Search

Advanced Search

NIC Haryana Team Honored by State Election Commission, Haryana

Poonam Gupta, Haryana poonam[dot]g[at]nic[dot]in
  |   Aug 19, 2013
DDG and SIO Sh. Ghan Shyam Bansal while receiving Certificate of Appreciation from  Sh. Dharam Vir, State Election Commissioner
DDG and SIO Sh. Ghan Shyam Bansal while receiving Certificate of Appreciation from Sh. Dharam Vir, State Election Commissioner

A still from conference
A still from conference

A half day Conference of all DIOs of NIC-Haryana, Dy. Commissioners of 07 districts of Haryana, where General Elections to Municipal Corporations of Haryana were  held on 2nd June 2013, was organized by the Haryana State Election Commission on 12th August at Chandigarh, to deliberate on the extensive usage of  ICT in Election Process. The conference was Chaired by State Election Commissioner Haryana, Sh. Dharam Vir, IAS (Retd.) and it was also attended by Chief Electoral Officer of Haryana, Officers of State Election Commission, NIC-Haryana team, DIOs and DCs.

Sh. Dharam Vir, the State Election Commissioner  honored the officers of NIC Haryana for ICT support and  ITeS provided to the commission during, the general elections to the 07 Municipal Corporations. 

The NIC Haryana team, including DDG and SIO Sh. Ghan Shyam Bansal, Election  Project Coordinator Sh. Pardeep Kaushal, TD NIC,  DIOs and ADIOs of Hisar, Ambala, Yamunanagar, Kurukshetra, Karnal, Panipat, Rohtak, Panchkula were honored with Certificates of Appreciation.

NIC Haryana had provided following services to the commission during Municipal Corporations General Elections 2013.

1. Development of software for SMS based e-dashboard and election results information system.

2. Preparation of ward wise Voter lists and Printing of Voter slips with photo using latest ECI, Voters database as a base.

3. Uploading of GIS locations of all polling booths on web.

4. Handling of claims and objections through the use of Harsamadhan.

5. Web based voter helpline by uploading MC wise electoral roll on web.

6. Know Your Candidate (KYC) web application.

7. Database creation of polling staff.

8. Duty assignment and randomization of poll staff and EVMs

9. ICT support to District Administration and ROs at District level.

10. Provision of NICNET services for data transmission.

11. Provision of infrastructure support at NIC Data Centre.    

During the function, Sh. Dharam Vir, State Election Commissioner, lauded the efforts of entire NIC team, for the development and implementation of various ICT applications which helped a great deal in conduct of elections in a free, fair and transparent manner.

 The SEC, particularly praised the SMS based e-Dashboard application which was developed for polling day and counting day monitoring of polls. The dashboards provided complete overview of the elections to the administration, media and general public on web, for which a special web site was launched, ( http://mcelections.nic.in ). Data on this web site was updated through SMS, from polling booths on poll day and counting centers on counting day.

Sh. Srikant Walgad, IAS, the Chief Electoral Officer Haryana, also showed keen interest in the application and desired to implement the same in forthcoming Parliamentary & Assembly Elections in the state.

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...