Search

Advanced Search

Inauguration of Video Conferencing Facility at Nyaya Sanjog, Odisha State Legal Services Authority

A. K. Hota, Odisha ak[dot]hota[at]nic[dot]in
  |   Jul 29, 2017
Honourable Judges Inaugurating the VC Facility
Honourable Judges Inaugurating the VC Facility

Participants from 25 Jails joined the VC
Participants from 25 Jails joined the VC

Hon'ble Shri Justice Dipak Misra, Judge, Supreme Court of India & Executive Chairman, NALSA inaugurated VC facility at the Legal Assistance Establishment (Nyaya Sanjog) set up in the office of the Odisha State Legal Services Authority(OSLSA), Cuttack in presence of Hon'ble Chief Justice Shri Vineet Saran, Hon'ble Shri Justice Indrajit Mahanty, Judge, Orissa High Court & Executive Chairman, OSLSA, Hon’ble Judges of Orissa High Court, Addl. DG Prisons, Odisha, Addl. DG of Police (Hqrs), Special Secretary IT, Govt. of Odisha and Officials from NALSA at 10 AM on 23.07.2017. 

Later Hon'ble Shri Justice Dipak Misra, interacted over VC with the Superintendents and inmates of Jails and District Legal Service Authority officials.

25 jails including ‘Nari Bandi Niketan' at Sambalpur participated in the programme. This interaction proceeding was also watched live by the participants of the 'sensitization programme'   at Odisha Judicial Academy, Cuttack.

NIC provided 8 mbps NICNET connectivity and provided technical assistance in setting up the VC studio at Nyaya Sanjog, OSLSA, Cuttack at a very short notice. 

Trial runs were held regularly with the Jails by VC Division NIC(HQ),NIC, Bhubaneswar and NIC High Court Cell, Cuttack during the past week including one session Chaired by the Hon'ble Chief Justice, Odisha prior to the event held on 23.07.2017.

Hon'ble Judges appreciated the role of NIC in the successful conduct of the VC session.

The event was widely covered in the media.

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...