Search

Advanced Search

Inauguration of Prisons ERP System at Adarsh Central Jail, Patna, Bihar

Rajiv Ranjan, Bihar rajiv[dot]ranjan[at]nic[dot]in
  |   Apr 30, 2013
Inauguration of Prisons ERP System at Samvad
Inauguration of Prisons ERP System at Samvad

ePrisons Group of NIC with IG, Prisons, Bihar
ePrisons Group of NIC with IG, Prisons, Bihar

Hon’ble Shri Nitish Kumar, Chief Minister, Bihar on 25.04.2013 inaugurated Prisons ERP System at Model Central Prison, Beur, Patna from the “Samvad”, CM Secretariat, Patna through videoconferencing.


Shri Amir Subhani, IAS, Principal Secretary, Home Department, Bihar, Shri Abhayanand, IPS, DGP, Bihar, Shri Anand Kishore, IAS, IG Prisons, Shri Anil Kumar, ADGP, Bihar Police Housing Board, Dr. Sitansu S. Jena Chairman, NIOS, New Delhi,  Shri Rajiv Prakash Saxena, Deputy Director General, NIC, Shri Santosh Kumar, SIO NIC-Bihar, Shri Shashi Kant Sharma, Technical Director, NIC, New Delhi, Shri Ashok Kumar, DGM, NICSI, Shri Navin Kumar, SSA, NIC - Bihar were also present on this occasion.


The base of the prisons ERP system are the PMS (Prisons Management System) and VMS (Visitor Management System) which has been developed by the ePrisons Division at NIC, New Delhi. Besides this other eight major modules Online visitors’ appointment (eprisons.bih.nic.in), Stock Management System, Gate Management System, Prisoners Wage Management System, Hospital Management System, Personnel Management System, Prisons Treasury Accounts Management System, Arms & Ammunition Management System have been developed by the ePrisons Group of Bihar.


The system has been started at Beur Jail Patna as a pilot project and it shall be extended to 55 other jails of Bihar.
 

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...