Taarangan December 2014

Page 1

yeQkeÀ Dee@]HeÀ Fbef[³ee keÀer efleceener ie=nHeef$ekeÀe efomebyej, 2014

Bank of India’s Quarterly House Journal December, 2014

Security

Special Edition on INFORMATION SECURITY


¬¸» ¸›¸¸ ¬¸º£®¸¸ ©¸œ¸˜¸ /

Information Security Pledge

Do’s:

ˆÅ£Ê À

1. I will make myself aware of our “Corporate Information Security Policy” [CISP] Ver. – 4.1 of my Bank and will attend such awareness programmes as and when intimated to me.

1. Ÿ¸ÿ ¬¨¸¡¸¿ ˆÅ¸½ ‚œ¸›¸½ ¤¸ÿˆÅ ˆÅú "ˆÅ¸œ¸¸½Ä£½’ ¬¸» ¸›¸¸ ¬¸º£®¸¸ ›¸ú¢÷¸ ¬¸¿¬ˆÅ£µ¸" 4.1 ¬¸½ ‚¨¸Š¸÷¸ £‰¸»¿Š¸¸/£‰¸»¿Š¸ú ÷¸˜¸¸ ¸¤¸ ˆÅž¸ú ž¸ú Ÿ¸º ¸½ ¬¸»¢ ¸÷¸ ¢ˆÅ¡¸¸ ¸¸‡Š¸¸ Ÿ¸ÿ ƒ¬¸ œÏˆÅ¸£ ˆ½Å ¸¸Š¸²ÅˆÅ÷¸¸ ˆÅ¸¡¸ÄÇÅŸ¸ Ÿ¸Ê „œ¸¦¬˜¸÷¸ £í»¿Š¸¸/£í»¿Š¸ú—

2.

I will always keep my Password/s secret and protected.

2. Ÿ¸ÿ ퟸ½©¸¸ ‚œ¸›¸½ œ¸¸¬¸¨¸”Ä ˆÅ¸½ Š¸ºœ÷¸ ‚¸¾£ ¬¸º£¢®¸÷¸ £‰¸»¿Š¸¸/£‰¸»¿Š¸ú—

3.

I will Change the Password/s at regular intervals and keep very strong password with a combination of uppercase and lowercase letters, numbers and special characters consisting of at least 8 characters length. I am aware that I am fully responsible for all activities originating with my password.

3. ¢›¸¡¸¢Ÿ¸÷¸ ‚¿÷¸£¸¥¸ œ¸£ Ÿ¸ÿ ‚œ¸›¸½ œ¸¸¬¸¨¸”Ä ˆÅ¸½ ¤¸™¥¸÷¸½ £í»¿Š¸¸ ÷¸˜¸¸ ‚œ¸£ˆ½Å¬¸ ‚¸¾£ ¥¸¸½¨¸£ˆ½Å¬¸ ©¸¤™¸Ê, ‚¿ˆÅ¸Ê ‚¸¾£ ¢¨¸©¸½«¸ ¬¸¿ˆ½Å÷¸¸Ê ˆÅ¸½ ¢Ÿ¸¥¸¸ˆÅ£ ›¡¸»›¸÷¸Ÿ¸ 8 ¢ ¸›í¸Ê ˆÅ¸ ¤¸íº÷¸ ¬¸©¸Æ÷¸ œ¸¸¬¸¨¸”Ä £‰¸»¿Š¸¸/£‰¸»¿Š¸ú— Ÿ¸ÿ ¸¸›¸÷¸¸/ ¸¸›¸÷¸ú í»Â ¢ˆÅ Ÿ¸½£½ œ¸¸¬¸¨¸”Ä ¬¸½ í¸½›¸½ ¨¸¸¥¸ú ¬¸ž¸ú Š¸¢÷¸¢¨¸¢š¸¡¸¸Ê ˆ½Å ¢¥¸‡ Ÿ¸ÿ œ¸»µ¸Ä÷¸À ¢ ¸ŸŸ¸½™¸£ í»Â—

4. I will make sure that my desktop – PC has updated antivirus. 5. 6.

I will make sure that my PC is locked (Ctrl+Alt+Del) when I leave the desk, even for a few minutes. I will make sure that all the discarded and obsolete records, old unused printouts are disposed of in a proper way as per the Bank’s Policy.

7. I will make myself aware of Helpdesk, Call Center and other important contact numbers. 8.

9.

I will maintain records of any incidents / problems related to PC/Applications for future reference and for IS Audit purpose. I will back up all my important files regularly.

10. I will contribute my best towards improving the security culture of my Bank.

Don’ts: 1.

I will not disclose any information to outsider/unconnected persons.

2.

I will not misuse Internet and download any unauthorized/ pirated software, games, file on to my computer.

3.

I will not type the password/PIN when someone is watching or nearby me.

4.

I will not use CD, Pen Drive or any external storage media, unless it is scanned for virus.

5.

I will not panic in case of any untoward incidents and in case of such happenings, I will inform our Crisis Management Teams [CMT] immediately.

6. I will not navigate through other SOL-ID/ Computers. I am aware that all my activities are recorded by the system. 7.

I will not send/receive official communication on my personal e-mail ID nor would I use official e-mail ID for private communications.

8. I will not respond to or open attachments from unknown e-mail sources. 9.

I will not divulge any information or my views regarding the Bank on any social networking site.

10. I will never shy away from bringing any suspicious, suspected and actual security violations to the notice of my superiors.

4. Ÿ¸ÿ ¡¸í ¬¸º¢›¸¢ä¸÷¸ ˆÅ²Å¿Š¸¸ ¢ˆÅ Ÿ¸½£½ ”½¬ˆÅ’¸Áœ¸ - œ¸ú¬¸ú Ÿ¸Ê ‚Ô¸÷¸›¸ ‡¿¢’-¨¸¸ƒ£¬¸ í¸½— 5. Ÿ¸ÿ ¡¸í ¬¸º¢›¸¢ä¸÷¸ ˆÅ²Å¿Š¸¸ ¢ˆÅ ¸¤¸ Ÿ¸ÿ ”½¬ˆÅ ¬¸½ „“»Â ÷¸¸½ Ÿ¸½£¸ œ¸ú¬¸ú ¥¸¸ÁˆÅ (Ctrl+Alt+Del) í¸½ ¸¸í½ Ÿ¸ÿ ˆºÅŽ ¢Ÿ¸›¸’ ˆ½Å ¢¥¸‡ íú ™»£ ¸¸…¿— 6. Ÿ¸ÿ ¡¸í ¬¸º¢›¸¢ä¸÷¸ ˆÅ²Å¿Š¸¸ ¢ˆÅ ¬¸ž¸ú ‚›¸ºœ¸¡¸¸½Š¸ú ‚¸¾£ ¤¸½ˆÅ¸£ ¢£ˆÅ¸”¸½ô, œ¸º£¸›¸½ ‚œÏ¡¸ºÆ÷¸ ¢œÏ¿’‚¸„’ ¤¸ÿˆÅ ˆÅú ›¸ú¢÷¸¡¸¸Ê ˆ½Å ‚›¸º¬¸¸£ „¢ ¸÷¸ ÷¸£úˆ½Å ¬¸½ ¢›¸œ¸’¸‡ ¸¸‡Â— 7. Ÿ¸ÿ ¬¨¸¡¸¿ ˆÅ¸½ í½¥œ¸”½¬ˆÅ, ˆÅ¸Á¥¸ ¬¸Ê’£ ‚¸¾£ ‚›¡¸ Ÿ¸í÷¨¸œ¸»µ¸Ä ¬¸¿œ¸ˆÄÅ ›¸¿¤¸£¸Ê ¬¸½ œ¸¢£¢ ¸÷¸ ¤¸›¸¸…¿Š¸¸. 8. Ÿ¸ÿ œ¸ú¬¸ú ‚›¸ºœÏ¡¸¸½Š¸ ¬¸½ ¬¸¿¤¸¿¦š¸÷¸ ¢ˆÅ¬¸ú ‹¸’›¸¸ / ¬¸Ÿ¸¬¡¸¸ ˆÅ¸ ž¸¢¨¸«¡¸ ˆ½Å ¬¸¿™ž¸Ä ˆ½Å ¢¥¸‡ ÷¸˜¸¸ ‚¸ƒÄ ‡¬¸ ¥¸½‰¸¸œ¸£ú®¸¸ „Ó½©¡¸ ˆ½Å ¢¥¸‡ ¢£ˆÅ¸”Ä £‰¸»¿Š¸¸— 9. ‚œ¸›¸½ Ÿ¸í÷¨¸œ¸»µ¸Ä ûŸƒ¥¸¸Ê ˆÅ¸ Ÿ¸ÿ ¢›¸¡¸¢Ÿ¸÷¸ ¤¸¾ˆÅ ‚œ¸ £‰¸»¿Š¸¸— 10. Ÿ¸ÿ ‚œ¸›¸½ ¤¸¾ˆÅ ˆÅú ¬¸º£®¸¸ ¨¡¸¨¸¬˜¸¸ ˆÅ¸½ ‚¢š¸ˆÅ ¬¸®¸Ÿ¸ ¤¸›¸¸›¸½ Ÿ¸Ê ‚œ¸›¸¸ ª½«“ ¡¸¸½Š¸™¸›¸ ™»¿Š¸¸/™»¿Š¸ú—

›¸íú¿ ˆÅ£ÊÀ 1. Ÿ¸ÿ ¤¸¸í£ú/‚¬¸¿¤¸Ö ¨¡¸¢Æ÷¸‚¸Ê ˆÅ¸½ ¢ˆÅ¬¸ú ž¸ú ¸¸›¸ˆÅ¸£ú ˆÅ¸ ‰¸º¥¸¸¬¸¸ ›¸íú¿ ˆÅ²Å¿Š¸¸/ ˆÅ²Å¿Š¸ú— 2. Ÿ¸ÿ ƒ¿’£›¸½’ ˆÅ¸ Š¸¥¸÷¸ „œ¸¡¸¸½Š¸ ›¸íú¿ ˆÅ²Å¿Š¸¸/ˆÅ²Å¿Š¸ú ‚¸¾£ ‚œ¸›¸½ ˆÅŸœ¡¸»’£ œ¸£ ‚›¸¢š¸ˆ¼Å÷¸/œ¸¸ƒÄ£½’½” ¬¸¸ÁÉ’¨¸½¡¸£, Š¸½Ÿ¸, ûŸƒÄ¥¸ ”¸„›¸¥¸¸½” ›¸íú¿ ˆÅ²Å¿Š¸¸/ˆÅ²Å¿Š¸ú— 3. ¸¤¸ Ÿ¸º ¸½ ˆÅ¸½ƒÄ ™½‰¸ £í¸ í¸½ ‚˜¸¨¸¸ Ÿ¸½£½ ‚¸¬¸-œ¸¸¬¸ í¸½, ÷¸¤¸ Ÿ¸ÿ œ¸¸¬¸¨¸”Ä/¢œ¸›¸ ’¸ƒÄœ¸ ›¸íú¿ ˆÅ²Å¿Š¸¸/ˆÅ²Å¿Š¸ú— 4. ¨¸¸¡¸£¬¸ ˆ½Å ¢¥¸‡ ¬ˆ¾Å›¸ ›¸íú¿ í¸½›¸½ ÷¸ˆÅ Ÿ¸ÿ ¬¸ú”ú, œ¸½›¸-”︃Ĩ¸ ‚˜¸¨¸¸ ‚›¡¸ ¤¸¸à¸ ¬’¸½£½ ¸ Ÿ¸ú¢”¡¸¸ ˆÅ¸ „œ¸¡¸¸½Š¸ ›¸íú¿ ˆÅ²Å¿Š¸¸/ˆÅ²Å¿Š¸ú— 5. ¢ˆÅ¬¸ú ž¸ú ‚¢œÏ¡¸ ‹¸’›¸¸ ¬¸½ Ÿ¸ÿ ‹¸¤¸£¸„¿Š¸¸/‹¸¤¸£¸„¿Š¸ú ›¸íú¿ ‚¸¾£ ‡½¬¸ú ¢ˆÅ¬¸ú œ¸¢£¦¬˜¸¢÷¸ Ÿ¸Ê ‚¸œ¸™¸ œÏ¤¸¿š¸›¸ ’úŸ¸ (¬¸ú‡Ÿ¸’ú) ˆÅ¸½ ÷¸÷ˆÅ¸¥¸ ¬¸»¢ ¸÷¸ ˆÅ²Å¿Š¸¸/ˆÅ²Å¿Š¸ú— 6. Ÿ¸ÿ ¢ˆÅ¬¸ú ‚›¡¸ ¬¸¸½¥¸-‚¸ƒÄ”ú/ˆÅŸœ¡¸»’£ ¬¸½ ›¸¾¨¸úŠ¸½’ ›¸íú¿ ˆÅ²Å¿Š¸¸/ˆÅ²Å¿Š¸ú— Ÿ¸º ¸½ ±¸¸÷¸ í¾ ¢ˆÅ Ÿ¸½£ú ¬¸¸£ú Š¸¢÷¸¢¨¸¢š¸¡¸¸Â ¢¬¸¬’Ÿ¸ ׸£¸ ¢£ˆÅ¸”Ä ˆÅú ¸¸ £íú íÿ— 7. Ÿ¸ÿ ‚œ¸›¸½ ¨¡¸¢Æ÷¸Š¸÷¸ ƒÄ-Ÿ¸½¥¸ ‚¸ƒÄ-”ú ׸£¸/œ¸£ ˆÅ¸¡¸¸Ä¥¸¡¸ú›¸ ¬¸¿œÏ½«¸µ¸ œÏ½¢«¸÷¸/œÏ¸œ÷¸ ›¸íú¿ ˆÅ²Å¿Š¸¸/ˆÅ²Å¿Š¸ú ‚¸¾£ ›¸¸ íú ˆÅ¸¡¸¸Ä¥¸¡¸ú›¸ ƒÄ-Ÿ¸½¥¸ ‚¸ƒÄ”ú ˆÅ¸ ¨¡¸¢Æ÷¸Š¸÷¸ ¬¸¿¬¸» ¸›¸¸ í½÷¸º „œ¸¡¸¸½Š¸ ˆÅ²Å¿Š¸¸/ˆÅ²Å¿Š¸ú— 8. Ÿ¸ÿ ‚±¸¸÷¸ ƒÄ-Ÿ¸½¥¸ 踸½÷¸¸Ê ¬¸½ œÏ¸œ÷¸ ¬¸¿¥¸Š›¸ˆÅ¸Ê ˆÅ¸ ¸¨¸¸¤¸ ›¸íú¿ ™»¿Š¸¸/™»¿Š¸ú ‚˜¸¨¸¸ „›íÊ ›¸íú¿ ‰¸¸½¥¸»¿Š¸¸/‰¸¸½¥¸»¿Š¸ú— 9. Ÿ¸ÿ ¢ˆÅ¬¸ú ž¸ú ¬¸¸½©¸¥¸ ›¸½’¨¸¢ˆôÅŠ¸ ¬¸¸ƒ’ œ¸£ ¤¸ÿˆÅ ˆ½Å ¢¨¸«¸¡¸ Ÿ¸Ê ˆÅ¸½ƒÄ ¸¸›¸ˆÅ¸£ú ‚˜¸¨¸¸ Ÿ¸½£½ Ÿ¸¿÷¸¨¡¸¸Ê ˆÅ¸ ‰¸º¥¸¸¬¸¸ ›¸íú¿ ˆÅ²Å¿Š¸¸/ˆÅ²Å¿Š¸ú— 10. Ÿ¸ÿ ¢ˆÅ¬¸ú ž¸ú ¬¸¿¢™Šš¸, ©¸¿ˆÅ¸¬œ¸™ ‚¸¾£ ¨¸¸¬÷¸¢¨¸ˆÅ ¬¸º£®¸¸ „¥¥¸¿‹¸›¸ ˆ½Å ¤¸¸£½ Ÿ¸Ê ‚œ¸›¸½ ¨¸¢£«“ ‚¢š¸ˆÅ¸¢£¡¸¸Ê ˆÅ¸½ ¤¸÷¸¸›¸½ Ÿ¸Ê ¬¸¿ˆÅ¸½ ¸ ›¸íú¿ ˆÅ²Å¿Š¸¸/ˆÅ²Å¿Š¸ú—


C O N T E N T S

(ž¸¸£÷¸ ¬¸£ˆÅ¸£ ˆÅ¸ „œ¸ÇÅŸ¸) ‚¿ˆÅ - ¢™¬¸¿¤¸£, 2014 ¤¸¾¿ˆÅ ‚¸Áœ¸ö€ ƒ¿¢”¡¸¸ ˆÅú ¢×ž¸¸«¸ú ¢÷¸Ÿ¸¸íú Š¸¼íœ¸¢°¸ˆÅ¸

(A Government of India Undertaking) Volume - December, 2014 A Quarterly Bilingual House Journal of Bank of India

08 13

In Conversation with Chief Information Security Officer S M Shakeel

¤¸ÿ¢ˆ¿ÅŠ¸ ’½Æ›¸¸½¥¸¸½ ¸ú, ¸ú¨¸›¸ ©¸¾¥¸ú ‡¨¸¿ ¸¸½¢‰¸Ÿ¸ œÏ¤¸¿š¸›¸ ‡¬¸ ‚¸£ Ÿ¸úµ¸¸

18 20

Protection of Personal Identity/ Information, Legal Provisions & Protections Team STC, Bhopal.

Cyber crimes / frauds awareness amongst staff & customers Team ITTC, Pune

44

E-banking Anytime, Anywhere and Anyhow Banking Sanjay Save

52

¬¸» ¸›¸¸ œÏ¸¾Ô¸¸¾¢Š¸ˆÅú ˆ½Å ¡¸ºŠ¸ Ÿ¸¿½ Æ¥¸ú›¸ ”½¬ˆÅ ˆÅ¸ Ÿ¸í÷¨¸ ’úŸ¸ ‡¬¸’ú¬¸ú, ›¸¸Á‡”¸

60

¬¸¸½©¸¥¸ Ÿ¸ú¢”¡¸¸ ˆ½Å Ÿ¸¸š¡¸Ÿ¸ ¬¸½ ¤¸ÿ¢ˆ¿ÅŠ¸ ¥¸¸ž¸ ‚¸¾£ í¸¢›¸¡¸¸¿ ¬¸ºªº÷¸ ¸¸¾š¸£ú

