstrated to the participants and their queries were answered. On day two hands on sessions for departmental officers were organized. All the officers completed one full cycle of tendering using the demo site. The third day was dedicated for the bidders. A good no of bidders who were present were explained the advantages of eProcurement system followed by live demonstration of portal registration and bidding process. The bidders’ community welcomed the initiative of ECL and NIC. 

 

In the morning session of first day, Director (Technical) Opn & P&P Shri Subrata Chakrabarty, Director (Personnel) Shri S. K. Shrivastava, Director (Finance), Shri A. K. Soni, CVO, Shri P. K. Sinha addressed all the officers and expressed that with the introduction of  eProcurement in ECL a new era would begin with greater transparency and reduced tender cycle would be beneficial to both ECL and the bidders.

 

Shri Debal Gangopadhyay, GM, CMC, Shri D. P. Singh, Project Manager, eProcurement and Shri P. S. De, Chief Manager (Mining) coordinated the workshop from ECL side.

 

NIC members were felicitated by ECL Directors with presentation of mementoes.

 

After the workshop the NIC team met the CMD of ECL Shri Rakesh Sinha who expressed his happiness that the process of rolling out of eProcurement has begun. He sought NIC’s help to design a system to keep track of movement of vehicles carrying coal from source to destination and to manage lands possessed by ECL using digitisation. Shri Manivannan, STD assured all cooperation from NIC side. Shri Sushanta Mazumdar, TD & DIO Burdwan also attended the meeting.

 

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...