Search

Advanced Search

Launch of mGovernance by the Chief Minister, Himachal Pradesh

Ajay Singh Chahal, Himachal Pradesh ajay[dot]chahal[at]nic[dot]in
  |   Nov 27, 2009
The Chief Minister viewing SW generated SMS
The Chief Minister viewing SW generated SMS

The Chief Minister of Himachal Pradesh, Professor Prem Kumar Dhumal, formally launched four mobile phone based services for the Copying Agency, Public Grievance Redressal system (eSamadhan), Arms License Issuance System (eShastr) and Election Communication Plan MIS. This has started the process of moving towards mGovernance in the State. A number of senior officers of the State Government were present during the launch ceremony. The SMS Gateway interface has been provided by the Department of IT, HP. The Principal Secretary (IT) HP Government gave a presentation on the usage of SMS Gateway and the SIO NIC Himachal Pradesh demonstrated the eShastr and eSamadhan services using SMS gateway. The CEO Himachal explained the usage of SMS gateway during the recently held by-elections. All the applications have been developed for the convenience of the citizens so that they don’t have to visit the Government offices again and again. In eShastr, once the Arms license is printed, the citizens get information on their mobile phone through SMS to come and collect the copy or license by paying the specified balance amount. During the launch ceremony, one applicant was sent an SMS and the Chief Minister presented him his Arm License. In eSamadhan, the entire process has been linked to SMS gateway and the citizens keep getting SMS after lodging their complaint and every time the Government office takes some action on the grievance. The Principal Secretary (Chief Minister, Public Grievance Redressal) was also present. The immediate response by the SW application on the applicant’s mobile through SMS instills a confidence that the Government is serious about redressal of his/her complaint. Every time, a Government action is initiated on the complaint, the applicant automatically receives another SMS, showing the level and brief response. This enables the citizen to monitor the status of complaint without using Internet. In Elections Department, the SMS based Poll Communication Plan SW was implemented for the by-election to two Assembly Segments in November 2009 and data was used by the CEO Himachal. The citizen interface kept the public updated on the poll figures every two hours. All data from approximately 215 polling booths was collected only through SMS. Also, the Electors can SMS their EPIC number to the specified number and get information about their part number, serial number and address of the polling booth. All the applications SW are NIC developed and the SMS gateway interface has also been incorporated by the NIC Himachal Pradesh State Centre.

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...