ABCI

¬¸¿œ¸¸™ˆÅú¡¸ Ÿ¸¿”¥¸ /Editorial Board ¤¸ú ¨¸ú „œ¸¸š¡¸½ ‚¸£ ¬¸ú ¤¸¢¥¸¡¸¸£¢¬¸¿í

‡¬¸ ‡Ÿ¸ ©¸ˆÅú¥¸

Ÿ¸í¸œÏ¤¸¿š¸ˆÅ B V Upadhye

¬¸¿œ¸¸™ˆÅ S M Shakeel

General Manager

Ÿ¸í¸œÏ¤¸¿š¸ˆÅ R C Baliarsingh General Manager

Editor


¬¸¿™½©¸

Message

‚š¡¸®¸ ‡¨¸¿ œÏ¤¸¿š¸ ¢›¸™½©¸ˆÅ Chairperson & Managing Director

¢œÏ¡¸ ¬¸¸¢˜¸¡¸¸Ê, ¸¾¬¸½- ¸¾¬¸½ ¢¨¸æ¸ ¢™›¸-œÏ¢÷¸¢™›¸ ‚¢š¸ˆÅ ¬¸½ ‚¢š¸ˆÅ ¢”¢ ¸’¸ƒ{¸ í¸½÷¸¸ ¸¸ £í¸ í¾ ¨¸¾¬¸½-¨¸¾¬¸½ ¨¡¸¸œ¸¸£ ˆ½Å ¤¸ú ¸ ‚¸œ¸¬¸ú ¬¸¿œ¸ˆÄÅ ¤¸ õ £í¸ í¾ ‚¸¾£ ¥¸¸½Š¸¸Ê ˆÅú ¸ú¨¸›¸©¸¾¥¸ú ¬¸¸ƒ¤¸£ ˆÅú ™º¢›¸¡¸¸ œ¸£ ¢›¸ž¸Ä£ í¸½÷¸ú ¸¸ £íú í¾— ¢¨¸©¸½«¸ˆÅ£, ¸½›¸-¨¸¸ƒÄ ׸£¸ ƒ¬¸ œÏ¸¾Ô¸¸½¢Š¸ˆÅú ˆÅ¸ ¤¸íº÷¸¸¡¸÷¸ Ÿ¸Ê œÏ¡¸¸½Š¸ ¢ˆÅ¡¸¸ ¸¸ £í¸ í¾ Æ¡¸¸Ê¢ˆÅ ¡¸í ¬¸½¨¸¸‡¿ ÷¸½ ¸ú ‚¸¾£ ¬¸£¥¸÷¸¸ ¬¸½ œÏ¸œ÷¸ ˆÅú ¸¸ ¬¸ˆÅ÷¸ú íÿ— ¬¸¸ƒ¤¸£ ˆÅú ™º¢›¸¡¸¸ ˆÅ¸ ¡¸¢™ ¬¸¸¨¸š¸¸›¸úœ¸»¨¸ÄˆÅ „œ¸¡¸¸½Š¸ ›¸ ¢ˆÅ¡¸¸ ¸¸‡ ÷¸¸½ ˆÅ¸ûÅú ‚¬¸º£¢®¸÷¸ ¸Š¸í í¾— ¸»¿¢ˆÅ ƒ›¸ˆÅú Š¸¢÷¸¢¨¸¢š¸¡¸¸Ê ˆÅ¸½ ™½‰¸¸ ›¸íú¿ ¸¸ ¬¸ˆÅ÷¸¸ í¾ ƒ¬¸¢¥¸‡ í£ ÷¸£ûÅ ¬¸½ ‰¸÷¸£¸ ¤¸›¸¸ £í÷¸¸ í¾— œÏ¸¾Ô¸¸½¢Š¸ˆÅú ˆÅ¸ ¨¡¸¸œ¸ˆÅ œÏ¡¸¸½Š¸ ‰¸÷¸£½ ˆ½Å ƒ¬¸ œ¸¢£´©¡¸ ˆÅ¸½ ‚¸¾£ ¤¸”õ¸ ™½÷¸¸ í¾ ‚¸¾£ ¬¸¸ƒ¤¸£ ‚œ¸£¸¢š¸¡¸¸Ê ˆÅ¸½ ƒ›¸ ˆÅŸ¸ ¸¸½¢£¡¸¸Ê ˆÅ¸ ¥¸¸ž¸ „“¸›¸½ ˆ½Å ‚¢š¸ˆÅ ‚¨¸¬¸£ ¢Ÿ¸¥¸ ¸¸÷¸½ íÿ— ‚÷¸À íŸ¸Ê ƒ¬¸¬¸½ ¬¸Ÿ¤¸Ö ¸¸½¢‰¸Ÿ¸¸Ê ˆÅ¸½ ¬¸Ÿ¸ ¸›¸½ ˆÅú ‚¸¨¸©¡¸ˆÅ÷¸¸ í¾ ‚›¡¸˜¸¸ ퟸ¸£ú œÏ¢÷¸«“¸ ˆÅú í¸¢›¸ ÷¸¸½ í¸½Š¸ú íú ¬¸¸˜¸ íú ¢¨¸î¸ú¡¸ í¸¢›¸ ž¸ú í¸½ ¬¸ˆÅ÷¸ú í¾ ‚¸¾£ ŠÏ¸íˆÅ ˆÅ¸ ¢¨¸æ¸¸¬¸ ‰¸¸½›¸½ ‚¸¾£ ¢¨¸›¸¸¡¸Ÿ¸ˆÅ¸Ê ˆ½Å £¸½«¸ ˆÅ¸ ¬¸¸Ÿ¸›¸¸ ž¸ú ˆÅ£›¸¸ œ¸”õ ¬¸ˆÅ÷¸¸ í¾¿— ¡¸Ô¸¢œ¸ ퟸ í£ ¬¸¿ž¸¨¸ œÏ¸¾Ô¸¸½¢Š¸ˆÅú ¢›¸¡¸¿°¸µ¸ £‰¸›¸½ ˆÅ¸ œÏ¡¸¸¬¸ ˆÅ£÷¸½ íÿ ÷¸˜¸¸¢œ¸ œÏ¸¾Ô¸¸½¢Š¸ˆÅú ¸¸›¸ˆÅ¸£úíú›¸ œÏ¡¸¸½Æ÷¸¸ ˆ½Å ¨¡¸¨¸í¸£ ˆÅ¸ ¢¨¸ˆÅ¥œ¸ ›¸íú¿ ¤¸›¸ ¬¸ˆÅ÷¸ú— œÏ¸¾Ô¸¸½¢Š¸ˆÅú ˆ½Å œÏ¡¸¸½Š¸ Ÿ¸Ê ‚¿¢÷¸Ÿ¸ œÏ¡¸¸½Æ÷¸¸ ˆÅú ¸¸Š¸³ÅˆÅ÷¸¸ ‚¸¾£ ‰¸÷¸£½ ˆÅ¸ œ¸÷¸¸ ¥¸Š¸¸›¸½ ˆÅ¸ ¬¸¸Ÿ¸˜¡¸Ä, ¬¸» ¸›¸¸ ¬¸º£®¸¸ ‹¸’›¸¸‚¸Ê ˆÅ¸½ ˆÅŸ¸ ˆÅ£›¸½ Ÿ¸Ê ˆÅ¸ûÅú ¬¸í¸¡¸ˆÅ í¸½÷¸¸ í¾— ‚÷¸À ‡ˆÅ œÏž¸¸¨¸ú ¬¸º£®¸¸ ˆÅ¸¡¸ÄÇÅŸ¸ Ÿ¸Ê œÏ¡¸¸½Æ÷¸¸ ˆÅú ¸¸Š¸³ ˆÅ÷¸¸ ‡ˆÅ Ÿ¸í÷¨¸œ¸»µ¸Ä ÷¸÷¨¸ í¾— Ÿ¸º ¸½ ¤¸íº÷¸ ‰¸º©¸ú í¾ ¢ˆÅ ¬¸¸ƒ¤¸£ ¬¸º£®¸¸ ˆÅú Ÿ¸í œ¸£ ¬’¸ûÅ ¬¸™¬¡¸¸Ê ˆÅ¸½ ¸¸›¸ˆÅ¸£ú ™½›¸½ ‚¸¾£ ¬¸ºŠÏ¸íú ¤¸›¸¸›¸½ ˆ½Å ¢¥¸‡ ퟸ ¨¡¸¸¨¸í¸¢£ˆÅ „œ¸¸¡¸ ‚œ¸›¸¸ £í½ íÿ— `¬¸» ¸›¸¸ ¬¸º£®¸¸ ¸¸Š¸³ÅˆÅ÷¸¸ ¢™¨¸¬¸' ˆÅ¸ ‚¸¡¸¸½ ¸›¸ ƒ¬¸ ¢™©¸¸ Ÿ¸Ê ¬¨¸¸Š¸÷¸¡¸¸½Š¡¸ ˆÅ™Ÿ¸ í¾— Ÿ¸º ¸½ ‚÷¡¸¿÷¸ œÏ¬¸››¸÷¸¸ í¾ ¢ˆÅ ퟸ¸£ú Š¸¼íœ¸¢°¸ˆÅ¸ `÷¸¸£¸¿Š¸µ¸' ˆÅ¸ ¡¸í ‚¿ˆÅ ¬¸¸ƒ¤¸£ ¬¸º£®¸¸ ¸¸Š¸³ÅˆÅ÷¸¸ œ¸£ ¢¨¸©¸½«¸¸¿ˆÅ ˆ½Å ³œ¸ Ÿ¸Ê œÏˆÅ¸¢©¸÷¸ ¢ˆÅ¡¸¸ Š¸¡¸¸ í¾— Ÿ¸º ¸½ ‚¸©¸¸ í¾ ¢ˆÅ ¬¸» ¸›¸¸ ¬¸º£®¸¸ ¸¸Š¸³ÅˆÅ÷¸¸ ¢™¨¸¬¸ ˆ½Å ™¸¾£¸›¸ ‚¸¡¸¸½¢ ¸÷¸ ˆÅú Š¸ƒÄ Š¸¢÷¸¢¨¸¢š¸¡¸¸Ê ˆ½Å Ÿ¸¸š¡¸Ÿ¸ ¬¸½ ‚¿¢÷¸Ÿ¸ „œ¸¡¸¸½Æ÷¸¸ ˆ½Å ³Åœ¸ Ÿ¸½¿ ¬¸Ÿ¸¬÷¸ ¬’¸ûÅ ¬¸™¬¡¸ ¬¸¸ƒ¤¸£ ¬¸º£®¸¸ ˆ½Å ¢¨¸¢ž¸››¸ œ¸®¸¸Ê ˆ½Å ¤¸¸£½ Ÿ¸Ê ¸¸Š¸³ÅˆÅ ¤¸›¸½ í¸ÊŠ¸½ ¢ ¸¬¸¬¸½ œÏ¸¾Ô¸¸½¢Š¸ˆÅú ˆÅ¸ „ ¸÷¸Ÿ¸ œÏ¡¸¸½Š¸ ˆÅ£÷¸½ íº‡ ퟸ ‚œ¸›¸½ ˆÅ¸£¸½¤¸¸£ ¬¸½ ¬¸¿¤¸¿¢š¸÷¸ ¬¸ž¸ú ¢í÷¸ š¸¸£ˆÅ¸½Ê ˆ½Å ¢í÷¸¸½ ˆÅú £®¸¸ ÷¸¸½ ˆÅ£ÊŠ¸½ íú ¬¸¸˜¸ íú ƒ¬¸¬¸½ ퟸ¸£½ ¬¸¿Š¸“›¸ Ÿ¸Ê ¬¸º£®¸¸ ¬¸¿¬ˆ¼Å¢÷¸ ˆÅ¸½ ¤¸ õ¸¨¸¸ ¢Ÿ¸¥¸½Š¸¸— ›¸¨¸¨¸«¸Ä 2015 ˆÅú Ÿ¸¿Š¸¥¸ˆÅ¸Ÿ¸›¸¸‚¸½¿ ¬¸¢í÷¸—

(¨¸ú ‚¸£ ‚¡¡¸£) 2

leejebieCe

efomebyej 2014

Dear Colleagues, As the world becomes more and more digitized day by day, businesses get interconnected and people’s lifestyle becomes dependent on the cyber world. Particularly, there is an unbridled use of technology by Gen Y due to easy and fast access to services. Cyber world is not a safe place unless used in a prudent manner. As the activities are invisible, so are the threats lurking at every corner. Pervasive use of technology widens the threat landscape and cyber criminals find a larger playing field to exploit vulnerabilities. Therefore, we need to understand the risks associated with it failing which we are susceptible to reputational loss, financial loss apart from losing the trust of our patrons and incurring the wrath of the regulators. Although we strive to have all possible technology controls in place, yet technology cannot provide a substitute for the uninformed user behaviour. Enduser awareness on use of technology and the ability to detect threats contribute a lot to reduce the information security incidents. Therefore, user awareness is an integral component of an effective security program. I am very happy to see that we are taking practical measures to educate and sensitize staff members on the importance of Cyber Security. The observance of the “Information Security Awareness Day’’ is a welcome step in this direction. I am also delighted that our House Journal ‘Taarangan’ is bringing out this special edition devoted to Cyber Security Awareness. I hope, the various activities organized on Information Security Awareness Day will help staff members to become aware of different aspect of cyber-security from an end-user view-point, protect the interests of all stakeholders related to our business and promote a security culture in our organization. With Best wishes for Happy & Prosperous New Year 2015.

(V R Iyer) (V R Iyer)


¬¸¿œ¸¸™ˆÅú¡¸ EDITORIAL

¢œÏ¡¸ œ¸¸“ˆÅ¸Ê, ퟸ ¢”¢ ¸’¥¸ ™º¢›¸¡¸¸ Ÿ¸Ê £í £í½ íÿ ‚¸¾£ ‚¢š¸ˆÅ¸¢š¸ˆÅ ƒ¬¸ ™º¢›¸¡¸¸ ˆÅú ‚¸½£ ‚ŠÏ¬¸£ í¸½ £í½ íÿ— ‚ˆ½Å¥¸½ ¢œ¸Ž¥¸½ ™©¸ˆÅ Ÿ¸Ê íú, œÏ¸¾Ô¸¸½¢Š¸ˆÅú ˆ½Å ®¸½°¸ Ÿ¸Ê ‚ž¸»÷¸œ¸»¨¸Ä œ¸¢£¨¸÷¸Ä›¸ íº‡ íÿ ¢ ¸›¸ˆÅú œ¸í¥¸½ ˆÅ¥œ¸›¸¸ ž¸ú ›¸íú¿ ˆÅú ¸¸ ¬¸ˆÅ÷¸ú ˜¸ú— ‚¤¸, ퟸ ¡¸í ˆÅí ¬¸ˆÅ÷¸½ íÿ ¢ˆÅ, "¡¸í ¢¨¸æ¸ ‡ˆÅ ¨¸¾¢æ¸ˆÅ Š¸¸¿¨¸ í¾ ¸¸½ œÏ¸¾Ô¸¸½¢Š¸ˆÅú ¬¸½ ¸º”õ¸ íº‚¸ í¾''— ¤¸ÿ¢ˆ¿ÅŠ¸ ®¸½°¸ ž¸ú ‚œ¸›¸½ ¬¸¿ ¸¸¥¸›¸ Ÿ¸Ê ÷¸½ ¸ú ¬¸½ „››¸÷¸ í¸½ £íú œÏ¸¾Ô¸¸½¢Š¸ˆÅ ˆÅ¸ Š¸¨¸¸í ¤¸›¸ £í¸ í¾ ‚¸¾£ ¢”¢ ¸’¥¸úˆÅ£µ¸ ˆÅú ƒ¬¸ œÏ¢ÇÅ¡¸¸ ˆ½Å ¬¸¸˜¸ ÷¸¸¥¸Ÿ¸½¥¸ ¢¤¸“¸›¸½ ˆÅ¸ œÏ¡¸¸¬¸ ˆÅ£ £í¸ í¾— ퟸ¸£¸ ¤¸ÿˆÅ ž¸ú ˆÅ¸£¸½¤¸¸£ ˆ½Å ¢¨¸ˆÅ¸¬¸ ˆ½Å ¢¥¸‡ ‚¸¨¸©¡¸ˆÅ ›¸ƒÄ „››¸÷¸ œÏ¸¾Ô¸¸½¢Š¸ˆÅú ˆÅ¸½ ‚œ¸›¸¸ £í¸ í¾— ¬¸¸˜¸ íú, ‚œ¸›¸½ ¬’¸ûÅ ˆÅ¸½ ÷¸ˆÅ›¸úˆÅ ³Åœ¸ ¬¸½ ‚¢š¸ˆÅ ™®¸ ¤¸›¸¸›¸½ í½÷¸º ¸¸Š¸³ÅˆÅ ˆÅ£ £í¸ í¾ ÷¸¸¢ˆÅ ¤¸ÿˆÅ ¢¨¸æ¸ž¸£ Ÿ¸Ê ‚œ¸›¸½ ŠÏ¸íˆÅ¸Ê ˆ½Å ¢¥¸‡ „ ¸ ÷¸ˆÅ›¸úˆÅú ¬¸½¨¸¸‡¿ œÏ™¸›¸ ˆÅ£ ¬¸ˆ½Å— ퟸ ¬¸ž¸ú ¸¸›¸÷¸½ íÿ ¢ˆÅ œÏ÷¡¸½ˆÅ ›¸ƒÄ ‚¨¸š¸¸£µ¸¸ ˆ½Å ‚œ¸›¸½ Š¸ºµ¸ ‚¸¾£ ‚¨¸Š¸ºµ¸ í¸½÷¸½ íÿ ‚¸¾£ ¬¸» ¸›¸¸ œÏ¸¾Ô¸¸½¢Š¸ˆÅú ˆÅ¸ ®¸½°¸ ž¸ú ˆÅ¸½ƒÄ ‚œ¸¨¸¸™ ›¸íú¿ í¾— ‚÷¸À ¡¸í ‚¸¨¸©¡¸ˆÅ í¾ ¢ˆÅ ퟸ ¬¸ž¸ú (ˆÅŸ¸Ä ¸¸£ú ¡¸¸ ŠÏ¸íˆÅ) ¬¸» ¸›¸¸ ¬¸º£®¸¸ ‰¸÷¸£¸Ê ˆ½Å ¤¸¸£½ Ÿ¸Ê ¸¸Š¸³ˆÅ £íÊ— ‡ˆÅ ¢ ¸ŸŸ¸½™¸£ ˆÅŸ¸Ä ¸¸£ú ¡¸¸ ŠÏ¸íˆÅ ˆ½Å ³ œ¸ Ÿ¸Ê, ퟸ ¬¸ž¸ú ˆÅ¸½ ¬¸º£®¸¸ „œ¸¸¡¸¸Ê ˆÅ¸½ ¬¸ú‰¸ˆÅ£ ‚¸¾£ „›íÊ ‚œ¸›¸¸ˆÅ£ ‰¸º™ ˆÅ¸½ ‚Ô¸÷¸›¸ £‰¸›¸¸ í¸½Š¸¸— ü½Å” ¥¸¿Š¸¸ ›¸½ ˆÅí¸ í¾À " ¸¾¬¸½ ‚Š¸£ ¸¸¥¸ˆÅ ¬¸”õˆÅ œ¸£ ¸¥¸÷¸½ í¾¿ ÷¸¸½ „›í¿½ ¬¸º£®¸¸ ˆ½Å ¢¥¸‡ ž¸ú ¢ ¸ŸŸ¸½™¸£ú „“¸›¸ú í¸½Š¸ú, ‚¤¸ ퟸ ¬¸ž¸ú ‡ˆÅ íú ¨¸¾¢æ¸ˆÅ ›¸½’¨¸ˆÄÅ ˆÅ¸ ¢í¬¬¸¸ íÿ ‚÷¸À ¬¸» ¸›¸¸ ¬¸º£®¸¸ ˆÅ¸½ íŸ¸Ê ¬¸¸Ÿ¸¸¢ ¸ˆÅ ¢ ¸ŸŸ¸½™¸£ú ˆ½Å ³ œ¸ Ÿ¸Ê ¬¸Ÿ¸ ¸›¸¸ í¸½Š¸¸— Ÿ¸½£½ ¢¥¸‡, ¡¸¢™ ˆÅ¸½ƒÄ ¬¸¸Ÿ¸¸›¡¸ ¬¸º£®¸¸ ¬¸¸¨¸š¸¸›¸ú ¥¸½›¸½ ˆ½Å ¢¥¸‡ ÷¸¾¡¸¸£ ›¸íú¿ í¾, ¨¸í ¬¸¤¸¬¸½ ¤¸”õú, ‚¸¾£ ¬¸Ÿ¸¬¡¸¸ ˆÅ¸ ‡ˆÅ œÏŸ¸º‰¸ ˆÅ¸£µ¸ í¾— ƒ¬¸ ÷¸½ ¸ú ¬¸½ ¢¨¸ˆÅ¢¬¸÷¸ í¸½÷¸ú ¢” ¸ú’¥¸ ™º¢›¸¡¸¸ Ÿ¸Ê ¬¸» ¸›¸¸ ¬¸º£®¸¸ ˆ½Å Ÿ¸í÷¨¸ ˆÅ¸½ š¡¸¸›¸ Ÿ¸Ê £‰¸÷¸½ íº‡, ퟸ›¸½ ¬¸» ¸›¸¸ ¬¸º£®¸¸ ¢¨¸«¸¡¸ œ¸£ œ¸»£ú ÷¸£í ¬¸½ ¬¸Ÿ¸¢œ¸Ä÷¸ ¢¨¸©¸½«¸ ¬¸¿¬ˆÅ£µ¸ œÏˆÅ¸¢©¸÷¸ ˆÅ£›¸½ ˆÅ¸ ¢¨¸ ¸¸£ ¢ˆÅ¡¸¸— íŸ¸Ê ‚œ¸›¸½ ¬¸ºš¸ú œ¸¸“ˆÅ¸Ê ˆÅ¸½ ¡¸í ¢¨¸©¸½«¸ ¬¸¿¬ˆÅ£µ¸ ¬¸¸ÿœ¸÷¸½ íº‡ ‚œ¸¸£ œÏ¬¸››¸÷¸¸ í¸½ £íú í¾— ퟸ½ ‚¸©¸¸ í¾ ¢ˆÅ ¡¸í ‚¿ˆÅ ‚¸œ¸ˆÅ¸½ ³Å ¸úˆÅ£ ¥¸Š¸½Š¸¸— ퟸ ˆÅ¸Ÿ¸›¸¸ ˆÅ£÷¸½ íÿ ¢ˆÅ ›¸¨¸¨¸«¸Ä 2015 ‚¸œ¸ˆ½Å ¸ú¨¸›¸ Ÿ¸Ê ©¸¸¿¢÷¸ ‚¸¾£ „Ÿ¸¿Š¸ ¥¸½ˆÅ£ ‚¸‡— ‚Š¸¥¸½ ‚¿ˆÅ ÷¸ˆÅ, ퟸ¬¸½ ¬¸¿œ¸ˆÄÅ Ÿ¸Ê £íÊ—

HeadOffice.Taarangan@bankofindia.co.in

œ¸£

Dear Colleagues, We are living and heading towards more and more digitized world. In the last decade alone, there have been mind-boggling changes in technology, which could not have been imagined earlier. Now, we can say, “the world is global village inter connected by technology”. Banking sector is also witnessing rapid technology advancement in its operations and is trying to keep pace with this digitization process. Our Bank is adopting each new technology advancement required for the growth of the business. Apart, is sensitizing staff members to make them to be more tech savvy in order to provide best of tech services to its customers across globe. We are also aware that every innovation has its pros and cons; information technology is no exception. It is therefore, necessary that each one of us (staff or customer) must remain vigilant on information security threats. As a responsible staff or customer, we must keep ourselves updated by learning and adopting all information security measures. Fred Langa has said: “Just as drivers who share the road must also share responsibility for safety, we all now share the same global network, and thus must regard information security as a necessary social responsibility. To me, anyone unwilling to take simple security precautions is a major, active part of the problem. — Fred Langa Keeping in view the importance of information security in this fast growing digitized world, we came up with the idea of publishing fully dedicated edition on “Information Security”. We are happy to hand over this special edition to all our learned readers. Hope you find the edition interesting. We convey wishes for peaceful and joyous New Year 2015. Till next edition, stay connected with us at headoffice.Taarangan@bankofindia.co.in

(¬¸£·¸¸ ¸ Ÿ¸ø­­íŸŸ¸™ ©¸ˆ ú¥¸ Sartaj Mohd. Shakeel)

Taarangan

December 2014

3


í¸¢™ÄˆÅ ‚¢ž¸›¸¿™›¸ / Hearty Welcome...

