Search

Advanced Search

Prison ERP interconnecting Prisons in Bihar under e-Prisons

Rajiv Ranjan, Bihar rajiv[dot]ranjan[at]nic[dot]in
  |   Sep 27, 2016
Sh. Anand Kishor, IG (Prison) with Dr. J Dass (NIC), Sh. Rajesh Kumar Singh (SIO Bihar), Sh. Shashi Kant Sharma (NIC) and Sh. Shivendra Priyadarshi
Sh. Anand Kishor, IG (Prison) with Dr. J Dass (NIC), Sh. Rajesh Kumar Singh (SIO Bihar), Sh. Shashi Kant Sharma (NIC) and Sh. Shivendra Priyadarshi

Sh. Anand Kishor, IG (Prison) delivering his inaugural address
Sh. Anand Kishor, IG (Prison) delivering his inaugural address

A workshop was organized on the theme “Prison ERP- interconnecting Prisons in Bihar under e-Prisons” on 26th September 2016 at Patna.
The inaugural address was delivered by Sh. Anand Kishor, IAS, IG (Prisons & Correctional Services), Bihar. He spoke about key innovative features implemented in Prison ERP that includes use of Biometric Tools, Photo Pass for Visitors, Voice Capture, Smart Card and SMS Alerts  in the application software to meet the objective of transforming the prisons as institution for corrective and reformative prison behavior.
The “key note” address was delivered by Sh. Shashi Kant Sharma, HOD, e-Prisons Division, NIC (HQ). Dr. J Dass, Sr. Technical Director & Bihar State Coordinator addressed the officials from Prisons and NIC.
Earlier, Sh. Rajesh Kumar Singh, State Informatics officer, Bihar welcomed participants namely Superintendent from Central Prisons and Districts Informatics Officer and Addl. Districts Officers from Bihar. NIC Bihar State Unit Senior Officers also participated.
The workshop deliberations were very comprehensive and exhaustive. Keeping in view of innovative solution for institutionalizing & paperless office for different prisons under Inspectorate of Prisons and Correctional Services of the State of Bihar, the project was conceptualized by IG (Prisons) and developed by NIC as a software suite locally from e-Prison Model of Prison Informatics Division, NIC (HQ), New Delhi for implementation initially at Model Beur Central Jail, Patna, which is being subsequently implemented in other 55 Prisons in Bihar.
The participants interacted to ask their queries and answers were provided by the entire stakeholder. Sh. Shivendra Priyadarshi, DIG, answered Administrative queries.
Technical coordination was provided by Sh. Rajiv Ranjan (PSA), Sh. Navin Kumar (SSA) and Sh. Anup Kumar (SA) of e-Prison Team, NIC, Bihar.
The entire workshop was facilitated by NICSI and coordinated by Sh. Sanjeev (DGM), NICSI (HQ) and Sh. M.K.Pangrahi (DGM), NICSI Bihar.
Sh. Rabindra Kumar Singh, ASIO (State HQ), Bihar extended his vote of thanks for participation of all stakeholders and their contribution and especially for the initiative of Sh. Rajesh Kumar Singh, SIO, Bihar.

Recent Issues

Highlights

Apr. ‘ 25 Issue


Decoding Data Governance & Strategy: Strategies for Data Protection, Compliance, and Optimization

In today digital era, data is the cornerstone of innovation, business growth, and governance. As India witnesses an ...


AI-Based Face Search: Transforming Archives with Facial Search Intelligence

Face search technology uses AI to identify and match faces across large photo collections. It extracts unique facial ...


Puduvai Kalal: Strengthening Governance Through Digital Transformation

The State Excise Department of Puducherry is a key government agency responsible for regulating excise activities within ...

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks: A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...