Search

Advanced Search

Launch of SARATHI software based Smart Card Driving Licenses (SCDL) in Etawah, Uttar Pradesh

Anshu Rohatgi, Uttar Pradesh anshu[dot]rohatgi[at]nic[dot]in
  |   Mar 5, 2013
District Magistrate Shri P Guruprasad, IAS at the RTO Office
District Magistrate Shri P Guruprasad, IAS at the RTO Office

News coverage by media
News coverage by media

Uttar Pradesh Transport Department has decided to roll out of SARATHI software based Smart Card Driving Licenses across the State by dividing the districts in a phase wise manner starting from January 9, 2013. Etawah being in third phase was inaugurated by District Magistrate, Etawah, Shri P  Guruprasad, IAS on 26-Feb-2013. The DM visited the RTO Office to register his thumb impression and photograph to get the SMART Card based License made. He told the people and media present that the new electronic system will curb the issuance of bogus driving licenses in the district and state.

Under the new system, the driving license applicant would have to be personally present at the transport office and his biometric thumb impression, picture, digital signature will be taken. The information will be stored in a database, thus restricting the possibility of issuing another license from any other district’s transport office. The database will be used for development of a state register and a national register.

ARTO, EtawahDistrict , Ms. Vandana informed that the office was equipped to issue around 500 SMART card based licenses every day and the fee per license  will be Rs.200/-. She further said that later, in case of issuance of challan and any other penalty, the details will be stored in the chip of the license for an effective action against the defaulters.

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...