Shri Ravindra Prabhakar Marathe Executive Director

Shri Ravindra Prabhakar Marathe has joined as an Executive Director in our Bank on 10.03.2015. He holds Masters Degree in Economics (Gold Medal) from M S University of Baroda (1980). He joined Bank of Baroda as Planning Officer in 1982 and acquired CAIIB and Dip in Treasury, Investment & Risk Management (IIBF) qualifications besides a Certificate in Computer Applications. In September 2010 he was elevated as General Manager and steered Planning & Data Warehouse function at Bank’s Corporate Office till May 2013. During 2013-14 he headed the Karnataka, Telangana & AP Zone. Since September 2014, he is Chief General Manager heading the Estate Management, Security and Office Administration function at Corporate Office, Mumbai Over the past 33 years, he mostly worked in Corporate Planning Division having wide exposure to Strategic Planning, Performance Budgeting, Economic Research, MIS, Environmental Scanning and Data Warehouse functions. He also worked at exceptionally large branches having exposure to Corporate Credit and Trade Finance for over six years on Core Banking platform from 2002 to 2008.

Welcome : New General Managers

Hearty Congratulations !

Shri Varadachari Kumar

Shri Charan Singh Elevated as Executive Director UCO Bank Shri S Palanivel

Shri Nageswara Rao Varanasi

Shri Pawan Bajaj Elevated as Executive Director Indian Overseas Bank

BOI Parivar wishes both of them a very successful career ahead...

Retired General Managers Narsimhan Swaminathan • Shiv Kumar Sareen • Deepak Bhayana We wish them a very happy & healthy Retired life

4

leejebieCe

efomebyej 2014


‰¸¸¬¸-‰¸¸¬¸ / Khas-Khas

CMD Smt. V R Iyer receiving the in-principle approval for opening a branch at Ho Chi Minh City (Vietnam) from the Governor of State Bank of Vietnam, Mr. Nguyen Van Binh in the presence of Hon’ble Prime Ministers of India and Vietnam at a function held in New Delhi.

ž¸º¨¸›¸½æ¸£ ‚¿ ¸¥¸ ˆÅú ©¸¸¬°¸ú ›¸Š¸£ ©¸¸‰¸¸ Ÿ¸Ê 'ƒÄ-Š¸¾¥¸£ú' ˆÅ¸ „™Ã‹¸¸’›¸ ˆÅ£÷¸ú íºƒô ¬¸ú‡Ÿ¸”ú ªúŸ¸÷¸ú ¨¸ú ‚¸£ ‚¡¡¸£— ¬¸¸˜¸ Ÿ¸Ê Ÿ¸.œÏ. ‡›¸¤¸ú ¸ú (œ¸»¨¸Ä) ªú ‚¢›¸¥¸ ž¸¥¥¸¸, ‚¸¿.œÏ. ªú ‡¬¸ ¬¸ú «¸£¿Š¸ú, „œ¸ ‚¸¿.œÏ. ªú ‡¥¸ ˆ½Å ¬¸½“ú—

(L-R) GM & CFO Shri Anant Upadhyay, ED Shri Arun Shrivastava, CMD Smt. V R Iyer ED Shri B P Sharma, & the then ED Shri R Koteeswaran during press and analyst meet held at Head Office.

Bank signed MOU with Maruti Suzuki India Ltd. for providing Channel Finance Facility. GM Shri N K Sood and VP (Sales) Maruti Suzuki Shri Tarun Garg exchanging MOU in the presence of CMD Smt. V R Iyer and EDs Shri B P Sharma, Shri Arun Shrivastava & the then ED Shri R Koteeswaran and Head (Mar. Fin.) Shri Vikas Kohli.

Bank signed MOU with RML Information Services Pvt Ltd, Mumbai for providing Agri Business information service known as ‘Krishidoot’ to our farmer customers in the august presence of our ED Shri B P Sharma at Head Office. (R-L) Manager RML Shri Sushant B, GM, BU-Rural Shri S Palanivel, ED Shri B P Sharma, VP, RML Shri Vijay Iyer, and CM, BU-Rural Shri D R Gokhale.

¨¸¸£¸µ¸¬¸ú ‚¿ ¸¥¸ ‚¸Š¸Ÿ¸›¸ ˆ½Å ™¸¾£¸›¸ ‚¸¡¸¸½¢ ¸÷¸ ¬’¸ûÅ ¤¸¾“ˆÅ Ÿ¸Ê ¬¸ú‡Ÿ¸”ú ªú ¨¸ú ‚¸£ ‚¡¡¸£, Ÿ¸º.Ÿ¸.œÏ. ‡›¸¤¸ú ¸ú („.) ªú œ¸¨¸›¸ ¤¸ ¸¸ ¸, ‚¸¿.œÏ. ªú ‚¢Ÿ¸÷¸¸ž¸ £¬÷¸¸½Š¸ú ‡¨¸¿ „œ¸ ‚¸¿.œÏ. ªú ›¸¨¸ú›¸ ¸¿Í ”¸ž¸ú—

(R to L) ED Shri Arun Srivastava, CMD Smt. V R Iyer, ED Shri B P Sharma and GM(ITeS) Shri V Vishwanathan at the release of Booklet on "Alternate Delivery Channels" at Head Office.

ED Shri B P Sharma along with participant DGMs and AGMs of training programme conducted at ASCI, Hyderabad.

Taarangan

December 2014

5


œ¸º£¬ˆÅ¸£ /Awards

‘TAARANGAN’

CONFERRED WITH 3RD PRIZE BY RESERVE BANK OF INDIA (L to R) GM (HR) Shri Charan Singh, CMD Smt. V R Iyer, Governer (RBI) Shri Raghuram Rajan, Editor Shri S M Shakeel, Deputy Governer (RBI) Shri S S Mundra & Executive Director (RBI) Shri K K Vohra at the award function held at Central Building, RBI, Mumbai.

‘TAARANGAN’ & CORPORATE KNOWLEDGE MAGAZINE ‘BOI GUIDING STAR’ CONFERRED WITH PRSI NATIONAL AWARDS 2014 (2ND PRIZE) by Public Relations Society of India (PRSI)

(R to L) DGM (HR) Smt. K R Srimathi, CMD, Smt. V R Iyer, GM (HR) Shri Charan Singh, & Editor Shri S M Shakeel at Head Office.

Runners-up to BOI for Best MSME Bank-Large and Best Bank for operational performance. Hon’ble Union Minister for MSME Shri Kalraj Mishra giving award to CGM, NBG (N) Shri Pawan Bajaj and DGM Shri A N Sastry at New Delhi.

6

leejebieCe

efomebyej 2014

(R to L) Editor Shri S M Shakeel, General Manager, NBG (Central) Shri T Sudhakar, Hon’ble Speaker, Rajasthan Vidhan Sabha Shri Kailash Meghwal & President PRSI Shri Ajit Pathak at Jaipur on 19th December 2014.

Bank was awarded with ‘Top Performer Award’ by NSDL. GM NBG (W) Shri Tarlochan Singh, ZM Shri D K Garg received the Award from MD & CEO NSDL Shri G V Nageswara Rao.


Executive's Word ...

¬¸» ¸›¸¸ ¬¸º£®¸¸ ¸¸Š¸²ÅˆÅ÷¸¸ / Information Security Awareness

Shri B P Sharma

Shri Arun Shrivastava

he complexities and capabilities of information technology are on the rise continuously. Survival in the business depends on the appropriate use of technology and avoidance of technology risks associated with it. Our IT systems is a big mosaic of myriad servers, applications, delivery channels, technology professionals serving to clients at various geographical locations. Technology has its own pitfalls when its capabilities are exploited by cyber criminals to serve their nefarious activities.

lmost every other day we come across news items where a new vulnerability is found out in the cyber world or there has been a data breach in some organization culminating in important private and financial information landing with criminals ready to use it for furthering their own interests or funding terrorism. The crown jewel is data, which is protected by various layers of security measures adopted by the enterprises. To get to the data, either the criminal has to find gaps in the security layers or exploit the ignorance of the clients entrusted with using the data or the security measures. Very often, the gullible clients’ actions or behavior contribute substantially for the cyber - crime to happen. Threat canvass grows wider as multitude of delivery channels crop up for servicing clients at different levels of society. Data Security, which stands for data confidentiality, data accuracy and data availability is critical for successful business operation, else fraudsters may misuse it for their own financial gains resulting into substantial financial and reputational loss to the Bank. The data and the related processes to access data are handled by our employees, service providers and customers. A reasonable knowledge as to the safe practices of handling the data would go a long way in protecting the interest of the bank and the customers.

T

Executive Director

As technology begets technology, there is always a limit to minimize technology risks through technology. The important point is how to use technology in a safe and secured manner to extract services without being hurt. Data is at the center of protection. Cyber Security is not just a simple matter of having user names and passwords. Regulators and industry practices guide us about the security measures adopted in harnessing technology. However, the safe user behavior is something that has to be learnt basing on sound knowledge. Educating ourselves about basic Data security hygiene and practicing it in our day to day operation is something which will go a long way in setting up effective “Cyber Security Framework” in the Bank.

A

Executive Director

Shri B V Upadhye

T

GM (Risk Management)

echnology has made the world easier and safer to live by uniting people, culture, spurring growth and sharing the wealth by demolishing knowledge barriers. As the reach of technology embraces various important sectors to add values to the life and create wealth, cyber-criminals develop ways and means to exploit the vulnerabilities and share a part of it at the cost of the interest of the legitimate owners. Worldwide, cyber-crimes have become a multi-billion dollar business over a short span of time. While some of the cyber- crimes are perpetrated by exploiting the vulnerabilities at the technology level, most common attack vectors make use of ignorance, carelessness and laid-back attitude of the users which contributes to the unsafe work culture and unacceptable security practices. The basic approach to ward off security breaches leading to financial loss is to adopt a secure technology practice regime based on right information and sensible advice. By being aware of the safe security practices, technology risks can be significantly reduced and the benefit of technology can be assimilated to make life better. Security is a shared responsibility. The main aim behind “Information Security Day” is to inculcate knowledge and proper understanding of good security practices which is first logical step towards the win of the good over the evil. I beseech all of you to follow the security guidelines that an end-user needs to follow to avoid falling prey to such cyber­criminals at a personal level and protect the data at the corporate level. "Each Surity, Teach Security" - Madhuri T. Joshi, Rajkot

Taarangan

December 2014

7


¬¸¸®¸¸÷ˆÅ¸£ /INTERVIEW

In Conversation with Chief Information Security Officer

S

hri Kamlesh Sevak is our Bank’s Chief Information Security Officer (CISO). He has undertaken many new initiatives to educate and spread awareness amongst staff members on importance and need of information security in the bank. Recently, Information Security Day, 2014 was successfully organized in the bank by InfoSec Cell. We talked to Shri Kamlesh Sevak, CISO of our bank on this important subject. Here are the excerpts: Firstly, congratulations for organizing IS Awareness Day, 2014 successfully in the bank. Sir, apart from IS Awareness Day, what efforts are being initiated in our bank to educate and create information security awareness amongst employees? Thank you very much. We have taken many initiatives in the bank towards information security. The major initiatives includes booklet “Any Body Can Do – Information Security” (ABCD on IS), leaflets for customers, Sessions, Films, Workshops, Interaction (including through VCs). The online Quiz on IS for all staff members was a real success. Staff members of the bank including foreign branches participated enthusiastically in the Quiz. Every month, we are publishing InfoSec Awareness Bulletin “Literacy, Learning & Lesson” (LLL). We are maintaining and updating “Information Security Portal” on Intranet staff portal “StarDESK”. In addition, we are publishing small flash messages, Pop-Ups on our website and on Finacle Nodes, Circulating Advisories on critical vulnerabilities to asset owners for mitigation. In addition, five e-Learning modules are under development and e-Mailers are being sent to branches and staff members through MMS. Everyday, we are coming across many new information security threats. How are you updating Top Management on these threats? Secondly, what are our strategies to combat such threats in our bank? Our bank has clearly defined Corporate Information Security Policy (CISP), duly approved by Board which is followed by all. Our InfoSec team is monitoring information security attempts, incidents and events at “Security Operation Center” (SOC) on real time basis - 365 x 24*7. We have implemented suitable monitoring solutions at centralised / strategic locations for Malware Monitoring, Anti-Phishing Services, Wireless Intrusion Prevention System (WIPS), Database Activity Monitoring (DAM) and Security Incident and Event Management (SIEM) to take care of emerging threats. We

8

leejebieCe

efomebyej 2014

carry out Vulnerability Assessment (VA) to find out the vulnerabilities of the system along with the Penetration Testing (PT) that involves an active analysis of the system for any potential vulnerability that could result from poor or improper system configuration, both known and unknown Shri Kamlesh Sevak hardware or software issues. CISO Our Bank is PCI DSS Ver. 2.0 certified. “Payment Card Industry Data Security Standards” (PCI DSS) is the standard created to increase controls around cardholder data to reduce card related fraud. The Bank is ISO 22301 Business Continuity Management, certified for the Data Centre and the Treasury Branch. We are updating Top Management through various Meetings like Information Security Strategy Committee (ISSC), Information Security Implementation Committee (ISIC) etc. periodically and also to the Regulatory Authority/ies. Information security is a vast subject and we have covered all-important aspects on information security in this special edition of ‘Taarangan’. Apart, what would you like to convey to all our staff members / readers on this crucial and important subject. Major concerns are already covered in this special issue of “Taarangan”, however, some of the key precautionary measures are that all staff members at all branches and Offices are required to follow CISP, Procedures, instructions and guidelines issued from time to time. Branches must use separate computer for internet with due precautions. Do not use computers connected to intranet. Always disable Wi-Fi at the branches / Offices. Zonal Offices/Administrative Offices should use Internet through LAN / Proxy Server. Use of MMS with due care. Do not open / click unknown emails or URLs. All users MUST use CTRL+ALT+DEL while leaving their desk even for short time / period. Finacle user MUST use biometrics authentication for preventing misuse of infrastructure / resources / information. Data privacy / secrecy is to be maintained at all levels. Data Leakage from any source is of utmost concern. Identity related personal information should not be shared at all. Ordinary Email is


never a reliable medium for exchanging authentic information or undertaking financial transactions. What will be the impact on InfoSec by the “Digital India” initiative taken by the present Government? It is a “Digital Revolution”. No sector is left out. Majority of the Banking transactions and activities will be through increasing usage of advanced technological gadgets, devices and communication channels. Due to this, entire world has become “One Global Village”, hence, now no infrastructure is isolated or immune from any security threat. Therefore, information security is to be considered holistically. Government has also initiated required steps and identified “Banking Sector” as a “Critical Information Infrastructure” (CII) together with other national CII Sectors. CISOs from all Banks are being informed through critical threat advisories by National Critical Information Infrastructure Protection Centre (NCIIPC) on existing and emerging threats and vulnerabilities prone to exploitation. We have to be ready with all possible proactive steps to detect and prevent security threats. “Cyber Threats” are not only in computer domain but also has much larger scope with increased complexity. With

this, our role and functions have become more critical. We can play our role effectively with collective responsibility at all levels. We have to remain more vigilant and strengthen our controls and monitoring process on a continuous basis. What are the security concerns in banking due to increasing usage of e-commerce and Social Media? In current era of e-commerce, Social Media is easier route to reach out masses in particular IT savvy youths in shortest possible time. However, Social Media may prove a doubleedged sword, if not handled properly. We need to have efficient and effective Monitoring and Management of Identity, Contents, Social Bullying, Intellectual Property and Copyright, Interactions, Data Privacy, Time and Training Inputs. Adequate controls over Third Party - Outsourced Agencies to prevent confidential data leakage is essential. Your advice to our Readers Be aware – Be Secured Interviewed by Shri S M Shakeel, Editor

¬¸» ¸›¸¸ ¬¸º£®¸¸ ¢™¨¸¬¸/ Information Security DAY

Head Office

ISO 22301 Training at MDI, Belapur

STC Bhopal

£¸¿ ¸ú ‚¿ ¸¥¸

Invest your time in being Cyber Safe, you will get high returns

-Niyati Gadit, HO

Taarangan

December 2014

9


Ÿ¸š¡¸¸¨¸¢š¸ ¬¸Ÿ¸ú®¸¸ ¤¸¾“ˆÅ / Mid Term Review meet

Zonal Managers’ Conference held at Goa (4th to 6th November 2014) Top management of the Bank comprising of CMD, EDs, General Managers, Zonal Managers, Large Corporate Branch Heads, Divisional Managers etc. met at Goa for the Mid Term Review of the performance vis a vis corporate goals. The interaction with the participants was a fruitful exercise to plan the course of action for the future. CMD in her keynote address emphasized the need for sustained and profitable business growth month-on-month basis. Various issues were discussed at length, for the improvement / growth of overall business and improvement in profitability of the Bank. Growth in CASA, improvement in Net Profit and reduction in NPA were the major issues before the bank. Inspired by CMD’s guidance and a word of experience from all the EDs, the field level executives made commitment to achieve their respective targets for the F. Y. end March 2015.

CMD cutting the cake on successful completion of 2 years in Bank of India since taking charge on 05/11/2012. Also seen are EDs Shri B P Sharma, Shri Arun Shrivastava, the then ED Shri R Koteeswaran, GMs Shri Charan Singh & Shri M V Venketeswaran, GM & CFO Shri Anant Upadhyay, CVO Shri Manoj Jain.

CMD addressing the gathering. Also seen on the dais (L to R), GM & CFO Shri Anant Upadhyay, EDs Shri Arun Shrivastava, Shri B P Sharma, the then ED, Shri R Koteeswaran.

ED Shri B P Sharma addressing the gathering. Also seen on dais (L to R) GM & CFO Shri Anant Upadhyay, ED Shri Arun Shrivastava, CMD Smt. V R Iyer and the then ED Shri R Koteeswaran.

The participant General Managers, Zonal Managers and Divisional Managers and other executives during the Conference.

¤¸ÿˆÅ ‚¸ÁûöÅ ƒ¿¢”¡¸¸ £¸ ¸ž¸¸«¸¸ ©¸ú¥” ¡¸¸½ ¸›¸¸ (¨¸«¸Ä 2013-14) ˆ½Å ‚¿÷¸Š¸Ä÷¸ ''Š¸'' ®¸½°¸ ˆ½Å ¢¥¸‡ ‚š¡¸®¸ ‡¨¸¿ œÏ¤¸¿š¸ ¢›¸™½©¸ˆÅ, ªúŸ¸÷¸ú ¨¸ú ‚¸£ ‚¡¡¸£ ¬¸½ œÏ˜¸Ÿ¸ œ¸º£¬ˆÅ¸£ œÏ¸œ÷¸ ˆÅ£÷¸½ íº‡ ‚¸¿. œÏ. Š¸¸½¨¸¸ ‚¿ ¸¥¸ ªú ‡¬¸ ‡¬¸ ¸”½ ÷¸˜¸¸ £¸. ‚. ªú £¸ ¸½©¸ ˆÅ¸£¿”½ —

New Delhi ZM Shri S K Aggarwal receiving prize for "Management of NPA" from CMD Smt. V R Iyer. Also seen on dais are, ED Shri Arun Shrivastava, GM & CFO Shri Anant Upadhyay, GM ARD Shri S K Kasliwal.

10

leejebieCe

efomebyej 2014


‚¿÷¸££¸«’ïú¡¸ Š¸¢÷¸¢¨¸¢š¸¡¸¸¿ / International Activities

Staff of overseas branches were taken on a trip to Agra & Delhi during their training programme at MDI Belapur. CM International Divn. Shri C Narayanan and Course Coordinator, MDI Shri A Prasad Rao with the participants at Taj Mahal.

CE, European Branches Shri Sanjay Pawar, Head of Chancery, Consulate General of India, Birmingham Shri B C Pradhan during Customers Meet at Red Lead World Buffet, Birmingham.

Hon’ble Chief Minister of Andhra Pradesh Dr. N Chandrababu Naidu visited Japan. CE Japan Branches Shri S S Banik with CM Shri Naidu at Japan.

