Search

Advanced Search

Prison ERP interconnecting Prisons in Bihar under e-Prisons

Rajiv Ranjan, Bihar rajiv[dot]ranjan[at]nic[dot]in
  |   Sep 27, 2016
Sh. Anand Kishor, IG (Prison) with Dr. J Dass (NIC), Sh. Rajesh Kumar Singh (SIO Bihar), Sh. Shashi Kant Sharma (NIC) and Sh. Shivendra Priyadarshi
Sh. Anand Kishor, IG (Prison) with Dr. J Dass (NIC), Sh. Rajesh Kumar Singh (SIO Bihar), Sh. Shashi Kant Sharma (NIC) and Sh. Shivendra Priyadarshi

Sh. Anand Kishor, IG (Prison) delivering his inaugural address
Sh. Anand Kishor, IG (Prison) delivering his inaugural address

A workshop was organized on the theme “Prison ERP- interconnecting Prisons in Bihar under e-Prisons” on 26th September 2016 at Patna.
The inaugural address was delivered by Sh. Anand Kishor, IAS, IG (Prisons & Correctional Services), Bihar. He spoke about key innovative features implemented in Prison ERP that includes use of Biometric Tools, Photo Pass for Visitors, Voice Capture, Smart Card and SMS Alerts  in the application software to meet the objective of transforming the prisons as institution for corrective and reformative prison behavior.
The “key note” address was delivered by Sh. Shashi Kant Sharma, HOD, e-Prisons Division, NIC (HQ). Dr. J Dass, Sr. Technical Director & Bihar State Coordinator addressed the officials from Prisons and NIC.
Earlier, Sh. Rajesh Kumar Singh, State Informatics officer, Bihar welcomed participants namely Superintendent from Central Prisons and Districts Informatics Officer and Addl. Districts Officers from Bihar. NIC Bihar State Unit Senior Officers also participated.
The workshop deliberations were very comprehensive and exhaustive. Keeping in view of innovative solution for institutionalizing & paperless office for different prisons under Inspectorate of Prisons and Correctional Services of the State of Bihar, the project was conceptualized by IG (Prisons) and developed by NIC as a software suite locally from e-Prison Model of Prison Informatics Division, NIC (HQ), New Delhi for implementation initially at Model Beur Central Jail, Patna, which is being subsequently implemented in other 55 Prisons in Bihar.
The participants interacted to ask their queries and answers were provided by the entire stakeholder. Sh. Shivendra Priyadarshi, DIG, answered Administrative queries.
Technical coordination was provided by Sh. Rajiv Ranjan (PSA), Sh. Navin Kumar (SSA) and Sh. Anup Kumar (SA) of e-Prison Team, NIC, Bihar.
The entire workshop was facilitated by NICSI and coordinated by Sh. Sanjeev (DGM), NICSI (HQ) and Sh. M.K.Pangrahi (DGM), NICSI Bihar.
Sh. Rabindra Kumar Singh, ASIO (State HQ), Bihar extended his vote of thanks for participation of all stakeholders and their contribution and especially for the initiative of Sh. Rajesh Kumar Singh, SIO, Bihar.

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...