Search

Advanced Search

Haryana: Workshop on MedLEaPR-FSL Software organized by NIC - Haryana with State of Rajasthan on 07/06/2017

Deepak Sawant, Haryana sawant[dot]deepak[at]nic[dot]in
  |   Jun 16, 2017
Video Conferencing with NIC-Rajasthan
Video Conferencing with NIC-Rajasthan

Demonstration of MedLEaPR-FSL Software
Demonstration of MedLEaPR-FSL Software

A workshop was organized for Medico Legal Examination & Post Mortem Report)- Forensic Science Laboratory (MedLEaPR-FSL)Software over Video Conferencing with Rajasthan. The application is developed by NIC-Haryana State Centre and already successfully running in Haryana, Punjab and Chandigarh(UT).  On the direction from Hon'ble High Court Rajasthan, the MedLEaPR-FSL application is to be replicated in State of Rajasthan.  Mr Rahul Jain , Scientist-E (State Health Coordinator) and Mr. Deepak Sawant, Scientist-D, NIC-Haryana given the demonstration of MedLEaPR-FSL application during the workshop and shared experience of rollout of application in multistate with the participants of the workshop. The experts from Health Department, Forensic Science Laboratory, Home Department  of State of Rajasthan & NIC  attended the Video conferencing.  Approximate fifteen (15) numbers of participants attended the Video Conference.

                “Medico Legal Examination and Postmortem Reports System” (MedLEaPR) is a generic software developed by NICHaryana to facilitate computerization of MLRs & PMRs. Further, the system is workflow based, which provides requisite access security, based on roles & responsibilities of concerned Doctors and Health Institutes. This project is directly monitored by Hon'ble High Court of  Punjab and Haryana, Chandigarh for State of Haryana, Punjab and Chandigarh.

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...