The then Secretary, Deptt. of Financial Services Shri G S Sandhu visited our Singapore Branch. GM & CE Shri D B Mohapatra, DGM Shri C G Chaitanya & Staff members of the Branch.

The then GM (Rural) Shri Vikas Pande in his last Board Meeting as Director of BOI (Tanzania) Ltd. along with MD Japan Branches Shri Sanjib Sarkar, other directors and IBOs.

Taarangan

December 2014

11


Ÿ¸í÷¨¸œ¸»µ¸Ä Š¸¢÷¸¢¨¸¢š¸¡¸¸Â / Important Activities

B

OI Merchant Bankers Ltd. (BOIMB) is a Public limited company incorporated on 31.10.2014 to undertake Merchant banking and allied activity. The company is a wholly owned subsidiary of our bank. The Company was inaugurated by the esteemed Chairperson & Managing Director Smt. V R Iyer (also the Chairperson of the company) on 2nd February 2015, in the presence of both the Executive Directors Shri B P Sharma, Shri Arun Shrivastava and other senior Executives of the Bank. The company has got Category-1 Merchant Banking License from the Securities and Exchange Board of India (SEBI) on 21st January 2015 and has started its operations from Star House-2, Bandra-Kurla Complex Mumbai. Going forward, company proposes to expand its operations in other major centres. Shri N K Sood is the Present Managing Director of the Company. He is having more than 35 years’ experience both in India and overseas in the field of Credit, International, Project Appraisal and Loan Syndication. In Addition to the Managing Director, and Chairperson, Shri Arun Shrivastava, Shri Gopal Bhagat, Shri R Venkataramani and Shri S Ravi are the non -official part time directors of the company. The Company will concentrate on the following fee based activities 1) Debt syndication & TEV Studies 2) Advisory services on Capital structuring and leveraging 3) Private Placement of Debt Instruments 4) Private placement, Qualified Institutional Placement of Equity issues, 5) Management of IPO, FPOs, Right Issue etc. 6) Delisting of Shares 7) Merger, Acquisition and Takeover activities.

ED Shri Arun Shrivastava inaugurating Bank’s stall at Pravasi Bhartiya Exhibition in the presence of CGM Shri R A Sankara Narayanan & GM NBG (C) Shri T Sudhakar during ‘Pravasi Bhartiya Diwas’ held at Gandhinagar.

12

leejebieCe

efomebyej 2014

ED Shri Arun Shrivastava, CGM Shri R A Sankara Narayanan & GM NBG (C) Shri T Sudhakar along with the executives and staff members during ‘Vibrant Gujarat Summit’ held at Gandhinagar.

"Expect the unexpected, Stop-Think-Then Click-Your Security Your Responsibility" - Priti Verma, Hazaribagh Zone


¤¸ÿ¢ˆ¿ÅŠ¸ ’½Æ›¸¸½¥¸¸½ ¸ú, ¸ú¨¸›¸ ©¸¾¥¸ú ‡¨¸¿ ¸¸½¢‰¸Ÿ¸ œÏ¤¸¿š¸›¸ ‡¬¸ ‚¸£ Ÿ¸úµ¸¸ Ÿ¸í¸œÏ¤¸¿š¸ˆÅ œÏš¸¸›¸ ˆÅ¸¡¸¸Ä¥¸¡¸

¸¸½

¢‰¸Ÿ¸ œÏ¤¸¿š¸›¸ Ÿ¸¸›¸¨¸ ¬¸ž¡¸÷¸¸ ¢ ¸÷¸›¸¸ íú œ¸º£¸›¸¸ í¾— ‚¸¢™ˆÅ¸¥¸ ¸ú¨¸›¸ ©¸¾¥¸ú ¬¸í ¸, ¬¸£¥¸ ‚¸¾£ ‡ˆÅ ¢›¸š¸¸Ä¢£÷¸ ™¸¡¸£½ ˆ½Å ‚¿÷¸Š¸Ä÷¸ ˜¸ú ƒ¬¸¢¥¸‡ „¬¸ ¬¸Ÿ¸¡¸ ¸¸½¢‰¸Ÿ¸ ˆÅ¸ ¬¨¸³Åœ¸ ‚¸¾£ „¬¸ˆÅ¸ œÏ¤¸¿š¸›¸ ž¸ú ‚¸¬¸¸›¸ ˜¸¸— Ÿ¸¸›¸¨¸ ¬¸ž¡¸÷¸¸ ˆ½Å ¢›¸£¿÷¸£ ¢¨¸ˆÅ¸¬¸ ¬¸½ ¸¸½¢‰¸Ÿ¸ œÏ¤¸¿š¸›¸ ž¸ú ¥¸Š¸¸÷¸¸£ œ¸¢£¨¸÷¸Ä›¸ í¸½÷¸½ Š¸¡¸¸— ‚¸¢™ˆÅ¸¥¸ ˆÅ¸ ‚¸¬¸¸›¸ ¸¸½¢‰¸Ÿ¸ œÏ¤¸¿š¸›¸ š¸ú£½-š¸ú£½ œ¸½ ¸ú™¸ í¸½›¸½ ¥¸Š¸¸— Ÿ¸¸›¸¨¸ ¸ú¨¸›¸ ©¸¾¥¸ú Ÿ¸Ê œÏ¸¾Ô¸¸½¢Š¸ˆÅú ‚œ¸›¸ú œ¸¾“ ¤¸›¸¸›¸½ ¥¸Š¸ú ¢ ¸¬¸ˆ½Å ¬¸¸˜¸ ¤¸ÿ¢ˆ¿ÅŠ¸ ž¸ú ’½Æ›¸¸½¥¸¸½ ¸ú ¬¸¿Š¸ ¥¸÷¸ú Š¸¡¸ú— œÏ¸¾Ô¸¸½¢Š¸ˆÅú ¢¨¸ˆÅ¸¬¸ ›¸½ Ÿ¸¸›¸¨¸ ¸ú¨¸›¸ ©¸¾¥¸ú ˆÅ¸½ ˆÅƒÄ ›¸‡ ‚¸¡¸¸Ÿ¸ ¢™¡¸½ ¢ ¸¬¸¬¸½ ¸ú¨¸›¸ ‚÷¡¸¢š¸ˆÅ ¢¨¸ˆÅ¢¬¸÷¸ ‚¸¾£ „››¸÷¸ í¸½÷¸½ Š¸¡¸¸— ‚¤¸ ¸ú¨¸›¸ ©¸¾¥¸ú ˆÅú ¬¸¿£ ¸›¸¸ œ¡¸¸ ¸ ˆÅú œ¸£÷¸¸Ê ˆÅú ÷¸£í í¸½ Š¸¡¸ú í¾ ‚¸¾£ í£ ®¸½°¸ Ÿ¸Ê ¸¸½¢‰¸Ÿ¸ œÏ¤¸¿š¸›¸ ¤¸íº÷¸ ‚¸¨¸©¡¸ˆÅ í¸½ Š¸¡¸¸ í¾— ¤¸ÿ¢ˆ¿ÅŠ¸ ’½Æ›¸¸½¥¸¸½ ¸ú ›¸½ ŠÏ¸íˆÅ ˆÅ¸½ ‚œ¸›¸ú ¬¸º¢¨¸š¸¸ ˆ½Å ¬¸¸˜¸ ¤¸ÿ¢ˆ¿ÅŠ¸ ˆÅ¸¡¸Ä ˆÅ£›¸½ ˆÅú ©¸¢Æ÷¸ ™ú í¾ ¥¸½¢ˆÅ›¸ ƒ¬¸ˆ½Å ¬¸¸˜¸ íú ’½Æ›¸¸½¥¸¸½ ¸ú ¬¸½ ¸º”õ¸ ¸¸½¢‰¸Ÿ¸ ž¸ú „œ¸¡¸¸½Š¸ˆÅ÷¸¸Ä ˆÅ¸½ „œ¸í¸£¬¨¸³Åœ¸ ¢Ÿ¸¥¸ Š¸¡¸¸ í¾— ƒ¬¸¢¥¸‡ œÏ÷¡¸½ˆÅ „œ¸¡¸¸½Š¸ˆÅ÷¸¸Ä ˆÅ¸½ ƒ¬¸ ¸¸½¢‰¸Ÿ¸ œÏ¤¸¿š¸›¸ ˆÅ¸½ ¬¸Ÿ¸ ¸›¸¸ ‡¨¸¿ „¬¸ˆÅ¸ „¢ ¸÷¸ œÏ¤¸¿š¸ ˆÅ£›¸¸ ‚¢›¸¨¸¸¡¸Ä í¸½ Š¸¡¸¸ í¾— ퟸ¸£½ ˆºÅŽ œ¸¸“ˆÅ ¬¸¸½ ¸ £í½ í¸ÊŠ¸½ ¢ˆÅ ¢¤¸›¸¸ ’½Æ›¸¸½¥¸¸½ ¸ú „œ¸¡¸¸½Š¸ ¢ˆÅ‡ ƒ¬¸ ¸¸½¢‰¸Ÿ¸ ¬¸½ ¤¸ ¸¸ ¸¸ ¬¸ˆÅ÷¸¸ í¾— Æ¡¸¸ ¡¸í ¡¸˜¸¸˜¸Ä Ÿ¸Ê ¬¸¿ž¸¨¸ í¾? „™¸í£µ¸ ˆ½Å ¢¥¸‡ ˆ¼Åœ¸¡¸¸ ¢›¸Ÿ›¸¢¥¸¢‰¸÷¸ ¦¬˜¸¢÷¸¡¸¸Ê ˆÅ¸ ‚¨¸¥¸¸½ˆÅ›¸ ˆÅ£ÊÀ‚¸œ¸ˆ½Å œ¸¢£¨¸¸£ ˆÅ¸ ˆÅ¸½ƒÄ ¬¸™¬¡¸ ¡¸¸ ˆÅ£ú¤¸ú ¢£©÷¸½™¸£ ™½£ £¸÷¸ ˆÅ¸½ ûŸ½›¸ ¬¸½ ‚¸œ¸ˆÅ¸½ ¬¸»¢ ¸÷¸ ˆÅ£÷¸½ íÿ ¢ˆÅ „›¸ˆÅ¸ œ¸¬¸Ä ‰¸¸½ Š¸¡¸¸ í¾ ÷¸˜¸¸ „›íÊ ÷¸÷ˆÅ¸¥¸ ²Åœ¸¡¸¸Ê ˆÅú ‚¸¨¸©¡¸ˆÅ÷¸¸ í¾— ƒ¬¸ ‚¸œ¸¸÷¸ ¦¬˜¸¢÷¸ Ÿ¸Ê ‚¸œ¸ ¸¸íÊŠ¸½ ¢ˆÅ ¢ˆÅ¬¸ú ž¸ú ˆÅúŸ¸÷¸ œ¸£

¬¸ˆÅ÷¸¸ í¾— ˆÅ¸”Ä ¢¨¸«¸¡¸ˆÅ ¡¸í ¬¸¸¨¸š¸¸›¸ú ‚¸¨¸©¡¸ˆÅ í¾ ¢ˆÅ „¬¸ˆÅ¸ œ¸¸¬¸¨¸”Ä Ÿ¸¸½¤¸¸ƒ¥¸ Ÿ¸Ê ¬¸½¨¸ ›¸¸ ˆÅ£Ê— ¢ˆÅ¬¸ú ‚›¡¸ ˆ½Å í¸¿˜¸ Ÿ¸¸½¤¸¸ƒ¥¸ ¥¸Š¸›¸½ ¬¸½ œ¸¸¬¸¨¸”Ä ±¸¸÷¸ ˆÅ£ ™º²Åœ¸¡¸¸½Š¸ ¢ˆÅ¡¸¸ ¸¸ ¬¸ˆÅ÷¸¸ í¾— ˆÅ¸”Ä ‰¸¸½ ¸¸›¸½ œ¸£ ÷¸º£¿÷¸ ˆÅ¸”Ä ˆÅ¸½ í¸Á’¢¥¸¬’ ˆÅ£Ê— ¡¸¸°¸¸ ¬¸½ œ¸í¥¸½ ˆÅú ¬¸¸¨¸š¸¸›¸ú À ¡¸¢™ ¤¸¸í£ ¸¸›¸½ ¬¸½ œ¸í¥¸½ ‚¸œ¸ˆ½Å ˆÅ£ú¤¸ú ¢£©÷¸½™¸£ ¬¨¸¡¸¿ ˆÅ¸½ ¡¸¸ ‚¸œ¸ ¬¨¸¡¸¿ ˆÅ¸½ ‚¸ƒÄ‡Ÿ¸’ú ˆÅ£ ¥¸Ê ÷¸¸½ ¢ˆÅ¬¸ú ž¸ú ¬¸¿ˆÅ’ ˆÅú ¦¬˜¸¢÷¸ Ÿ¸Ê ¢ˆÅ¬¸ú ž¸ú ©¸í£ ¬¸½ ¢ˆÅ¬¸ú ž¸ú ¬¸Ÿ¸¡¸ ¢¤¸›¸¸ ˆÅ¸”Ä, ¢¤¸›¸¸ Ÿ¸¸½¤¸¸ƒ¥¸ ˆ½Å œ¸¾¬¸¸ ¢›¸ˆÅ¸¥¸¸ ¸¸ ¬¸ˆÅ÷¸¸ í¾— ¡¸í ‚¸ƒÄ‡Ÿ¸’ú ‚¸œ¸ˆÅ¸ ¨¸ ¸ºÄ‚¥¸ œ¸¬¸Ä ˆÅ¸ ˆÅ¸Ÿ¸ ˆÅ£½Š¸¸ ¢ ¸¬¸ˆ½Å ‰¸¸½›¸½, ¸¸½£ú í¸½›¸½ ¡¸¸ ¢Ž›¸ ¢¥¸‡ ¸¸›¸½ ˆÅ¸ ¸¸½¢‰¸Ÿ¸ ›¸íú¿ í¾— ©¸ú‹Ï íú ‚¸ƒÄ‡Ÿ¸’ú ˆÅ¸ ž¸ºŠ¸÷¸¸›¸ ™»¬¸£½ ¤¸ÿˆÅ¸Ê ˆ½Å ‡’ú‡Ÿ¸ ¬¸½ ž¸ú ¬¸¿ž¸¨¸ í¸½ ¸¸‡Š¸¸— ƒ¿’£›¸½’ ¤¸ÿ¢ˆ¿ÅŠ¸ ˆÅú ‚¸¨¸©¡¸ˆÅ÷¸¸À ‚¸ƒÄ‡Ÿ¸’ú ¬¸ž¸ú ˆÅ£ ¬¸ˆÅ÷¸½ íÿ— ƒ¬¸ˆ½Å ¢¥¸‡ ¡¸¸ ÷¸¸½ ƒ¿’£›¸½’ ¤¸ÿ¢ˆ¿ÅŠ¸ ˆÅú ¬¸º¢¨¸š¸¸ í¸½ ¡¸¸ £¸÷¸ Ÿ¸Ê ‡’ú‡Ÿ¸ œ¸£ ¸¸ˆÅ£ ‚¸ƒÄ‡Ÿ¸’ú ¢ˆÅ¡¸¸ ¸¸ ¬¸ˆÅ÷¸¸ í¾— ƒ›¸ ™¸½›¸¸Ê œÏµ¸¸¢¥¸¡¸¸Ê Ÿ¸Ê ‚¥¸Š¸-‚¥¸Š¸ ¸¸½¢‰¸Ÿ¸ íÿ— ¡¸Ô¸¢œ¸ ƒ¿’£›¸½’ ¤¸ÿ¢ˆ¿ÅŠ¸ ˆÅ¸ „œ¸¡¸¸½Š¸ ¸¸½¢‰¸Ÿ¸ œÏ¤¸¿š¸›¸ ˆ½Å ¬¸¸˜¸ ˆÅ£›¸¸ ¬¸í ¸ ‡¨¸¿ ¬¸£¥¸ í¾— ¤¸ÿ¢ˆ¿ÅŠ¸ ’½Æ›¸¸½¥¸¸½ ¸ú ¨¸÷¸ÄŸ¸¸›¸ ¸ú¨¸›¸ ©¸¾¥¸ú ˆÅ¸½ ›¸ƒÄ ¬¸º¢¨¸š¸¸‡¿ ‚¸¾£ ›¸‡ ‚¸¡¸¸Ÿ¸ ™½÷¸½ íº‡ ¤¸ÿ¢ˆ¿ÅŠ¸ ˆÅ¸½ ‹¸£-‚¸ÂŠ¸›¸ Ÿ¸Ê ¬¸ûÅ¥¸÷¸¸œ¸»¨¸ÄˆÅ œ¸íº¿ ¸¸›¸½ Ÿ¸Ê ¬¸ûÅ¥¸ íºƒÄ í¾— œÏ¸¾Ô¸¸½¢Š¸ˆÅú ˆÅú Š¸¢÷¸ ‚¸¾£ œ¸¢£©¸ºÖ÷¸¸ ˆÅ¸ ¬¸¸¨¸š¸¸›¸úœ¸»¨¸ÄˆÅ „œ¸¡¸¸½Š¸ ˆÅ£›¸½ ˆÅú ‚¸¨¸©¡¸ˆÅ÷¸¸ í¾— ƒ¬¸œ¸£ ¢¨¸©¸½«¸ š¡¸¸›¸ ™½›¸¸ ¸¸¢í‡ ¢ˆÅ ‚œ¸›¸½ ˆÅ¸”Ä, ¸½ˆÅ¤¸ºˆÅ, œ¸¸¬¸¨¸”Ä ‚¸¢™ ˆÅú ¬¸º£®¸¸ ¢›¸£¿÷¸£ ¸¸Š¸³ÅˆÅ í¸½ˆÅ£ ˆÅú ¸¸‡—

