Search

Advanced Search

Certificate of appreciation and memento to Koraput for exemplary work on digital payments campaign

A. K. Hota, Odisha ak[dot]hota[at]nic[dot]in
  |   Feb 13, 2017
DIO Receving Letter of Appreciation from Honourable Minister
DIO Receving Letter of Appreciation from Honourable Minister

Glimpses of activities conducted in the district
Glimpses of activities conducted in the district

It was a proud moment for NIC, Koraput, Odisha to receive the award in the National DIO Meet for its exemplary achievement on digital payments campaign.

DIO, Koraput, Smt. Sailabala Prusty, received the certificate of appreciation with memento from Honble Minister of IT  & Comm.  and Law & Justice Shri Ravi Shankar Prasad, in presence of Minister of State, Shri P. P. Choudhury, Secretary MeiTY, Smt Aruna Sunderrajan, IAS , and  DG, NIC, Smt. Neeta Verma. 

Koraput is one of the backward districts of Odisha with lagging literacy rate, poverty and as a natural corollary to these the population of the district mostly depended on cash transactions to go about their daily chores. Hence switching on immediately to the hitherto unheard of Cashless mode sounded like a distant dream because we found the big cities crying agonisingly over the same.

Remaining at the forefront of the technology initiatives of Govt. of India for over 30 years, it was expected of NIC to deliver at the time of need. In this backdrop we at NIC Koraput sensed an opportunity to spread the awareness campaign. It was planned to educate the persons manning the Common Service Centres (CSCs) in the district, departmental officials, common citizen, students at universities / colleges etc.  on the following topics with audio-visual aids.

TOPICS COVERED FOR CASHLESS INITIATIVE

  1. Banking Cards (Debit / Credit / Cash / Travel / Others)
  2. Unstructured Supplementary Service Data (USSD)
  3. AADHAR Enabled Payment System (AEPS)
  4. Unified Payment Interface (UPI)
  5. Mobile Wallets
  6. Banks Pre-Paid Cards
  7. Point of Sale Machines
  8. Internet Banking
  9. Mobile Banking
  10. Micro ATMs etc.

A number of training sessions with hands-on- examples were delivered by the NIC Koraput team to clarify the doubts of the CSC personnel.

The CSC Coordinator also lent a helping hand. Hence we coaxed them, encouraged them and also they participated in an interactive way to learn the various methods. They were an enthusiastic lot and they took pride in what they were going to implement in the field. We must acknowledge thankfully their contribution for the success of the initiative.

This was the bedrock for the success of the cashless initiative in the District of Koraput which helped Koraput District NIC stand up and be counted.

Recent Issues

Highlights

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...