Search

Advanced Search

eSamadhan Portal launched by the Chief Minister of Himachal Pradesh

Ajay Singh Chahal, Himachal Pradesh ajay[dot]chahal[at]nic[dot]in
  |   Jan 15, 2009
eSmadhan launch ceremony
eSmadhan launch ceremony

"Prof. Prem Kumar Dhumal, Chief Minister, Himachal Pradesh formally launched the eSamadhan (Online Public Grievance Redressal System) portal for State wide roll-out by allocating User IDs and Passwords to all Secretary level officers in Shimla. Speaking on the occasion, the Chief Minister stressed upon the officers to use the SW extensively so that the grievances of the citizens are addressed in a fair, transparent and timely manner. In his speech, the Chief Minister lauded the contribution of NIC in the eGovernance initiatives of Himachal Pradesh.

Mrs. Parminder Mathur, Additional Chief Secretary , Sh. Bhim Sen, Principal Secretary to CM & Public Grievance Redressal were present during the launch ceremony which was attended by a large number of senior officers of the State Government.

Sh. Rajesh Bahdur, SIO, NIC Himachal Pradesh gave a detailed presentation on the various aspects of web-enabled SW which will meet the aspirations of the common man by bringing these in direct touch with all relevant officers of all departments.

The SW interface enables a citizen to lodge a complaint and keep its track online through the website http://admis.hp.nic.in/esamadhan The departmental interface allows officers to mark, reply, seek additional information and take other necessary action in work-flow manner by escalating the same. The Chief Minister, Chief Secretary, Ministers and Secretaries can monitor the overall status of functioning of the system.

The software has been designed and developed by the NIC State Centre, Shimla and initially implemented for 4 departments on pilot basis. Now the training of all concerned officials has been conducted by NIC for State wide roll-out covering all offices of all departments having Internet connectivity."

Recent Issues

Highlights

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...