„›¸ˆÅú ¬¸í¸¡¸÷¸¸ ‚¢÷¸©¸ú‹Ï ˆÅú ¸¸‡— ‡½¬¸ú ¦¬˜¸¢÷¸ Ÿ¸Ê ¡¸í ¢¨¸ ¸¸£ ¬¸í ¸ „÷œ¸››¸ í¸½÷¸¸ í¾ ¢ˆÅ „›¸ˆ½Å ‰¸¸÷¸½ Ÿ¸Ê ƒ¿’£›¸½’ ¤¸ÿ¢ˆ¿ÅŠ¸ ¬¸½ ²Åœ¸¡¸½ ¸Ÿ¸¸ ˆÅ£½ ¡¸¸ ‡’ú‡Ÿ¸ ¬¸½ ¢›¸ˆÅ¸¥¸ ¥¸½›¸½ ˆÅú ¬¸¥¸¸í ™ú ¸¸‡— ¢ˆÅ›÷¸º ‡’ú‡Ÿ¸ ÷¸¸½ œ¸¬¸Ä Ÿ¸Ê £‰¸¸ ˜¸¸— ‰¸¸½¡¸½ œ¸¬¸Ä ˆÅ¸½ ¤¸™í¨¸¸¬¸ í¸½ˆÅ£ »Â ›¸½ ˆ½Å œÏ¡¸¸¬¸ Ÿ¸Ê ˆÅ¤¸, ˆÅí¸Â, ˆ¾Å¬¸½ Ÿ¸¸½¤¸¸ƒ¥¸ Ž»’ Š¸¡¸¸ ¡¸í ž¸ú ±¸¸÷¸ ›¸íú¿, ‡½¬¸ú ¦¬˜¸¢÷¸ Ÿ¸Ê Æ¡¸¸ ¢ˆÅ¡¸¸ ¸¸‡— ‡½¬¸ú ¦¬˜¸¢÷¸ ‡ˆÅ ¡¸®¸ œÏ©›¸ ˆÅú ÷¸£í ¥¸Š¸÷¸ú í¾— ¤¸ÿ¢ˆ¿ÅŠ¸ œÏ¸¾Ô¸¸½¢Š¸ˆÅú ›¸½ ‡½¬¸ú œ¸¢£¦¬˜¸¢÷¸ ˆÅ¸ ¬¸Ÿ¸¸š¸¸›¸ ž¸ú »¿ ¢¥¸¡¸¸ í¾ ¢ ¸¬¸Ÿ¸Ê ¢¤¸›¸¸ ˆÅ¸”Ä, ‰¸¸÷¸¸ ‚¸¾£ Ÿ¸¸½¤¸¸ƒ¥¸ ˆ½Å ž¸ú ²Åœ¸¡¸¸ œÏ¸œ÷¸ ¢ˆÅ¡¸¸ ¸¸ ¬¸ˆÅ÷¸¸ í¾— ‚¸œ¸ ÷¸º£¿÷¸ ‚œ¸›¸½ ‚¸œ¸ ˆÅ¸½ ‡ˆÅ ‚¸ƒÄ‡Ÿ¸’ú ˆÅ£Ê ÷¸˜¸¸ ‚¸ƒÄ‡Ÿ¸’ú ˆÅ¸ ¢¨¸¨¸£µ¸ ¸¾¬¸½ ž¸½ ¸›¸½¨¸¸¥¸½ ˆÅ¸ ˆÅ¸½”, ‡¬¸‡Ÿ¸‡¬¸ ˆÅ¸½” ( ¸¸½ ¢ˆÅ ‚¸ƒÄ‡Ÿ¸’ú ž¸½ ¸÷¸½ íú ‚¸œ¸ˆ½Å Ÿ¸¸½¤¸¸ƒ¥¸ Ÿ¸Ê ‚¸¡¸¸ í¾) ‚¸œ¸ˆÅ¸ Ÿ¸¸½¤¸¸ƒ¥¸ ›¸¿¤¸£ ¢ ¸¬¸œ¸£ ‚¸œ¸›¸½ ‚¸ƒÄ‡Ÿ¸’ú ˆÅú í¾ „›¸ˆÅ¸½ ¤¸÷¸¸ ™Ê ÷¸˜¸¸ ¤¸ÿˆÅ ‚¸ÁûÅ ƒ¿¢”¡¸¸ ˆ½Å ›¸ ¸™úˆÅú ‡’ú‡Ÿ¸ ¬¸½ ¢¤¸›¸¸ ˆÅ¸”Ä, ¢¤¸›¸¸ ûŸ½›¸, ¢¤¸›¸¸ ‰¸¸÷¸¸ œ¸¾¬¸½ ¢›¸ˆÅ¸¥¸›¸½ ˆÅú ¬¸¥¸¸í ™Ê— ƒ¬¸ œÏˆÅ¸£ ‡ˆÅ ˆÅ¢“›¸ œ¸¢£¦¬˜¸¢÷¸ ˆÅ¸ ¬¸¿÷¸¸½«¸œÏ™ ¬¸Ÿ¸¸š¸¸›¸ í¸½ ¸¸÷¸¸ í¾— ¤¸ÿ¢ˆ¿ÅŠ¸ ’½Æ›¸¸½¥¸¸½ ¸ú ‡¨¸¿ ¸ú¨¸›¸ ©¸¾¥¸ú ˆ½Å Š¸í£½ ¬¸¿¤¸¿š¸ ˆÅ¸ „Æ÷¸ „™¸í£µ¸ „œ¸¡¸¸½Š¸ú ÷¸¸½ í¾ ¢ˆÅ›÷¸º ¡¸í ˆÅí¸¨¸÷¸ í¾ ¢ˆÅ œÏ÷¡¸½ˆÅ ‚ Žú ¨¸¬÷¸º Ÿ¸Ê ˆºÅŽ œÏ¢÷¸ˆ»Å¥¸÷¸¸ ž¸ú í¸½÷¸ú í¾— ¤¸ÿ¢ˆ¿ÅŠ¸ ’½Æ›¸¸½¥¸¸½ ¸ú ‡¨¸¿ ¸ú¨¸›¸ ©¸¾¥¸ú ˆ½Å Š¸í£½ ¬¸¿¤¸¿š¸ Ÿ¸Ê ¢›¸Ÿ›¸¢¥¸¢‰¸÷¸ ¬¸¸¨¸š¸¸¢›¸¡¸¸Ê ¬¸½ ¸¸½¢‰¸Ÿ¸ œÏ¤¸¿š¸›¸ ¢ˆÅ¡¸¸ ¸¸ ¬¸ˆÅ÷¸¸ í¾ ÀˆÅ¸”Ä ‰¸¸½ ¸¸›¸½ ˆÅú ¦¬˜¸¢÷¸ Ÿ¸Ê À ˆÅ¸”Ä ‰¸¸½ ¸¸›¸½ ˆÅú ¦¬˜¸¢÷¸ Ÿ¸Ê ¬¸Ÿ¸¸›¡¸÷¸¡¸¸ ¡¸í ž¸¡¸ £í÷¸¸ í¾ ¢ˆÅ ¢ ¸¬¸ˆ½Å œ¸¸¬¸ ˆÅ¸”Ä í¾ ¡¸¢™ „¬¸½ ˆÅ¸”Ä ˆÅ¸ œ¸¸¬¸¨¸”Ä ¢Ÿ¸¥¸ ¸¸‡ ÷¸¸½ ˆÅ¸”Ä ˆÅ¸ ™º²Åœ¸¡¸¸½Š¸ ¢ˆÅ¡¸¸ ¸¸

Taarangan

‚¸š¸º¢›¸ˆÅ ¤¸ÿ¢ˆ¿ÅŠ¸ ˆÅú ‚¸½£ ¤¸ õ÷¸½ ˆÅ™Ÿ¸—¬¸¸ƒ¤¸£ ¬¸÷¸ˆÄÅ÷¸¸ £‰¸›¸¸ í£ ™Ÿ¸ —— - £¸ ¸½›Í ž¸¸¢£¥¸, Ÿ¸Æ¬¸ú £¸½” ©¸¸‰¸¸

December 2014

13


Ketan Patel InfoSec Cell, HO

A

n Information security operations center or “SOC” is a place where enterprise information assets like websites, applications, databases, Network devices which includes Firewall, Routers, IPS etc., Proxy servers and other endpoints are monitored, assessed, and defended. SOC can be built into most organizations using one of three options. Establishing and operating a SOC is expensive and difficult so, organisations should need a good reason to do it. • Customer-premise SOC or Captive SOC. • Managed security service – Outsource Model • A hybrid solution that combines Captive and managed security services. It is related to the people, processes and technologies involved in providing situational awareness through the discovery, containment, and remediation of IT threats. SOC manages security incidents for the organization, ensuring they are properly identified, analysed, communicated, defended, investigated and reported. The SOC also monitors applications to identify a possible Application level attack or intrusion, if any. SOC can collect thousands of events per second, which are stored in a relational database for analysis, display, investigation, and reporting using SIEM (Security Information and

14

leejebieCe

efomebyej 2014

Security Operations Center (SOC) Event Management) Tool. Data can be collected and aggregated using agent or agentless systems. This readymade connector for Operating System, Databases, NW Devices and Application is helping us for easy deployment in existing infrastructure without adding additional hardware or re-architecting existing devices and protocols. • If there are multiple sites then we can deploy distributed data collection servers that can utilize a variety of methods like SNMP Traps, Syslog etc. and collect the logs and send to SIEM Tool at SOC location. • The SIEM solution is scalable and in case additional resources are introduced without any incremental installation and maintenance, it can handle the logs/ events. Only the additional required licences need to be procured. • An important element of SIEM is a complete capture of the status, alarms and alerts from various firewalls, intrusion detection systems, and other relevant sources that are being monitored, no matter what topology of agents and centralized collectors are used. This means that every field from every event is available for real-time correlation, display, investigation, and reporting. • The SIEM Tool will normalize every alarm and alert into a common security scheme, filter out unwanted traffic, set severity according to a

common taxonomy and intelligently manage bandwidth to minimize network traffic. While ensuring that necessary data can be collected and centralized, a successful SIEM technology should also be able to normalize, categorize, and correlate the data across many technologies. SOC Operation is managed by Security operation Team. Generally SOC team contains one SOC Manager, One or two Security analysts and four to Six SOC Operator based on size of organisation, no. of devices which are integrated and need to be monitored. The Role of SOC operator is 24x7x365 monitoring of incidents and raise alerts, Incident reporting and escalation, various report creation, Security patch advisories and System health monitoring etc. The Role of SOC analyst is SIEM administration, incident validation, detailed analysis of attacks and incident response, solution recommendation for vulnerabilities, implementation of patches and secure configuration of servers, manage security devices, Risk analysis for change management for security devices, escalation point for device issue resolution, Resolve escalation, Identify missed incidents, maintain knowledge base and vulnerability assessment tool administration etc. The Role of SOC Manager is to track incident detection and reporting, incident closure, incident escalation,

Be Smart Be Safe - Vimal Patawat, Jhunjhunu, Rajasthan Zone


,,

SOC can collect thousands of events per second, which are stored in a relational database for analysis, display, investigation, and reporting using SIEM (Security Information and Event Management) Tool.

,,

Identify new alert requirement, Ensure services are being provided within SLA parameters, performing periodic cyber DR drill and Follow-up up departments for closure of various reports/incidents and escalate the long outstanding issues etc. The role and job description may vary from organization to organization. Good SIEM should have following features. Normalization: A SIEM solution must have a robust data scheme. A SIEM could add or integrate with multiple devices from disparate parts of the organization—such as from network devices, security systems, servers, applications, physical access, video analytic systems and environmental controls. Categorization: The SIEM describe events in an easily understandable format, easily group events by writing vendor-independent rules, and the ability to seamlessly integrate new devices. Simple Event Correlation: The SIEM could easily perform event aggregation and look at multiple events to detect something that would otherwise go unnoticed. This basic functionality allows several events to be correlated, producing an outcome that is then reevaluated against other events in the flow. For example, five attempts to login to a system within one minute using the same user account could be indicative of a brute force login attempt.

Multi-Stage Event Correlation: The SIEM solution could be able to analyze information from a variety of disparate events—sometimes three or more different events—to determine if they are all related to the same incident. For example, the SIEM should be able to find the relationship between two different events. This combination must be picked out of the haystack of millions of events passing through the correlation engine. Prioritization: The SIEM could have the ability to identify the business relevance of the target in question as it relates to the organization’s business imperatives. If the target is a Core Banking system or contains sensitive classified data, it should be given the highest priority. If it is a seldom-used system or UAT system, it can be placed further down the list to be addressed when the event management team has time. Statistical Analysis: A SEIM could have the ability to detect events of significance by identifying mathematical deviations as anomalies from normal traffic such as sharp increases in activity on a particular port, protocol, or event type. Historical Analysis: The solution could be able to provide historical or forensic information to help the SOC to figure out what might have been missed. This is impossible in solutions without an advanced correlation engine capable of reevaluating past data to look for compromises that may have

Keep your password like STAR, not reachable by anybody

- S Karmakar, Vigilance Unit (East)

gone undetected. The potential attacker might also be doing organizational reconnaissance, slowly mapping out the network in preparation for launching a full-scale calculated attack at later time. The SOC needs the ability to detect unusual activity levels for long periods of time before an attack is launched. Physical and Logical Analysis/ Location Correlation: The solution could be able to perform both physical and logical correlation. The SOC needs the ability to correlate between physical access systems and logical security devices—such as operating system logs or VPN data. This will provide the ability to detect incidents such as account sharing physical plus VPN access violation, a geographic access violation or suspicious physical activity like after hours building access or critical server access. At last designing, building, and managing an internal security operations center can dramatically improve an organization’s ability to rapidly recognize and respond to malicious information security events/ incidents. A SOC can also assist in ensuring organizations leverage the full value of the often expensive investment in security technology and meet a myriad of regulatory compliance requirements. Approaching the challenge across the full scope of People, Process and Technology will ensure the SOC is up to the task of effectively and efficiently recognizing and responding to malicious events.

Taarangan

December 2014

15


›¸½©¸›¸¥¸ ¤¸¾¿¢ˆ¿ÅŠ¸ ¬¸Ÿ¸»í („) / National Banking Group (North)

CMD Smt. V R Iyer along with GM (Treasury) Shri G M Bhagat, DM (North-1) Shri Raman Kumar Sharma & staff members of Divisional Office, New Delhi during her visit to DM office.

£¸ ¸¬˜¸¸›¸ ‚¿ ¸¥¸ ׸£¸,¿ ž¸Š¸¨¸¸›¸ Ÿ¸í¸¨¸ú£ ¢¨¸ˆÅ¥¸¸¿Š¸ ¬¸¸¢í÷¡¸ ¬¸¢Ÿ¸¢÷¸, ¸¡¸œ¸º£ ˆÅ¸½ ‚›¸º™¸›¸ £¸¢©¸ œÏ™¸›¸ ˆÅú Š¸ƒÄ— ¬¸¢Ÿ¸¢÷¸ ˆ½Å Ÿ¸º‰¡¸ ¬¸¿£®¸ˆÅ ªú ”ú ‚¸£ Ÿ¸½í÷¸¸ ˆÅ¸½ ‚›¸º™¸›¸ £¸¢©¸ ˆÅ¸ ¸½ˆÅ œÏ™¸›¸ ˆÅ£÷¸½ íº‡ Ÿ¸º.Ÿ¸.œÏ. ‡›¸¤¸ú ¸ú („) ªú œ¸¨¸›¸ ¤¸ ¸¸ ¸ ‡¨¸¿ ‚¸¿.œÏ. ªú ¬¸ºš¸¸ˆÅ£ ˆ¾ÅŸ¸¥¸—

¥¸‰¸›¸… ‚¿ ¸¥¸, ¤¸½›¸úŠ¸¿ ¸ ©¸¸‰¸¸ ˆ½Å 40¨¸Ê ¬˜¸¸œ¸›¸¸ ¢™¨¸¬¸ ˆ½Å ‚¨¸¬¸£ œ¸£ ‚¸¿.œÏ. ªú Ÿ¸¼÷¡¸º¿ ¸¡¸ ˆºÅŸ¸¸£ Š¸ºœ÷¸¸ ÷¸˜¸¸ ‡¥¸”ú‡Ÿ¸ ªú œ¸ú ˆ½Å ¢¬¸¿í ÷¸˜¸¸ ©¸¸‰¸¸ ˆ½Å ¬’¸ûÅ ¬¸™¬¡¸—

ˆÿŬ¸£ œ¸ú¢”õ÷¸¸Ê ˆÅ¸½ ¢¨¸¢ž¸››¸ œÏˆÅ¸£ ˆÅú ¬¸½¨¸¸‡¿ œÏ™¸›¸ ˆÅ£›¸½ í½÷¸º ¥¸‰¸›¸… ‚¿ ¸¥¸ ˆÅ¸½ `ƒÄ渣 ¸¸ƒ¥” ¨¸½¥¸û½Å¡¸£ ûŸ„µ”½©¸›¸' ׸£¸ ¬¸ŸŸ¸¸¢›¸÷¸ ¢ˆÅ¡¸¸ Š¸¡¸¸— ƒ¬¸ ‚¨¸¬¸£ œ¸£ Ÿ¸¸›¸›¸ú¡¸ £¸ ¡¸œ¸¸¥¸, „ œÏ™½©¸, ªú £¸Ÿ¸ ›¸¸ƒÄˆÅ ¬¸½ ¬¸ŸŸ¸¸›¸ œÏ¸œ÷¸ ˆÅ£÷¸½ íº‡ ¥¸‰¸›¸… ‚¿ ¸¥¸ ˆ½Å ‚¸¿.œÏ. ªú Ÿ¸¼÷¡¸º¿ ¸¡¸ ˆºÅŸ¸¸£ Š¸ºœ÷¸¸—

Amritsar Zone ZM Shri R K Duggal during the JET EXPO ‘Kisan Mela’ at Jalandhar along with CM (CPC) Shri Jugal Kishore, CM Sutlej Market Branch Shri Biswajeet Guha, Head (Mktg.) Shri Anshul Arora & Shri Balwinder Singh at Stall.

¥¸‰¸›¸… ‚¿ ¸¥¸ ˆ½Å ‚¸¿.œÏ. ªú Ÿ¸¼÷¡¸º¿ ¸¡¸ ˆºÅŸ¸¸£ Š¸ºœ÷¸¸ ›¸¸¤¸¸”Ä ˆ½Å ÷¸÷¨¸¸¨¸š¸¸›¸ Ÿ¸Ê ¢¨¸ˆÅ¸¬¸ ‰¸¿” ©¸¸í¸¤¸¸™ ˆ½Å ŠÏ¸Ÿ¸ ¬¸£¸¿¡¸ ˆÅŸ¸¸¥¸ºÓú›¸œ¸º£ Ÿ¸Ê `®¸Ÿ¸÷¸¸ ¢›¸Ÿ¸¸Äµ¸ ‡¨¸¿ ›¸½÷¸¼÷¨¸ ¢¨¸ˆÅ¸¬¸ ˆÅ¸¡¸ÄÇÅŸ¸' Ÿ¸Ê ¤¸÷¸¸¾£ Ÿ¸º‰¡¸ ‚¢÷¸¢˜¸ ¬¸¿¤¸¸½¢š¸÷¸ ˆÅ£÷¸½ íº‡—

SUD Life meet was organized at Ludhiana Zone. (L to R) Northern Head SUD life Shri Atul Sharma, ZM Ludhiana Shri B Butchi Babu, DZM Shri Ashwani K Sharma CM (Mktg.) Shri Narendra Garg, DM Shri Parshuram Panda Zonal Head, Corp. Business Sud life Shri Rohan Sharma

¥¸‰¸›¸… ‚¿ ¸¥¸ ˆÅú Š¸¸½Ÿ¸÷¸ú›¸Š¸£ ©¸¸‰¸¸ Ÿ¸Ê £¸ ¸ž¸¸«¸¸ ¢›¸£ú®¸µ¸ ˆ½Å ™¸¾£¸›¸ ¬¸¿¡¸ºÆ÷¸ ¬¸¢ ¸¨¸, ¢¨¸.¬¸½.¢¨¸, ¢¨¸î¸ Ÿ¸¿°¸¸¥¸¡¸ ”¸Á ¨¸½™ œÏˆÅ¸©¸ ™º¤¸½, „œ¸ ‚¸¿.œÏ. ªú ¬¸º›¸ú¥¸ ˆºÅŸ¸¸£ ¨¸¸½í£¸, Ÿ¸º. œÏ.(£¸) ‡›¸¤¸ú ¸ú („) ªú ¸½ œ¸ú Ÿ¸»µ¸, ©¸¸‰¸¸ Ÿ¸º.œÏ. ªú œ¸ú ˆ½Å ‚¸›¸¿™ ‡¨¸¿ œÏ¤¸¿š¸ˆÅ (£¸) ”¸Á ‚¿¢ˆÅ÷¸¸ ’¿”›¸—

16

leejebieCe

efomebyej 2014


›¸½©¸›¸¥¸ ¤¸¾¿¢ˆ¿ÅŠ¸ ¬¸Ÿ¸»í („) / National Banking Group (North)

Ludhiana Zone ZM Shri B Butchi Babu being welcome at event organized by National Small Industries Corporation (NSIC) at Ludhiana (Insat). Also seen, participants during the event.

‚¸Š¸£¸ ‚¿ ¸¥¸ ׸£¸ ‚¸¡¸¸½¢ ¸÷¸ ˆÅ¸½¥” ¬’¸½£½ ¸ ¬¸¿Š¸“›¸ ˆÅú ¤¸¾“ˆÅ Ÿ¸Ê ‚¸.œÏ. ªú ‡ ˆ½Å ¤¸½í£¸, ¬¸ú¬¸ú‚¸ƒÄ ˆ½Å ‚š¡¸®¸ ªú Š¸¸½œ¸¸¥¸ ¢¬¸¿í ‡¨¸¿ „œ¸ ‚¸.œÏ. ªú œÏ™úœ¸ ¤¸ú ©¸Ÿ¸¸Ä ‡¨¸¿ œÏ¤¸¿š¸ˆÅ ªú í½Ÿ¸¿÷¸ ©¸Ÿ¸¸Ä —

Hon’ble Union Cabinet Minister for MSME Shri Kalraj Mishra inaugurating stall of BOI during 34th International Trade Fair at New Delhi. Also seen , DGM (Govt. Business) Shri A K Sahu.

ˆÅ¸›¸œ¸º£ ‚¿ ¸¥¸ ׸£¸ ž¸¸£÷¸ú¡¸ ˆ¼Å¢°¸Ÿ¸ ‚¿Š¸ ¢›¸Ÿ¸¸Äµ¸ ¢›¸Š¸Ÿ¸ (‡¢¥¸ŸˆÅ¸½) ˆ½Å ¬¸¿¡¸ºÆ÷¸ ÷¸÷¨¸¸š¸¸›¸ Ÿ¸Ê ‚¸¡¸¸½¢ ¸÷¸ ¢¨¸ˆÅ¥¸¸¿Š¸ ¸›¸¸Ê ˆ½Å ¬¸í¸¡¸ˆÅ „œ¸ˆÅ£µ¸¸Ê ˆ½Å ¢¨¸÷¸£µ¸ ¢©¸¢¨¸£ ˆ½Å ™¸¾£¸›¸ ‚¸¿.œÏ. ªú œ¸ú ˆ½Å ¢¬¸¿Š¸¥¸¸—

›¸ƒÄ ¢™¥¥¸ú ‚¿ ¸¥¸, ¢÷¸¥¸ˆÅ ›¸Š¸£ ©¸¸‰¸¸ Ÿ¸Ê ‚¸¡¸¸½¢ ¸÷¸ ŠÏ¸íˆÅ ¤¸¾“ˆÅ Ÿ¸Ê ‚¸¿.œÏ. ªú ‡¬¸ ¬¸ú ‚ŠÏ¨¸¸¥¸, Ÿ¸º.œÏ. ªú ‚¸™©¸Ä ˆºÅŸ¸¸£ ‚£¸½”õ¸, ¨¸¢£.œÏ. ªú ‡¬¸ œ¸ú ž¸º’¸›¸ú, ¬¸¿.œÏ. ªúŸ¸÷¸ú ©¸¢¥¸›¸ú š¸¨¸›¸ ‡¨¸¿ ªúŸ¸÷¸ú ©¸¢©¸ ¸¸½œ¸”õ¸ —

ˆÅ¸›¸œ¸º£ ‚¿ ¸¥¸ ׸£¸ ˆÅ¸›¸œ¸º£ œÏ¸µ¸ú „Ô¸¸›¸ Ÿ¸Ê ‡ˆÅ Š¸ÿ”¸ (œ¸¨¸›¸) ¨¸ ‡ˆÅ œ¸¾¢¥¸ˆ½Å›¸ (Pelican) ˆÅ¸½ ‚¿Š¸úˆ¼Å÷¸ ¢ˆÅ¡¸¸ Š¸¡¸¸— ƒ¬¸ ‚¨¸¬¸£ ‚¸¿.œÏ. ªú œ¸ú ˆ½Å ¢¬¸¿Š¸¥¸¸, „œ¸ ‚¸¿.œÏ. ªú ¸½ œ¸ú ©¸ºÆ¥¸ ‡¨¸¿ ‚›¡¸ ‚¢š¸ˆÅ¸£úŠ¸µ¸—

Ludhiana Zone DZM Shri Ashwani K. Sharma, Manager (Mktg.) Shri Sachin Kumar, Managers’ Shri Pradeep Aggarwal & Shri Rijul Mahajan at BOI Stall during 46th Annual National Conference of Nutritional Society of India, Ludhiana.

