Search

Advanced Search

eIndia Governance Award for EASYGAS Initiative of NIC, Gonda, U.P.

Anshu Rohatgi, Uttar Pradesh anshu[dot]rohatgi[at]nic[dot]in
  |   Sep 10, 2013
Project Team, Gonda receiving the eIndia Award
Project Team, Gonda receiving the eIndia Award

The EASYGAS (Online LPG Booking System) initiative on district Gonda, Uttar Pradesh won the Jury Choice Award under the ‘CSC Initiative’ category of eIndia eGovernance Awards 2013. The award was handed over to project team during the recently held eIndia eGovernance Summit 2013 at Hyderabad in July 2013.

EASYGAS is an IT based initiative taken by District Magistrate, Gonda Dr. Roshan Jacob, IAS. NIC Gonda provided the necessary technical inputs and in consultation with district administration developed & implemented the EasyGas application in the district. The project has been designed to prepare a reliable database of commercial and non-commercial consumers, provide accurate statement of LPG stock position with various distribution agencies, and create an interface for Common Service Centre, Lokvani based booking facility for the citizens living in villages and remote areas of the district. The project also ensures that all consumers of LPG cylinders would get home delivery of the cylinder within seven days of booking.

EASYGAS has received widespread appreciation from the citizens and consumers. It has provided a useful model of improving governance and service delivery by creating entitlement rights for consumers by using the CSC/Lokvani centres as an additional interface between the beneficiary/customer and the existing mechanism of delivery.

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...