Search

Advanced Search

THE CENTRAL PLAN SCHEME MONITORING SYSTEM

Lokesh Joshi, lokesh[at]nic[dot]in
  |   Jan 2, 2013

 

There are over a thousand Centrally Sponsored and Central Sector Schemes being implemented through different ministries of the Government of India. Given the diversity in implementation hierarchy, number of implementing units and the geographical reach of these schemes it has been a challenge to have meaningful information on these schemes. The need for a central monitoring, evaluation and accounting system for the Plan Schemes has been widely acknowledged and this site facilitates the same. To enable regsitration of Implementing Agencies under the following schemes, downloadable Agency Registration Manuals are available for various schemes like MGNREGA, SSA, Rajiv Gandhi Gramin Vidyutikaran Yojana, PMGSY, Indira Awas Yojana, NRHM etc. The site provides information on various Banks and a Bulletin Board serves latest Updates. Banner images that link to the national portal and other major sites are being displayed in the bottom bar on home page. The Website with simple colour scheme and a large featured establishes the idea and motto of the initiative. A contact page and FAQ area is available to assist users seeking additional information. The website is compatible with all major browsers and it has proper response to standard screen resolution. The website offers interactivity in terms of registering agencies, sanction ID Generation Users, MIS Reports Users and State Govt. DDO. This is of great importance in bringing hassle free registration process and it serves as an ideal implementation of e-Governance.

Recent Issues

Highlights

Apr. ‘ 25 Issue


Decoding Data Governance & Strategy: Strategies for Data Protection, Compliance, and Optimization

In today digital era, data is the cornerstone of innovation, business growth, and governance. As India witnesses an ...


AI-Based Face Search: Transforming Archives with Facial Search Intelligence

Face search technology uses AI to identify and match faces across large photo collections. It extracts unique facial ...


Puduvai Kalal: Strengthening Governance Through Digital Transformation

The State Excise Department of Puducherry is a key government agency responsible for regulating excise activities within ...

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks: A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...