›¸ƒÄ ¢™¥¥¸ú ‚¿ ¸¥¸, £¸½¢íµ¸ú ©¸¸‰¸¸ Ÿ¸½¿ ˆÅ¸¡¸Ä£÷¸ ªú Š¸µ¸½©¸ ‚í» ¸¸, ˆÅŸœ¡¸º’£ ‚¸Áœ¸£½½’£ ›¸½ í¢£¡¸¸µ¸¸ ’½¤¸¥¸ ’½¢›¸¬¸ ¬¸¿‹¸ ׸£¸ ¢¬¸£¬¸¸ (í¢£¡¸¸µ¸¸) Ÿ¸½¿ 48¨¸ì í¢£¡¸¸µ¸¸ £¸ ¡¸ ‚¿÷¸£-¢ ¸¥¸¸ ‡¨¸¿ ‚¸Áœ¸›¸ ’½¢¤¸¥¸ ’½¢›¸¬¸ ¸¾¢Ÿœ¸¡¸›¸¢©¸œ¸ œÏ¢÷¸¡¸¸½¢Š¸÷¸¸ Ÿ¸½¿ ÷¸ú¬¸£½ ¬˜¸¸›¸ œ¸£ £í÷¸½ íº‡ ˆÅ¸¿¬¡¸ œ¸™ˆÅ œÏ¸œ÷¸ ¢ˆÅ¡¸¸— ’úŸ¸ ˆ½Å ¬¸¸˜¸ ªú Š¸µ¸½©¸—

Taarangan

December 2014

17


Š¸¢÷¸¢¨¸¢š¸¡¸¸Â /Activities

Protection of Personal Identity/Information, Legal Provisions & Protections

Team Staff Training College, Bhopal

P

ersonal identity is the distinct personality of an individual and is concerned with the persisting entity particular to a given individual. The moment a child is born the first identity is his/her parents & Birth Certificate. As the child grows he/she starts coming out of parents fold & starts adding up his/her own identity like school certificate/mark sheets etc. We may classify identity of person in two forms01. Physical Form a) School / College Certificates / Mark Sheets, b)Photograph Hard Copy, c) Aadhar Card, d) House Address, e) PAN No., f) Passport, g) Voter ID, h) Driving License, i) MNREGA Card, j) Marriage Certificate, k) Debit Card and l) Credit Card 02. Electronic Form a) Email Address & PW, b) Digital Signature, c) Bio Metric (Thumb Impression, Finger Prints & Iris Scan), d) home / Mobile No., e) Bank A/C and f) Photograph Soft Copy Personal Identity is to be safeguarded like your personal information, whether it is on paper, online,

18

leejebieCe

efomebyej 2014

Personal identity is the distinct personality of an individual and is concerned with the persisting entity particular to a given individual. The moment a child is born the first identity is his/ her parents & Birth Certificate. As the child grows he/she starts coming out of parents fold & starts adding up his/her own identity like school certificate/mark sheets etc.

on your computers and mobile devices. Identity thefts and identityrelated crimes affect a considerable proportion of the population. The problem has become monstrous in the sense that as many as 8.2 million individuals are affected by identity theft in EU only which is around 2% of the EU’s population. The average loss is around €2500 or €20 bn at the EU level. We can just imagine the worldwide impact of the menace of identity theft. The situation most generally understood to constitute identity theft involves both primary and secondary victims. To illustrate this, an example can be taken of a situation where person A obtains evidence of person B’s identity so as to impersonate B (the primary victim) with the aim of procuring cash, goods or services from person or entity C (the secondary victim) However, more sophisticated evidence of identity may include either B’s biometric details, such as fingerprints or DNA, or biographical information such as past addresses, employment or the unmarried name of a parent or grandparent. Furthermore, A’s objective in impersonating B may

take other forms than obtaining a financial benefit such as cash, goods or services. These aims may include, for example:• Human trafficking (often via large, transnational criminal networks) and illegal immigration. False ID documents e.g. allow illegal immigrants to pass through border controls. • Avoiding a criminal prosecution or a fine. • Enabling A to obtain a new identity when his/her credit record is bad or to evade payment of debts. • Money laundering. • Terrorism. • Drugs trafficking. • Inflicting harm on B in the form of damage to his reputation, Internet bullying or stalking. • To enable A to avoid being recognised by his/her true identity, for example if s/he is a disqualified driver or a paedophile wishing to obtain permission to work with children. • Infringing B’s right to privacy and family life.

Follow IT Security each day and keep the hackers away. At work and at play, Let IT Security lead the way. - R K Pamnani, I&A Dept., HO


Š¸¢÷¸¢¨¸¢š¸¡¸¸Â /Activities

Whoever, fraudulently or dishonestly makes use of the electronic signature, password or any other unique identification feature of any other person, shall be punished with imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to rupees one Lakh.

,,

,,

Legal framework in India Section 66c Chapter IX of IT Act, 2000 prescribes punishment for identity theft as under: “whoever, fraudulently or dishonestly makes use of the electronic signature, password or any other unique identification feature of any other person, shall be punished with imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to rupees one Lakh.” What harms can Identity theft do? If identity thieves have your personal information, they can drain your bank account, run up charges on your credit cards, open new utility accounts or get medical treatment on your health insurance. Scammers, hackers and identity thieves are looking to steal your personal information and your money. A Bank A/C may be opened with your identity for fraudulent transactions which may put you in great trouble. Safeguards to prevent Identity Thefts These days, many of us do most of our shopping and banking on the web. With all those account numbers and passwords floating around, it’s easy for someone to nab your information and go on a spree of misutilisation.

There are steps you can take to protect yourself, like • Keeping your computer software upto-date and giving out your personal information only when you have a good reason. Use of Trusted Security Software that updates automatically. • Treat your personal information like cash. • Check out companies to find out who you’re really dealing with. • Give personal information over encrypted websites only. • Protect your password. Clear your logins and passwords. This is especially important if you’ve been working on a public computer. Change logins and passwords frequently. • Back up your files. • Do not pass on any information over Phone. • Do not Handover the Photo Copy of your Identity proof to unknown person. The person might use it to open dubious A/C in your name & may use it for fraudulent transactions. • Keep all your original documents / identity proof in secure & safe place not accessible to anyone except you or your trusted one. • Don't email personal or financial information. Email is not a secure method of transmitting personal

¬¸º£®¸¸ íú ¬¸¨¸øÄœ¸¢£ í¾ - ‚¢›¸¿›¸™ú÷¸¸ ™¸¬¸, š¸Ÿ¸¸Ä›¸Š¸£ ©¸¸‰¸¸, Š¸º¨¸¸í’ú

information. Provide personal or financial information only through an organization's website. • Be alert for phishing, a trick in which spam or pop-ups mimic legitimate banks or businesses to obtain your personal information, which they use to access your accounts. Always verify that you’re on a familiar Web site with security controls before entering personal data. • Review credit card and bank account statements as soon as you receive them to check for unauthorized charges. If your statement is late by more than a couple of days, call to confirm your billing address and account balances. • Be cautious about opening attachments and downloading files from emails, regardless of who sent them. These files can contain viruses or other malware that can weaken your computer's security. Conclusion With the increased usages of internet & mobile applications encompassing all activities in the virtual world, the confidentiality of personal Identity has increased in enormous proportions.

Taarangan

December 2014

19


Cyber crimes / frauds awareness amongst staff & customers As an individual, a customer cannot remain away from changing technology and connecting himself with cyber world. Knowingly or unknowingly he shares his personal information over internet through social media sites, alternately he may use unsafe electronic channels for carrying out financial transactions or does not take adequate safety measures while doing so. This may happen most of the time due to ignorance. Team ITTC, Pune

I

n our day to day life we hear/ read some or other news about cyber frauds. They may include siphoning money from individual’s account, misuse of individual’s credit/ debit cards, posting offensive remarks in social media against an individual by Cyber criminals. We also read about natural/ manmade disasters happening around the world. It is the general human tendency that he assures himself, the same is not going to happen to me and he does not care or take necessary precautions to remain safe and unaffected from such incidences. As an employee In current scenario, all the information regarding customers is saved in digital format and is sent from one place to another via internet (cyber) media. As a banker, we are custodian of customers’ data and we should take all the precautions to prevent falling the data in unauthorised hands. As an employee, we access the data of our customers through Finacle on PCs (gateways) provided to us. It is our prime responsibility to protect this gateway being misused by unauthorised culprits.

20

leejebieCe

efomebyej 2014

As a customer As an individual, a customer cannot remain away from changing technology and connecting himself with cyber world. Knowingly or unknowingly he shares his personal information over internet through social media sites, alternately he may use unsafe electronic channels for carrying out financial transactions or does not take adequate safety measures while doing so. This may happen most of the time due to ignorance. Cyber criminals keeping watch on internet traffic are likely to find personal information and may use such information for their benefit by harming our customers socially or financially. It is the Bank to create Information Security awareness among the customers so that they are not falling prey to cyber culprits. As an employee of the Bank, each staff should get him equipped with related knowledge about I S awareness and also create awareness among our valuable customers which will help them protecting from any probable future losses and in turn helping to protect image of the Bank. In any organisation PPT (People, Process & Technology) model is

implemented to ensure Information Security. If organisation acquires best TECHNOLOGY and puts strong PROCESS in place but if there is poor implementation by the PEOPLE, then desired results cannot be achieved. To support my views Anti-virus software is the best example. Technology – Bank will select best of the antivirus and its configuration to suit our needs. Bank at Data Centre level also ensure that the latest signatures are downloaded and made available for updation at branch level. Process – Best process is defined in Corporate Information System Security Policy (CISP) about use, maintenance and correct deployment. People – It is the People (staff) who should watch for regular updation of Anti-virus & its running status all the time on their respective PCs. Second example given can be, though our bank had deployed best Technology & Process for accessing “Finacle”, after observing password sharing frauds committed by the “People”, bank had introduced “Biometric access”, however if


As the “Fire triangle” cannot be completed without all the three elements “Oxygen, Heat & Material”. Similarly, Information security of an organisation cannot be completed without “People, process & technology.” It is the People who should be made aware about Information Security.

,,

proper I S awareness is not created amongst staff, still staff may login in to “Finacle” through biometric access and allow access to his colleague with his credentials. As the “Fire triangle” cannot be completed without all the three elements “Oxygen, Heat & Material”. Similarly, Information security of an organisation cannot be completed without “People, process & technology.” It is the People who should be made aware about Information Security. Creating awareness among staff w Training to the employees should be offered at regular intervals. w At least one session to be kept on latest trends in Information Security & Do’s and Don’ts while utilising alternate delivery channel products in each type of training program. w Interesting case studies videos may be prepared at regular intervals. Those can be shown at branches. Based upon the case, questions may be put to the staff and some incentive may be offered for participation. w One page information each in Hindi & English languages may be included in every Tarangan issue. w On desktop of Finacle users, background related to IS awareness

may be set and changed every month. Creating customers

awareness

among

w Slogans / guidelines may be included in the SMS alerts sent to customers. They may be changed every month. w Mostly, those having ATM cards are using bank’s other alternate delivery channels & presuming an ATM card holder visits at least one of Bank’s ATMs, the similar slogans may be printed on back of charge slip and changed every month. w Eye catching posters preferably prepared in local languages may be hung in the branches. ATM locations w In “Branch of the future”, on central display system, guidelines may be displayed. w Similar information can be displayed in e-lobbies, on computer screens / posters, as clientele visiting these e-lobbies is more tech savvy, but generally not having IS awareness. w Conducting an hour program on IS awareness to customers on branch anniversary day. w While offering alternate delivery channel product to customer, a small leaflet mentioning precautions

,,

to be taken while utilising the product to be handed over to the customer and acknowledgement to the effect may be obtained and kept on record. Similar guidelines can be sent along with Cards upon renewal. w Such information can also be given through yearly calendars, table calendars, diaries generally in local languages. w While advertising on TV/ Social media, information on awareness may be passed on. w Awareness information / slogans may be printed on inside page of passbooks and on statement of accounts. w On Bank’s helplines, before call is picked at our call centre, by customer care personal, informative slogans may be played to the customer. All the above suggestions are cost effective and can be used with existing available infrastructure. Awareness material can include creating awareness while using bank’s alternate delivery channel products as well as while using cyber media for personal use like social sites, online bookings etc. By doing so, in true sense our logo “Relationship beyond banking” will show how much we care for them.

Taarangan

December 2014

21


›¸½©¸›¸¥¸ ¤¸¾¿¢ˆ¿ÅŠ¸ ¬¸Ÿ¸»í (œ¸»¨¸Ä) / National Banking Group (East)

ž¸¸Š¸¥¸œ¸º£ ‚¿ ¸¥¸ Ÿ¸Ê ‚¸¡¸¸½¢ ¸÷¸ œÏ¤¸¿š¸ˆÅ¸Ê ˆÅú ¬¸Ÿ¸ú®¸¸ ¤¸¾“ˆÅ ˆ½Å ™¸¾£¸›¸ Ÿ¸.œÏ. ‡›¸¤¸ú ¸ú (œ¸»¨¸Ä) ªú ‚¢›¸¥¸ ž¸¥¥¸¸ œÏ¤¸¿š¸ˆÅ¸Ê ˆÅ¸½ ¬¸¿¤¸¸½¢š¸÷¸ ˆÅ£÷¸½ íº‡— ¬¸¸˜¸ Ÿ¸Ê, ‚¸¿.œÏ. ªú ‡ ˆ½Å ¢Ÿ¸ª¸, „œ¸ ‚¸¿.œÏ. ªú ‡¬¸ ‡¬¸ ¤Ï¯¸ž¸’Ã’ ‡¨¸¿ ¢¨¸¢ž¸››¸ ©¸¸‰¸¸‚¸Ê ˆ½Å ©¸¸‰¸¸ œÏ¤¸¿š¸ˆÅ—

ˆ½Å›™º ¸£ ‚¿ ¸¥¸ ‚¸Š¸Ÿ¸›¸ œ¸£ Ÿ¸¸¿”º¨¸¸ ‡’ú‡Ÿ¸ ˆÅ¸ „™Ã‹¸¸’›¸ ˆÅ£÷¸½ íº‡ Ÿ¸.œÏ. (œÏ.ˆÅ¸.) ªú ¨¸ú ¢¨¸æ¸›¸¸˜¸›¸— ¬¸¸˜¸ Ÿ¸Ê, „œ¸ ‚¸¿.œÏ. ªú ¬¸º£½›Í ›¸¸˜¸ ‡¨¸¿ ¬¸.Ÿ¸.œÏ. (œÏ.ˆÅ¸.) ªú Ÿ¸ú£¸ˆºÅ£

¢¬¸¥¸úŠ¸º”õú ‚¿ ¸¥¸ Ÿ¸Ê ¬œ¸¸½’ì¸Ä Ÿ¸ú’ ˆ½Å ™¸¾£¸›¸ ¬’¸ûÅ ‡¨¸¿ ‡’ûÅ ¬¸™¬¡¸¸Ê ˆÅ¸½ ¬¸¿¤¸¸½¢š¸÷¸ ˆÅ£÷¸½ íº‡ ‚¸¿.œÏ. ªú ¢Ÿ¸¢¥¸¿™ ¨¸¾Ô¸

¢¬¸¢¥¸Š¸º”õú ‚¿ ¸¥¸, Ÿ¸¾›¸¸Š¸º£ú ©¸¸.œÏ. ªú ÷¸ú˜¸¸Äˆţ ¸¸¾š¸£ú ˆ¼Å¢«¸ Ÿ¸½¥¸¸ ™¸¾£¸›¸ ‚¸¡¸¸½¢ ¸÷¸ œÏ¢÷¸¡¸¸½¢Š¸÷¸¸ Ÿ¸Ê ž¸¸Š¸ ¥¸½›¸½ ¨¸¸¥¸½ œÏ¢÷¸¡¸¸½¢Š¸¡¸¸Ê ˆÅ¸½ ¤¸ÿˆÅ ˆÅú ‚¸½£ ¬¸½ œ¸º£¬ˆÅ¸£ œÏ™¸›¸ ˆÅ£÷¸½ íº‡—

22

leejebieCe

efomebyej 2014

ˆ½Å›™º ¸£ ‚¿ ¸¥¸ ‚¸Š¸Ÿ¸›¸ œ¸£ Ÿ¸.œÏ. ‡›¸¤¸ú ¸ú (œ¸»¨¸Ä) ªú ‚¢›¸¥¸ ˆºÅŸ¸¸£ ž¸¥¥¸¸ ¤¸¸¢£œ¸™¸ ¦¬˜¸÷¸ ¬’½©¸›¸ ¤¸¸ ¸¸£ Ÿ¸Ê ŠÏ¸íˆÅ ¬¸½¨¸¸ ˆ½Å›Í ˆÅ¸ „Ö¸’›¸ ˆÅ£›¸½ ˆ½Å œ¸ä¸¸÷¸— ¬¸¸˜¸ Ÿ¸Ê ‚¸.œÏ. ªú £¸ ¸¢ˆÅ©¸¸½£ ¥¸ÊˆÅ¸, ‚¿.¢ ¸.œÏ. ªú Ÿ¸ºŸ¸ºÄ ‡¨¸¿ ‡›¸‚¸ƒÄ¬¸ú’ú¬¸ú ˆ½Å ¬’¸ûÅ ¬¸™¬¡¸

Ÿ¸º ¸ÉûÅ£œ¸º£ ‚¿ ¸¥¸ ׸£¸ œÏ¸¡¸¸½¢ ¸÷¸ `¬¸¸¿¬ˆ¼Å¢÷¸ˆÅ ¬¸¿š¡¸¸' ˆ½Å ‚¨¸¬¸£ œ¸£ ‚¸¿.œÏ. ªú £Ÿ¸½©¸ “¸ˆºÅ£, „œ¸ ‚¸¿.œÏ. ªú ¡¸» œ¸ú ¢¬¸¿í, ¬’¸ûÅ ¬¸™¬¡¸ ÷¸˜¸¸ œÏ¢÷¸ž¸¸Š¸úŠ¸µ¸—

í¸¨¸”õ¸ ‚¿ ¸¥¸, ˆÅ¸¤¸¥¸½ ©¸¸‰¸¸ Ÿ¸Ê `œÏš¸¸›¸Ÿ¸¿°¸ú ¸›¸š¸›¸ ¡¸¸½ ¸›¸¸' ˆ½Å ‚¿÷¸Š¸Ä÷¸ ŠÏ¸íˆÅ¸Ê í½÷¸º œ¸¸¬¸¤¸ºˆÅ ¢¨¸÷¸£µ¸ ¬¸Ÿ¸¸£¸½í Ÿ¸Ê ¬¸¿¤¸¸½¢š¸÷¸ ˆÅ£÷¸½ íº‡ ¨¸¢£.œÏ. ªú ‡ ˆ½Å ¢¬¸¿í—

ž¸¸Š¸¥¸œ¸º£ ‚¿ ¸¥¸ ׸£¸ ¬¸í£¬¸¸, œ¸»¢µ¸Ä¡¸¸ ‚¸¾£ ‚›¡¸ ¸Š¸í¸Ê œ¸£ Š¸£ú¤¸¸Ê ˆ½Å ¬¸í¸¡¸÷¸¸˜¸Ä ¥¸Š¸¸‡ Š¸‡ `ˆ¿Å¤¸¥¸ ¢¨¸÷¸£µ¸ ¢©¸¢¨¸£'ˆ½Å ™¸¾£¸›¸ „œ¸ ‚¸¿.œÏ. ªú ‡¬¸ œ¸ú ¢¬¸¿í, œÏ¤¸¿š¸ˆÅ ªú ‡›¸ ˆ½Å ‹¸¸½«¸ ‡¨¸¿ ‚›¡¸ ‚¢š¸ˆÅ¸¢£¡¸¸Ê ˆÅú „œ¸¦¬˜¸¢÷¸ Ÿ¸Ê ‡ˆÅ Š¸£ú¤¸ Ÿ¸¢í¥¸¸ ˆÅ¸ ˆ¿Å¤¸¥¸ ¢¨¸÷¸£µ¸—


›¸½©¸›¸¥¸ ¤¸¾¿¢ˆ¿ÅŠ¸ ¬¸Ÿ¸»í (œ¸¢© ¸Ÿ¸) / National Banking Group (West)

CMD Smt. V R Iyer, ZM (MSZ) Shri D K Garg, GM (HR) Shri Charan Singh & GM (Retail Assets & Publicity) Shri R C Baliarsingh in a Program on Inner Engineering with Sadhguru at Mumbai.

