Search

Advanced Search

Interoperable Criminal Justice System of Himachal Pradesh wins CSI Nihilent eGovernance Award of Excellence

Ajay Singh Chahal, Himachal Pradesh ajay[dot]chahal[at]nic[dot]in
  |   Dec 18, 2013
Award being received by Sh. SR Mardi, ADGP and Dr. Saurabh Gupta SIO Himachal Pradesh
Award being received by Sh. SR Mardi, ADGP and Dr. Saurabh Gupta SIO Himachal Pradesh

iCJS software interface screen
iCJS software interface screen

The Interoperable Criminal Justice System-iCJS has been conferred with the CSI Nihilent e-Governance Award of Excellence in the 48th CSI Convention at Visakhapatnam on 14th December 2013. The Award was received by Sh. S.R. Mardi IPS, Additional Director General of Prisons, Himachal Pradesh, Dr. Saurabh Gupta, State Informatics Officer, NIC Himachal Pradesh and Sh. Ajay Singh Chahal, Sr. TD.

The awards were presented by Sh. J. Satyanarayana, Secretary DeitY, GoI and Professor S.V. Raghavan National President CSI and Scientific Secretary to Principal Scientific Advisor, Government of India.

The Interoperable Criminal Justice System has been designed and developed by NIC Himachal Pradesh for speedy Justice by facilitating the data-exchange between the Courts, Police, Jails and the Forensic Labs. To ensure standardization and replicability of the iCJS across the country, standard SW applications developed and implemented at the National level were used at the core level. The Common Integrated Police Application- CIPA already implemented in all Police Stations of Himachal Pradesh was enhanced by web-enabling it and renaming as Kanoon Vyavastha. A number of graphical Dashboard drill-down reports have been added.

The standard ePrisons software application for Prisons was implemented in 14 State Prisons in a mission mode as this data was very relevant to the iCJS software for speedy justice delivery. As there was no software for the State Forensic Laboratories, a new SW named eFSL has been developed locally and integrated with the Kanoon Vyavastha software of HP Police. Now all inter-action between Police Stations and 3 Forensic Laboratories in the State is online and reports are made available instantly to speed up the investigation process.

The advantage of iCJS is that all the stakeholders have online and instant access to data available in different software applications, which reduces the time, normally consumed in manual exchange of documents amongst related departments. The ultimate objective has been the speedier delivery of justice to the common man by interlinking related Justice Delivery systems and improving investigation quality. The other benefits include doing away with the exchange of paper based information amongst the stakeholders and utilization of digitized data of other domains directly in individual SW applications.

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...