Search

Advanced Search

THE CENTRAL PLAN SCHEME MONITORING SYSTEM

Lokesh Joshi, lokesh[at]nic[dot]in
  |   Jan 2, 2013

 

There are over a thousand Centrally Sponsored and Central Sector Schemes being implemented through different ministries of the Government of India. Given the diversity in implementation hierarchy, number of implementing units and the geographical reach of these schemes it has been a challenge to have meaningful information on these schemes. The need for a central monitoring, evaluation and accounting system for the Plan Schemes has been widely acknowledged and this site facilitates the same. To enable regsitration of Implementing Agencies under the following schemes, downloadable Agency Registration Manuals are available for various schemes like MGNREGA, SSA, Rajiv Gandhi Gramin Vidyutikaran Yojana, PMGSY, Indira Awas Yojana, NRHM etc. The site provides information on various Banks and a Bulletin Board serves latest Updates. Banner images that link to the national portal and other major sites are being displayed in the bottom bar on home page. The Website with simple colour scheme and a large featured establishes the idea and motto of the initiative. A contact page and FAQ area is available to assist users seeking additional information. The website is compatible with all major browsers and it has proper response to standard screen resolution. The website offers interactivity in terms of registering agencies, sanction ID Generation Users, MIS Reports Users and State Govt. DDO. This is of great importance in bringing hassle free registration process and it serves as an ideal implementation of e-Governance.

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...