ED Shri B P Sharma felicitated CASA Campaign winners of NBG (W). Winners with ED Shri B P Sharma along with GM NBG (W) Shri Tarlochan Singh & ZM Shri P A Joshi at Pune Zone.

Goa Zone ZM Shri Sudhir S. Jade presenting a bouquet to Hon’ble Chief Minister of Goa Shri Laxmikant Parsekar along with Manager Shri Tapan Kumar Patro.

›¸¸Š¸œ¸º£ I ˆ½Å £¸Ÿ¸¢Š¸£ú Ÿ¸Ê Ÿ¸í¸£¸«’ï ˆ½Å Ÿ¸¸›¸›¸ú¡¸ Ÿ¸º‰¡¸Ÿ¸¿°¸ú ªú ™½¨¸½›Í ûÅ”›¸¨¸ú¬¸ ׸£¸ ‚¸¡¸¸½¢ ¸÷¸ ¤¸¾“ˆÅ ˆ½Å ™¸¾£¸›¸ Ÿ¸º‰¡¸Ÿ¸¿°¸ú ¬¸½ ¤¸¸÷¸ ¸ú÷¸ ˆÅ£÷¸½ íº‡ ›¸¸Š¸œ¸º£ ‚¿ ¸¥¸ 1 ˆ½Å ‚¸¿.œÏ. ªú œÏˆÅ¸©¸ ž¸¸Š¸¨¸÷¸¨¸¸£ ‡¨¸¿ ›¸¸Š¸œ¸º£ ‚¿ ¸¥¸ 2 ˆ½Å ‚¸¿.œÏ. ªú £Ÿ¸½©¸ ˆÅ™Ÿ¸—

Ratnagiri Zone GM NBG (W) Shri Tarlochan Singh along with ZM Shri V V Buche visited RSETI Sindhudurg at Zarap & distributed the completion certificates to trainees of the ongoing training program (Dress Designing for Women) to the participants.

Mumbai South Zone ZM Shri D K Garg, DZM Captain K P Singh, AGM (RBC) Shri R Panigrahi, AGM Smt. Prema T and other staff members during ‘RUN FOR UNITY’ organized by Central Government at Mumbai.

›¸¸Š¸œ¸º£ — ‚¿ ¸¥¸ Ÿ¸Ê ›¸£¸ˆÅ¸¬¸ ˆ½Å ¬¸¸¾ ¸›¡¸ ¬¸½ ¢¨¸î¸ú¡¸ ¬¸Ÿ¸¸¨¸½©¸›¸ œ¸£ ‚¸¡¸¸½¢ ¸÷¸ ˆÅ¸¡¸ÄÇÅŸ¸ Ÿ¸Ê Ÿ¸º.Ÿ¸.œÏ. (¬¸½¨¸¸¢›¸¨¸¼î¸) ªú ‡ œ¸ú ‹¸ºŠ¸¥¸ ˆÅ¸ ¬¨¸¸Š¸÷¸ ˆÅ£÷¸½ íº‡ ‚¸¿.œÏ. ªú œ¸ú ¸ú ž¸¸Š¸¨¸÷¸¨¸¸£ —

Pune Zone ZM Shri P A Joshi felicitating Ex-Staff Sportsperson and other Sportspersons during a function organized by Bank of India Sports Club, Pune.

Taarangan

December 2014

23


Precautions for use of Bank’s various IT and ITeS products Team Management Development Institute (MDI), Belapur

T

he economy of a country can function smoothly and without hassles if the banking system is not only flexible but also capable of meeting the new challenges posed by the technology and other external as well as internal factors. “Electronic Banking” is the need of the hour, which cannot be lost sight of. The last decade has brought about an all-embracing convergence of computing, communications, information and knowledge. This has radically changed the way we live, work, and think. The growth of high speed networks, coupled with the falling cost of computing power, has made possible applications undreamed of in the past. In a world where no one has a minute to spare and Internet access is everywhere, it makes sense to do our banking transactions online. Since technology is changing very fast, it has to be leveraged and used to the maximum, in order to deliver competitive advantage to a Bank. The downside to this is the constant threat of Internet scammers. These people target your online transactions, especially your online banking in order to steal your personal and financial data. Each Bank is striving hard to keep customers updated with the latest happenings in the computer security

24

leejebieCe

efomebyej 2014

world. We also shall discuss the steps to be followed for enjoying the benefits of Information Technology without sacrificing our safety. But prior to that let us talk about the various frauds or scams which have shaken the trust of the world. Identity Theft: Identity theft is one of the fastest growing concerns in cybercrime in India today. Identity theft is a crime in which an imposter obtains key pieces of personal information, such as PAN number or driving license number, in order to impersonate someone else. The information can be used to obtain credit, merchandise, and services in the name of the victim. In addition to running up debt, an imposter might provide false identification to police, creating a criminal record or leaving outstanding arrest warrants for the person whose identity has been stolen. Many a time we fall prey to the techniques and we ourselves give out information in shopping malls or such other places. There are instances in which we are handed over a small form by unknown people in malls saying that some scheme is being sponsored by the mall and a lucky person shall win a car etc. We fill up a form giving our name, address, mobile number and other information too. On some occasions we are being

told that a credit card shall be given absolutely free of charge and we are asked to fill up a form in which we also provide our bank details and credit card number. Preventing identity theft is very simple. We have to just manage our personal information carefully and sensibly. Shoulder Surfing: A visual hacker can infiltrate you from outside in. Quite literally, a person can peep over your shoulder while you’re using your computer or mobile, and collect your personal information you have entered on the screen. Shoulder surfing is an effective way to get information in crowded places because it’s relatively easy to stand next to someone and watch as they fill out a form or enter a PIN number at an ATM machine. To mitigate the risk of shoulder surfing, experts recommend that you shield paperwork or your keypad from view by using your body or cupping your hand. ATM Card Skimming and PIN capturing: A skimmer in the ATM world usually features two important pieces of hardware - A micro camera positioned within eyesight of the keypad, and a magnetic card reading device that captures your card details to “clone” your card. This is all the info a would-be thief needs. Similar things happen with POS terminals


Many a time we fall prey to the techniques and we ourselves give out information in shopping malls or such other places. There are instances in which we are handed over a small form by unknown people in malls saying that some scheme is being sponsored by the mall and a lucky person shall win a car etc.

in retail shops, sometimes with the employee’s knowledge and sometimes without. The cloned cards are then used for shopping at POS terminals to purchase expensive stuff. To prevent such frauds, just remember, “If something doesn’t feel right about an ATM, don’t use it.” Give the ATM a bit of scrutiny before using it. Does it look like the others nearby? Are there any strange-looking bits that bulge out? Look above the keypad or to the side for pinhole cameras. If anything seems out of place, don’t use it! Find another. Last but not least, cover your hand when entering your PIN number! It’s a really easy thing to do and that one step will absolutely make the collected card details worthless. Phishing Scams: Phishing scams are typically fraudulent email messages appearing to have come from legitimate enterprises e.g. your Internet service provider, your bank etc. These messages usually direct you to a spoofed web site (a look alike website or a cloned website) and prompts you to divulge private information (e.g., password, credit card number, or bank account updates). The perpetrators then use this private information to defraud you. Protecting yourself from such scams is also easy. Always remember reputable organizations and Banks will never use email to request that you reply with your password, Credit Card number or CVV number, or confidential personal information. Be suspicious of any email message that asks you to enter or verify

personal information, through a web site or by replying to the message itself. Always remember the Golden Rule Never reply to or click the links in a message. If you think the message may be legitimate, go directly to the Bank’s web site by typing the real URL into your browser.

connection is secure.  Never shop online, make financial transactions or login into accounts over free, unsecured WiFi networks.  Create long, unique, and hard to guess passwords. Never keep the same password for different online accounts. Never disclose the passwords. Don’t keep passwords in your wallet along with your credit cards.

Scam e-mail \ inheritance scams or a phone call: An inheritance scam is when a scammer contacts you out of the blue to tell you that you’ve been left, with or are entitled to claim, a large inheritance from a distant relative or wealthy benefactor who has died overseas. The scammer will pose as a lawyer, banker or other foreign official and will advise that the deceased left no other beneficiaries. Such fraudulent emails or telephone calls informing you that you have won lottery of millions of rupees or a unknown person has left you a fortune are not authentic. Never believe in them and never ever respond to such emails. Better to delete such mails without opening.

 Avoid checking ‘Keep me logged in’ or ‘Remember me’ options on websites, especially on public computers.

Having talked about these areas let us do a recap of one of most commented and read posts – The Do's and Don’ts of Internet Security. The following tips shall help enhance your digital experience.

 Access your bank’s website by manually typing its URL in the address bar.

 While giving away personal or financial information on any website, check if its URL begins with ‘https’. Also look for the padlock sign at the bottom of the screen, which indicates that the

 Keep your computer’s Firewall ON.

 While you are online in a public setting such as a coffee shop, mall, airport, etc., watch your back to make sure that no one’s snooping on you.  Before downloading any free software, research on the software and the website hosting it.

 Change your Internet banking passwords at periodical intervals.  Turn off Wi-Fi, Location Services and Bluetooth when not in use.

Taarangan

December 2014

25


CMD Smt. V R Iyer handing over a cheque of Rs 2 crores to Hon’ble Chief Minister Andhra Pradesh Shri Chandra Babu Naidu towards Chief Ministers’ Relief Fund for Hudhud victims along with GM NBG (S) Shri Kulbhushan Jain, GM NBG (C) Shri T Sudhakar, ZM Vishakhapatnam Zone Shri Sushil K Agrawal, ZM Hyderabad Zone Shri R S Chouhan and other dignitaries.

HELPING HAND TO HUDHUD AFFECTED PEOPLE OF

ANDHRA PRADESH

On 12.10.2014 some districts of Andhra Pradesh (Visakhapatnam, Srikakulam & Vizianagaram) were seriously affected by the terrific cyclone “HUDHUD” destroying Public and Private Property to large extent. BOI Visakhapatnam Zone witnessed the Cyclone effect and its damage to public and private property including Houses, Agriculture Crops, Trees, Electric Polls, Hoardings, Transport & Communication systems etc. At this crucial juncture, our Bank also extended helping hand to people who lost everything in this disaster. We have distributed household items and covered about 2000 families in the worst affected areas.

26

leejebieCe

efomebyej 2014


Safe use of INTERNET, e-commerce, social media and POS Team STC, Chennai.

T

he Internet has revolutionized the way we live our lives – enabling us to read the news, enjoy entertainment, carry out research, book our holidays, buy and sell, shop, network, learn, bank and carry out many other everyday tasks. However, there are a number of risks associated with going online. These result from either visiting malicious websites or inadvertent disclosure of personal information. We give below a few tips for the safe use of Internet and shopping online. SAFE USE OF INTERNET w Do not use simple passwords like ‘password’ or ‘123456’. Use strong passwords with a mixture of small and capital letters, numbers and special characters. w When agreeing to install some software from the Internet, always look for conditions like asking you to agree for receiving marketing and other information from other sites. Do not download unauthorized software from Internet. They may contain Malware. w Whenever you receive a mail claiming to be from a trusted company or Bank, be careful enough not to click on any link provided in the mail and part with vital information like, user id and passwords. w Do not give your full name, address and phone number online, to any one whom you don’t trust. w Keep your machine protected by an anti virus program, an Anti Malware program and a firewall. Do not use two firewalls as they may weaken one another. w When using a public wireless network, make sure to turn off file sharing and network discovery. These both put your files and system at risk for being opened by anyone on the wireless network, not just

hackers. In Windows, these options can be found under Control Panel > Network and Internet > Network and Sharing Center. In Mac OS X, they are under System Preferences > Sharing. If you are within range of public wireless networks but don’t need to be online, turn off your wireless capabilities altogether. w Only download files or software from sites that have been rated/ verified by trusted sources. w Never open e-mail attachments from strangers unless you can trust them and have security settings on your computer. Some junk e-mails may contain viruses or spyware that can harm your computer. These e-mails may be automatically marked as “spam” or “junk. SAFE E-COMMERCE w Secure sites use encryption technology to transfer information from your computer to the online merchant’s computer. Encryption scrambles the information you send, such as your credit card number, in order to prevent computer hackers from obtaining it en route. The only people who can unscramble the code are those with legitimate access privileges. Here’s how you can tell when you are dealing with a secure site: • If you look at the top of your screen where the Web site address is displayed (the “address bar”), you should see https://. The “s” that is displayed after “http” indicates that Web site is secure. Often, you do not see the “s” until you actually move to the order page on the Web site. • Another way to determine if a Web site is secure is to look for a closed padlock displayed on the address bar of your screen. If that lock is open, you should assume it is not a secure site.

w Do business with companies you already know. w Online merchants as well as other sites watch our shopping and surfing habits by using “cookies,” an online tracking system that attaches pieces of code to our Internet browsers to track which sites we visit as we search the Web. “Persistent” cookies remain stored on your computer while “session” cookies expire when you turn the browser off. Online merchants use cookies to recognize you and speed up the shopping process the next time you visit. You may be able to set your browser to disable or refuse cookies but the tradeoff may limit the functions you can perform online, and possibly prevent you from ordering online. Generally, you will need to enable session cookies to place an order. w Don’t answer any question you feel is not required to process your order. Often, the web site will mark which questions need to be answered with an asterisk (*). Should a company require information you are not comfortable sharing, leave the site and find a different company for the product you seek. w Many online shopping sites require the shopper to log-in before placing or viewing an order. The shopper is usually required to provide a username and a password. Never reveal your password to anyone. When selecting a password, do not use commonly known information, such as your birth date, mother’s maiden name, or numbers from your driver’s license or Social Security number. Do not reuse the same password for other sites, particularly sites associated with sensitive information. The best password has at least eight characters and includes numbers and letters.

Taarangan

December 2014

27


Sunila Rao Shiroda–Goa branch.

I

nternet, World Wide Web, Social Networking sites, Search Engines, Android phones…. all these have become such an integral part of our lives that today people may forget their wallets at home but will never be caught without their mobile phones….hi-tech gadgets have greatly simplified our lives and enriched it too. Most educated and tech savvy people now do not prefer to stand in lines to book tickets….railways, bus, airlines, movie, theatre plays tickets are all obtained online in a hassle free manner, shopping for books, clothes, groceries, vegetables and a range of consumer durables is done on-line and a sms reaches your mobile giving all details of the transaction.

28

leejebieCe

efomebyej 2014

TECH WORLD While I do appreciate the freedom and hassle free manner of obtaining things on-line, what amazes me is that with all the time we are supposed to have because of these time saving gadgets, we still crib that we have NO TIME !!! No time to read, see movies, walk, exercise, meet up with families/friends in person ….How is that possible ?????!!!!! I have arrived at this amusing conclusion ( I am not jumping to any conclusions …because jumping to conclusions is bad for the health !!!!) …now people prefer not to use the gray matter in their brains even for simple things like spellings …as because of SPELL CHECK they need not remember spellings and various SEARCH ENGINES on the INTERNET give


,,

The hi-tech gadgets are meant to simplify our lives but somehow human beings end up getting so addicted to them that today I read about people getting depressed/devastated if they are not logging on to various social net working sites like Facebook, Twitter and the like…and my friends say how lost they are without their cell phones…!!!! I wish they had said they are lost without good friends like ME !!!! But NO.

,,

all answers at the touch of a finger !!!! So how will people use their gray matter to use the spare time obtained by use of hitech gadgets.

Letter writing on pages is no longer in vogue as all send emails…..soon letter writing on Inlands, post cards, greeting cards will be behind the times.

I remember fondly those days of DICTATION exams we had in school and I still enjoy the SPELLING BEE contests broadcast on NAT GEO channel….it’s so exciting to see/ hear students spell exotic and very tough words. That sure requires some brains ….wow !!!

That’s why it pleases me immensely when I encounter adults/ children who are not high on/addicted to any tech gadgets and still enjoy life in normalcy…being agile physically is an importance aspect of human life…it leads to good physical, mental health and thus to a more satisfying way of life but unfortunately human beings tend to follow the herd and soon they realize that they must undergo DETOX programmes to get rid of the tech addiction. Sad days indeed…..!!! It was an eye opener for me to see the movie THE SOCIAL NETWORK based on Mark Zukerberg, the founder of FACEBOOK. Why and how he created FACEBOOK is a revelation.

Yes…APPLE INC. founder Steve Jobs has created amazingly cool …uber cool mobile phone features and with that we are never away from our near and dear ones….so to say…..we prefer to chat on WHATSAPP even with family members who may be in the next room…..we prefer the phone to remind us to do our chores…..dates of bills/meetings, birthdays, anniversaries….all conveyed to us by the cell phone. .once we down load all that data into it and empty our brains… Ha ha !!! Little wonder …that whenever I walk out, travel in buses, trains, planes….I notice that all…sorry, most of the people are with a dazed look ….staring intently at their gizmos…. and completely unaware of the person sitting next to them…. in fact not even bothered as they are so wrapped up in the cell that they seem to hesitate the company of another physically present human being….they want only the people/matter (various APPS) ON LINE… and not in REAL TIME. The hi-tech gadgets are meant to simplify our lives but somehow human beings end up getting so addicted to them that today I read about people getting depressed/devastated if they are not logging on to various social net working sites like Facebook, Twitter and the like…and my friends say how lost they are without their cell phones…!!!! I wish they had said they are lost without good friends like ME !!!! But NO. It was a sad day for me to know that telegrams have been relegated to the gardens of history….

Text messaging is a new phenomena….while writing on papyrus, leaves, papers has been on for a long long time the last decade has had a quantum leap into the future as far as tech advancements go and now the future generations will only use their fingers to touch screen and lo !!! everything… hmmm…not everything…but most things are available at the touch of the screen on the phones. Research is on for coming up with phones with features like phones operating on the thoughts of the user…..!!!! That’s why miracles never cease…..yet human beings …fragile as we are..we still need the HUMAN TOUCH to feel alive, feel loved, admired, wanted… as that gives us the motivation to achieve/research for newer inventions. Finally, do I own a cell phone?…I do, but it is so simple yet in working condition that all I do is regularly make time to keep in touch with the people I want to and who mean a lot to me. So, lets get moving in every which way….physically, mentally and feel alive …instead of getting reduced to being zombies.

"¬¸º›¸¸½ ŠÏ¸íˆÅ¸½, ¢™‰¸¸‚¸½ ¬¸Ÿ¸ ¸™¸£ú œ¸¸¬¸¨¸”Ä ¢ˆÅ¬¸ú ˆÅ¸½ ›¸¸ ¤¸÷¸¸‚¸½, ›¸¸ ƒ¬¸ˆÅú ˆÅ£¸½ ¢í¬¬¸½™¸£ú, Ÿ¸½í›¸÷¸ ¬¸½ ¸Ÿ¸¸ ¢ˆÅ‡ ³œ¸¡¸¸½¿ ˆÅú ÷¸ž¸ú í¸½Š¸ú œ¸í£½™¸£ú ¨¸›¸¸Ä ¡¸½ ™º¢›¸¡¸¸ ‰¸¸÷¸½ ˆÅú £ÆˆÅŸ¸ „”õ¸ ¥¸½ ¸¸‡Š¸ú ¬¸¸£ú" - ‚¢ ¸÷¸ ˆºÅŸ¸¸£ œ¸¸½™Ã™¸£, ûÅ£ú™ˆÅ¸½’ ©¸¸‰¸¸.

Taarangan

December 2014

29


›¸½©¸›¸¥¸ ¤¸¾¿¢ˆ¿ÅŠ¸ ¬¸Ÿ¸»í (Ÿ¸š¡¸) / National Banking Group (Central)

CMD Smt V R Iyer during her visit to Kudasan Branch, (Rural and Mahila Branch) Gandhinagar Zone along with CGM (Intll.) Shri R A Shankar Narayanan, GM NBG (C) Shri T Sudhakar, ZM Shri Rajeev Pathak DGM Shri Relan, Br. Mgr. Shri Kakashan Ansari & other branch staff.

