eGov-March-2009-[42-43]-News & Views

Page 1

N ews & V I ews by laws such as Sarbannes-Oxley (SOX), PCI-DSS, HIPAA, GLBA and more. All these regulations require detailed reporting and an audit trail to show that you have indeed complied with the letter of the law. India’s current IT Act doesn’t have the scope and vision to ensure a granular degree of control over electronic data covering various industries. Complying with these and other regulations is often complicated, time-consuming, and costly. Cyberoam helps to minimise these headaches by providing the consolidation of all required perimeter security tools into one unified platform to protect the network and guarantee the integrity of data.

National In Orissa NREGA Payments Through Smart Card Under the National Rural Employment Guarantee Act (NREGA) around 2,000 workers in Orissa have been collecting their wages from their local post offices using smart cards in the past two months. Launched on December 1, 2008 at Baunspal in Orissa’s Dhenkanal district, the project piloted by the Department of Posts, with the active involvement of Minister of State for Communications and Information Technology Jyotiraditya Scindia, will very soon cover around 25 villages and service 6,000 workers under NREGA. The number of accounts opened under NREGA with post offices has already crossed the two crore mark. As on December 31, 2008, post offices across the country had disbursed INR 3,422 crore under NREGA.

e-Auction of Tea Failed to Take-off in Kolkata Kolkata’s project on e-auction of tea has failed to take-off due technical glitches, lack of space and difficulty in allowing proxy bidders. The e-auction of tea in Kolkata which was to start from January 27, 2009, was carried out but only manually on January 27 and 28, 2009. This new e-auction system, an INR 18-crore project, has been redesigned by the National Stock Exchange’s IT department. According to tea traders, the major bottleneck in the e-auction of tea is that it would not only translate into an escalation of costs but the process would also become slower than the manual auctions.

Digvijaysinh Chudasama Vice President-Sales Cyberoam, India

There is an urgent need to redefine the concept of national security secrets and moving beyond protection of the defense industry and public sector” What do you feel about IT security compliance in India? In the US, securing your network against attacks is not only good practice but is also mandated

e-Procurement For Railways The e-procurement system of the railways was inaugurated recently. The e-procurement platform to East Coast Railway (ECoR) has been provided by Centre for Railway Information System (CRIS). The east coast railway stores department purchases around INR 750 crore materials every year. The new system will bring in benefits in terms of cost savings due to improved competition, improved internal efficiency, the procurement cycle will be further compressed by around 30 days.

First e-Court of India launched The first model e-Court in the country has been launched by the Gujarat High Court recently. It has started functioning on a pilot basis at the Ahmedabad City Civil and Sessions Court, providing tamper proof authentic audio-video recording of proceedings with multi-point video conferencing facilities linking the courtroom, central jail, the police commissioner’s office and the Forensic Science Laboratory. The under-trials lodged in the central jail could be virtually presented before the court through video conferencing. This project is an initiative of the central government and was set up with technical support from the Technology, Information, Forecasting and Assessment Council (TIFAC), the Centre for Advanced Computing and National Informatics Centre.

42 }

What are international IT security trends that can be readily adopted in India and will it make a difference? The nature of worldwide data, information pilferage and economic intelligence gathering through the use of Internet has redefined security needs and strategies to combat growing threats. In one recent case, a company, a major player in power and utilities, was sabotaged and its critical information assets compromised by its very own security vendor - a foreign security company - something that highlights the vulnerability of networks, especially those of a nation whose information security needs are manifold. There is an urgent need to redefine the

Events Watch 3-4 March, 2009 6th Annual Enterprise Security Asia Conference 2009 Kuala Lumpur, Malaysia http://www.acnergy.com/EntSec2009. htm ..................................................... 12-13 March, 2009 1st International Conference on eGovernment & eGovernance, Ankara, Turkey http://www.icegov.info/ ..................................................... 17-19 March, 2009 International Exhibition & Conference on Homeland Security, Singapore http://www.globalsecasia.com ..................................................... 18-20 March, 2009 17th Convergence India 2009 New Delhi, India http://www.convergenceindia.org ..................................................... 27-29 March, 2009 International Conference on Information and Communication Technologies (ICICT) Hong Kong, China http://www.waset.org/wcset09/ hongkong/icict/

3-5 April, 2009 International Conference on Information Management and Engineering (ICIME 2009) Kuala Lumpur, Malaysia http://www.icime.org ..................................................... 07-10 April, 2009 Forum on next Generation Network Standardisation Colombo, Sri Lanka http://www.cto.int/ngn/09 17-19 April, 2009 IEEE/ACM International Conference on Information and Communication Technologies and Development (ICTD) 2009 Doha, Qatar http://www.ictd2009.org ..................................................... 22-24 April, 2009 IDMA World Asia 2009 Singapore http://www.the-infoshop.com/ conference/idma09/ ..................................................... 27-28 April, 2009 Government Technologies Conference & Expo Toronto

Canada http://gov.wowgao.com ..................................................... 7-9 May, 2009 2nd International Conference on Information and Communication Technologies and Accessibility Hammamet Tunisia http://www.icta.rnu.tn ..................................................... 23-27 May, 2009 15th GCC eGovernment and eServices Forum Dubai, UAE http://www.datamatixgroup.com/ conferences/profile.asp?id=457 ..................................................... 24-28 May, 2009 The Fourth International Conference on Internet and Web Applications and Services (ICIW) Venice, Italy http://www.iaria.org/conferences2009/ ICIW09.html ..................................................... 31 May - 4 June, 2009 6th Annual European Semantic Web Conference Heraklion, Greece http://www.eswc2009.org

www.egovonline.net

ov


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.