Search

Advanced Search

Manav Sampada wins Skoch Smart Governance Award and 8 Projects of NIC Himachal win Order of Merit

Sandeep Sood, Himachal Pradesh sood[dot]sandeep[at]nic[dot]in
  |   Oct 7, 2015
Dr. Shefali Dash, DDG and NIC Manav Sampada Team receiving the Order of Merit
Dr. Shefali Dash, DDG and NIC Manav Sampada Team receiving the Order of Merit

SIO, NIC HP and Manav Sampada Team receiving the Smart Governance Award
SIO, NIC HP and Manav Sampada Team receiving the Smart Governance Award

The Manav Sampada (Human Resource Management System) project of NIC has won the Skoch Smart Governance Award 2015 on 23rd September 2015. The Manav Sampada software has been developed as a product and has been implemented in the State of Himachal Pradesh. It is under implementation in the State of Jharkhand and being implemented in the National Human Rights Commission, New Delhi as well as some Departments of the States of Bihar, Maharashtra. It is also being considered for implementation in Punjab/Chandigarh.

Dr. Shefali S Dash, DDG, Sh. IPS Sethi, Sr. TD, Sh. Ajay Singh Chahal, SIO, Himachal Pradesh, Sh. Sanjay Kumar, PSA, Sh. Sandeep Sood, PSA and Sh. Sanjay Thakur, SSA received the Award as well as the Order of Merit.

A total of 8 Projects of NIC Himachal Pradesh have received the Skoch Order of Merit on 22nd September 2015 in New Delhi during the Skoch Summit and these are:

  • Manav Sampada (Human Resource Management System)
  • HPTDC-Online Hotels Reservation System
  • JailVaarta-Prisoners VC based meetings with their Relatives
  • Swayamsidham-Online Teacher Student Portal
  • Electoral Rolls Management System of State Election Commission
  • Works MIS software of HP Irrigation & Public Health Department
  • Hot Dak Tracking System (HDTS) developed by NIC Hamirpur
  • Schemes Monitoring System developed by NIC Mandi

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...