ƒ¿™¸¾£ ‚¿ ¸¥¸ Ÿ¸Ê ‚¸¡¸¸½¢ ¸÷¸ `¥¸¸½ˆÅ ‚™¸¥¸÷¸' Ÿ¸Ê ¬¸ú‡Ÿ¸”ú ªúŸ¸÷¸ú ¨¸ú ‚¸£ ‚¡¡¸£, ‚¸¿.œÏ. ªú ‡Ÿ¸ ©¸›Ÿ¸ºŠ¸Ÿ¸ ‡¨¸¿ ‚›¡¸ ‚¢š¸ˆÅ¸£úŠ¸µ¸—

‚ퟸ™¸¤¸¸™ ‚¿ ¸¥¸ ™¸¾£½ ˆ½Å ™¸¾£¸›¸ ¬¸ú‡Ÿ¸”ú ªúŸ¸÷¸ú ¨¸ú ‚¸£ ‚¡¡¸£ ‚¿ ¸¥¸ ˆ½Å ¬’¸ûÅ ¬¸™¬¡¸¸Ê ˆÅ¸½ ¬¸¿¤¸¸½¢š¸÷¸ ˆÅ£÷¸½ íº‡— ¬¸¸˜¸ Ÿ¸Ê, Ÿ¸.œÏ. ‡›¸¤¸ú ¸ú (¬¸Ê’¥ï ¸) ªú ’ú ¬¸ºš¸¸ˆÅ£, Ÿ¸º‰¡¸ Ÿ¸.œÏ. ªú ‚¸£ ‡ ©¸¿ˆÅ£ ›¸¸£¸¡¸µ¸›¸ ‡¨¸¿ „œ¸¦¬˜¸÷¸ ¬’¸ûÅ ¬¸™¬¡¸ —

‚ퟸ™¸¤¸¸™ ‚¿ ¸¥¸ ˆÅú ¸Ÿ¸¸¥¸œ¸º£ ©¸¸‰¸¸ Ÿ¸Ê ‡ˆÅ ŠÏ¸íˆÅ ˆ½Å ¬¸¸˜¸ `ƒÄ-Š¸¾¥¸£ú' ˆÅ¸ ©¸ºž¸¸£¿ž¸ ˆÅ£÷¸½ íº‡ Ÿ¸.œÏ. ‡¨¸¿ ¬¸ú‡ûÅ‚¸½ ªú ‚›¸¿÷¸ „œ¸¸š¡¸¸¡¸, Ÿ¸.œÏ. ‡›¸¤¸ú ¸ú (Ÿ¸š¡¸) ªú ’ú ¬¸ºš¸¸ˆÅ£, ‡¨¸¿ ‚¸¿.œÏ. ªú ‚¸£ ˆ½Å ¢Ÿ¸°¸¸—

GM, NBG (C) Shri T Sudhakar, ZM Shri Rajeev Pathak, & DZM Shri Shishu Pal & other staff and participants during RSM meet held at Gandhinagar Zone.

„ ¸¾›¸ ‚¿ ¸¥¸ Ÿ¸Ê ‚¸£‡¬¸‡Ÿ¸ ˆ½Å ¢¥¸‡ ‚¸¡¸¸½¢ ¸÷¸ ¤¸¾“ˆÅ Ÿ¸½¿½ ¬¸¿¤¸¸½¢š¸÷¸ ˆÅ£÷¸½ Ÿ¸.œÏ. ‡›¸¤¸ú ¸ú (Ÿ¸š¡¸) ªú ’ú ¬¸ºš¸¸ˆÅ£— Ÿ¸¿ ¸¸¬¸ú›¸ ‚¸¿.œÏ. ªú ‡ ˆ½Å œ¸¸“ˆÅ, „œ¸ ‚¸¿.œÏ. ªú ¢¤¸Ô¸º÷¸ ˆºÅ›” ‡¨¸¿ ‚¿ ¸¥¸ ˆÅú ©¸¸‰¸¸‚¸Ê Ÿ¸Ê œ¸™¬˜¸ ‚¸£‡¬¸‡Ÿ¸ (ƒ¿¬¸½’) —

„ ¸¾›¸ ‚¿ ¸¥¸ Ÿ¸Ê ‚¸£¤¸ú‚¸ƒÄ ׸£¸ ¢¨¸î¸ú¡¸ ¬¸¸®¸£÷¸¸ ‡¨¸¿ ¬¸Ÿ¸¸¨¸½©¸›¸ ˆ½Å ¢¥¸‡ ‚¸¡¸¸½¢ ¸÷¸ ¸›¸¬¸¿œ¸ˆÄÅ ˆÅ¸¡¸ÄÇÅŸ¸ Ÿ¸Ê ¸›¸¬¸Ÿ¸»í ˆÅ¸½ ¬¸¿¤¸¸½¢š¸÷¸ ˆÅ£÷¸½ íº‡ ®¸½.¢›¸™. ‚¸£¤¸ú‚¸ƒÄ ªú Ÿ¸º£¥¸ú £¸š¸¸ˆ¼Å«µ¸›¸— ¤¸¸‡¿ ¬¸½ Ÿ¸¿ ¸¸¬¸ú›¸ Ÿ¸º.œÏ. ªú ˆ½Å ¬¸ú ©¸Ÿ¸¸Ä, „œ¸ Ÿ¸.œÏ. ‚¸£¤¸ú‚¸ƒÄ ªú ‡¬¸ ‡¬¸ Š¸ºœ÷¸¸, ‚¸¿.œÏ. ªú ‡ ˆ½Å œ¸¸“ˆÅ ‡¨¸¿ ŠÏ¸Ÿ¸ ¬¸£œ¸¿ ¸ ªúŸ¸÷¸ú Ÿ¸¸¿Š¸» ¤¸¸ƒÄ—

ƒ¿™¸¾£ ‚¿ ¸¥¸ ˆ½Å ™î¸úŠ¸¸£¸ Ÿ¸Ê ‚¸£¤¸ú‚¸ƒÄ ˆ½Å ¸›¸¬¸¿œ¸ˆÄÅ ˆÅ¸¡¸ÄÇÅŸ¸ Ÿ¸Ê ¤¸ÿ¢ˆ¿ÅŠ¸ ¬¸º¢¨¸š¸¸‚¸Ê ¨¸ ¬¸½¨¸¸‚¸Ê ˆÅú ¸¸›¸ˆÅ¸£ú ™½÷¸½ íº‡ ‚¸¿.œÏ. ªú ‡Ÿ¸ ©¸›Ÿ¸ºŠ¸Ÿ¸ — ¬¸¸˜¸ Ÿ¸Ê, ‚¸£¤¸ú‚¸ƒÄ, ž¸¸½œ¸¸¥¸ ˆ½Å ®¸½.¢›¸™. ªú Ÿ¸º£¥¸ú £¸š¸¸ˆ¼Å«µ¸›¸ ¨¸ „œ¸ Ÿ¸.œÏ. ªú ‡¬¸ ‡¬¸ Š¸ºœ÷¸¸ ‡¥¸”ú‡Ÿ¸ š¸¸£ ªú ‚¸£ ˆ½Å ¸¾›¸ —

30

leejebieCe

efomebyej 2014


›¸½©¸›¸¥¸ ¤¸¾¿¢ˆ¿ÅŠ¸ ¬¸Ÿ¸»í (™¢®¸µ¸) / National Banking Group (South)

Chennai Zone, Madipakkan Branch financed ‘Dental Clinic’ under Doctor Plus Scheme. Former RBI Governer Shri C Rangarajan inaugurating Clinic in presence of ZM Shri Sripada S Rao and Borrower Dr. Jayakrishnan.

ZM Shri V Anand handing over Cheque to Director of M/s Kochi Biennale Foundations Shri Bose Krishnamachari, COO of the foundation Shri P M Shirajuddin, DZM Shri T Raveendran.

í¾™£¸¤¸¸™ ‚¿ ¸¥¸ ˆÅú ¢›¸ ¸¸Ÿ¸¸¤¸¸™ ©¸¸‰¸¸ ׸£¸ ``¢¨¸î¸œ¸¸½¢«¸÷¸ ¤¸¬¸'' ˆÅú ¸¸ž¸ú ŠÏ¸íˆÅ ªú ‡ ¢¨¸ ¸¡¸ ˆÅ¼«µ¸¸ ˆÅ¸½ ¬¸¸ÿœ¸÷¸½ íº‡ ©¸¸.œÏ. ªú ‚¢›¸¥¸ ¬¸¸í»— ¬¸¸˜¸ Ÿ¸½¿, ‚¢š¸ˆÅ¸£ú (œÏ.©¸¸.) ªúŸ¸÷¸ú œÏ©¸¸¢›÷¸ ‚¸¾£ †µ¸ ‚¢š¸. ªú £¸ ¸½©¸ Ÿ¸¸Š¸¿’ú—

SME City Centre, Tirupur AGM Shri Nagarajan addressing the customers and listening to their complaints during ‘Customer Meet’.

Karnataka Zone, Ramanagara Branch organized “Loan Mela” for financing 10 women Joint liability groups (JLG). Branch Manager Shri Manu R distributing sanction letters to JLG members

Visakhapatnam Zone participated in ‘35th Andhra Pradesh State Dental Conference’ at Port Trust Ground, Visakhapatnam. DZM Shri C C C Patnaik & marketing staff at Stall.

ž¸¸½œ¸¸¥¸ ‚¿ ¸¥¸ ˆÅú ’ú ’ú ›¸Š¸£ ©¸¸‰¸¸ ˆ½Å 50 ¨¸«¸Ä œ¸»µ¸Ä í¸½›¸½ œ¸£ ‚¸¡¸¸½¢ ¸÷¸ ˆÅ¸¡¸ÄÇÅŸ¸ Ÿ¸Ê ¬¸ŸŸ¸¸›¸›¸ú¡¸ ŠÏ¸íˆÅ¸Ê ˆÅ¸½ ¬¸¿¤¸¸½¢š¸÷¸ ˆÅ£÷¸½ íº‡ ‚¸¿.œÏ. ªú ™¨¸ÊÍ œ¸¸¥¸ ©¸Ÿ¸¸Ä—

ž¸¸½œ¸¸¥¸ ˆ½Å œÏ¢¬¸Ö „÷¬¸¨¸ Ÿ¸½¥¸½ Ÿ¸Ê ¤¸ÿˆÅ ˆ½Å ¬’¸Á¥¸ ˆÅ¸ ŠÏ¸íˆÅ¸Ê ˆÅú „œ¸¦¬˜¸¢÷¸ Ÿ¸Ê „™Ã‹¸¸’›¸ ˆÅ£÷¸½ íº‡ ž¸¸½œ¸¸¥¸ ‚¿ ¸¥¸ ˆ½Å ‚¸¿.œÏ. ªú ™¨¸ÊÍ œ¸¸¥¸ ©¸Ÿ¸¸Ä—

Taarangan

December 2014

31


ˆÅ¸¨¡¸¸¿ ¸¢¥¸ / Kavyanjali

NAMES GIVEN TO WOMEN IN HINDU PURANS AND THE EPICS

Dr. Kshitija is MBBS and is doing her PG. She treated a 3 years old girl (rape victim) and expressed her deepest emotions through this poem. She is daughter of Smt. Amita patil working in Security Department, HO

She is a flower waiting to bloom, Pondering on immense possibilities That around the corner loom. Her little heart yearning to touch the sky, Oh, can she? Can she please fly? Alas! One day a dark man spells doom! Now for happiness there is no room. Where is the smile? Where are the stars? There is but a traumatized body And a mind full of scars. Struggling for life as dreams escape by, Tears in her eyes innocently ask, "Why?"

DO WE HAVE ANSWER ?

ퟸ¸£¸ ÷¸¸£¸¿Š¸µ¸... ¤¸¸à¸ ˆÅ¥¸½¨¸£ ¢ ¸î¸¸ˆÅ«¸ÄˆÅ ž¸¸£÷¸ Ÿ¸¸÷¸¸ ˆ½Å ‚¸¿ ¸¥¸ Ÿ¸Ê ¸Ÿ¸ˆÅ £í¸ ‚œ¸›¸¸ ÷¸¸£¸¿Š¸µ¸ ©¸¤™-©¸¢Æ÷¸ ˆ½Å ‚¸½ ¸ ÷¸½ ¸ ¬¸½ ¸¿ˆ¼Å÷¸ ˆÅ£÷¸¸ ¬¸¤¸ˆÅ¸ ÷¸›¸-Ÿ¸›¸ ž¸¸£÷¸ Ÿ¸¸÷¸¸ ˆ½Å ............ ƒ¬¸ˆ½Å œ¸››¸½-œ¸››¸½ œ¸£ ¢™‰¸÷¸¸ í¾ ¬¸÷¸£¿Š¸¸ ¢ ¸¿÷¸›¸ ‚›¸º¢ ¸¿÷¸›¸ ž¸¸¨¸ž¸»¢Ÿ¸ ˆÅ¸½ ‚¸¥¸¸½¢”÷¸ ˆÅ£ ¸¸÷¸¸ ƒ¬¸ˆÅ¸ Ÿ¸¸¾›¸ ¬¸Ÿ¸œ¸Äµ¸ ž¸¸£÷¸ Ÿ¸¸÷¸¸ ˆ½Å ............

ž¸ú÷¸£ ¸¸¿ˆÅú ž¸ú Ÿ¸›¸Ÿ¸¸½íˆÅ ¤¸ÿˆÅ ˆÅú Š¸¸¾£¨¸ Š¸¢£Ÿ¸¸ í½÷¸º ¢›¸÷¸ ›¸»÷¸›¸ ˆÅ£ £í¸ œÏ™©¸Ä›¸ ž¸¸£÷¸ Ÿ¸¸÷¸¸ ˆ½Å ............ ¬¸¸Ÿ¸¿ ¸¬¡¸ ¢¤¸“¸ ž¸¸«¸¸ ˆÅ¸ ‚¸¥¸¸½¢ˆÅ÷¸ ˆÅ£ œ¸˜¸ ‚¸©¸¸ ˆÅ¸ œÏ½£ˆÅ ¬¸»°¸ ¤¸÷¸¸ ¸¸÷¸¸ í¾ ƒ¬¸ˆÅ¸ ¬¸£¥¸ ©¸¸¦¤™ˆÅ ¢ ¸°¸µ¸ ž¸¸£÷¸ Ÿ¸¸÷¸¸ ˆ½Å ............

¸¿™›¸ ˆºÅŸ¸¸£ ¸¸¾š¸£ú ˆ½Å£¥¸ ‚¿ ¸¥¸ 32

leejebieCe

efomebyej 2014

Aditi- because she is not dependent Aghnya- for she is not to be hurt Brihati- for she is large hearted Chandra- for she is happy Devakama- since she is pious Devi- since she is divine Dhruva- for she is firm Havya- because she is worthy of invocation Ida- for she is worshipped Jyota- because she is illuminating Kamya- because she is desirable Kshama- for she is tolerant/indulgent/patient Mahi- since she is great Mena- because she deserves respect Nari- for she is not inimical to anyone Purandhih- for she is munificent liberal Ranta- because she is lovely Rtavatai, Rtachit- for she is the preserver/forester of truth Sanjaya- since she is victorious Sarasvati- since she is scholarly Simhi- since she is courageous Shiva- for she is benevolent Shivatama- since she is the noblest Stri- since she is modest Subhaga- because she is fortunate Subhdha- for she is knowledgeable Sumangali- since she is auspicious Susheva- for she is pleasant Suvarcha- since she is splendid Suyama- since she is self-disciplined Syona- for she is noble Virini- since she is mother of brave sons Vishruta- since she is learned Yashasvati- for she is glorious Yosha- because she is intermingled with man, she is not separate

K Vasudevan IA, Southern ZAO Chennai


¤¸½’ú í¸½›¸½ ˆÅ¸ ™™Ä (™¸¢Ÿ¸›¸ú ˆÅ¸½ ¬¸Ÿ¸¢œ¸Ä÷¸) Ÿ¸¸¿ Ÿ¸½£ú ¬¸¸¿¬¸Ê ‚¤¸ Ÿ¸½£¸ ¬¸¸˜¸ Ž¸½”õ £íú íÿ ¤¸íº÷¸ ™™Ä ™½ˆÅ£ ÷¸º ¸½ ˆºÅŽ ˆÅ훸½ ¸¸ £íú í»¿ ‚¸ ¸ Ÿ¸½£ú ¢¨¸™¸ƒÄ Ÿ¸Ê ¸¤¸ ¬¸¢‰¸¡¸¸¿ ¢Ÿ¸¥¸›¸½ ‚¸‡¿Š¸ú ¬¸û½Å™ ¸¸½”õ½ Ÿ¸Ê Ÿ¸ºÃ ¸½ ¢¥¸œ¸’¸ ™½‰¸ ¢¬¸¬¸ˆÅ-¢¬¸¬¸ˆÅ ‚¸¿¬¸» ¤¸í¸‡¿Š¸ú ¥¸”õˆÅú í¸½›¸½ ˆÅ¸ ‰¸º™ œ¸½ ‚ûŬ¸¸½¬¸ ¸÷¸¸‡¿Š¸ú.... Ÿ¸¸¿ ÷¸» „›¸¬¸½ ˆÅí ™½›¸¸ ™¢£¿™¸Ê ˆÅú ™º¢›¸¡¸¸ Ÿ¸Ê ¬¸¿ž¸¥¸ ˆÅ£ £í›¸¸ Ÿ¸¸¿ £¸‰¸ú œ¸£ ž¸ƒÄ¡¸¸ ˆÅú ˆÅ¥¸¸ƒÄ ¸¤¸ ¬¸»›¸ú £í ¸¸‡Š¸ú ¢÷¸¥¸ˆÅ Ÿ¸¸˜¸½ œ¸½ ˆÅ£›¸½ ˆÅ¸½ Ÿ¸½£ú ²Åí ž¸ú Ÿ¸ ¸¥¸ ¸¸‡Š¸ú Ÿ¸¸¿ ÷¸» ž¸ƒÄ¡¸¸ ˆÅ¸½ £¸½›¸½ ›¸íú¿ ™½›¸¸ Ÿ¸ÿ ¬¸¸˜¸ í»¿ í£ œ¸¥¸ „›¸¬¸½ ˆÅí ™½›¸¸ Ÿ¸¸¿, œ¸¸œ¸¸ ž¸ú Žºœ¸-Žºœ¸ ˆÅ£ ¤¸íº÷¸ £¸½‡¿Š¸½ Ÿ¸ÿ ˆºÅŽ ›¸ ˆÅ£ œ¸¸¡¸¸, ¬¸¸½ ¸ ˆÅ£ ‰¸º™ ˆÅ¸½ ˆÅ¸½¬¸ÊŠ¸½ Ÿ¸¸¿ ™™Ä „›íÊ ¡¸í í¸½›¸½ Ÿ¸÷¸ ™½›¸¸ ƒ¥ ¸¸Ÿ¸ ˆÅ¸½ƒÄ ¥¸½›¸½ Ÿ¸÷¸ ™½›¸¸ ¨¸¸½ ‚¢ž¸Ÿ¸¸›¸ í¾ Ÿ¸½£¸, ¬¸ŸŸ¸¸›¸ í¾ Ÿ¸½£¸ „›¸¬¸½ ¤¸¬¸ ƒ÷¸›¸¸ ˆÅí ™½›¸¸ Ÿ¸¸¿ ¥¸¸½Š¸ ÷¸º ¸½ ¬¸÷¸¸‡¿Š¸½ Ÿ¸º ¸½ ‚¸ ¸¸™ú ™½›¸½ ˆÅ¸ ‚¸£¸½œ¸ ÷¸ºŸ¸œ¸£ ¥¸Š¸¸‡¿Š¸½ Ÿ¸¸¿ ¬¸¤¸ ¬¸í ¥¸½›¸¸, œ¸£ ¡¸½ Ÿ¸÷¸ ˆÅ훸½ ™½›¸¸ ‚Š¸¥¸½ ¸›Ÿ¸ Ÿ¸º ¸½ ¢¤¸¢’¡¸¸ Ÿ¸÷¸ ™½›¸¸

¬¸¢ ¸›¸ ˆºÅŸ¸¸£ ¸½››¸ƒÄ Ÿ¸º‰¡¸ ©¸¸‰¸¸ ¸½››¸ƒÄ

¢Ÿ¸¥¸ú ¸¤¸ œÏ¤¸¿š¸ˆÅú íŸ¸Ê íŸ¸ ž¸ú ‰¸»¤¸ ˆ»Å™½, ‰¸»¤¸ ƒ÷¸£¸‡, ¢Ÿ¸¥¸ú ¸¤¸ œÏ¤¸¿š¸ˆÅú íŸ¸Ê ‰¸¤¸£ ¡¸½ ‚œ¸›¸½ Š¸¸Â¨¸ Ÿ¸Ê ™»£-™»£ ÷¸ˆÅ ¬¸º›¸¸‡, ¢Ÿ¸¥¸ú í¾ œÏ¤¸¿š¸ˆÅú ퟸʗ ¨¸¢£«“¸Ê ˆÅú œ¸í¥¸ú œ¸¬¸¿™ ¤¸›¸ÊŠ¸½, Ÿ¸›¸ íú Ÿ¸›¸ ¡¸½ ¬¸¸½ ¸ ¢¥¸¡¸¸ ´ õ ¢¨¸æ¸¸¬¸ Ÿ¸›¸ Ÿ¸Ê ˆÅ£ˆ½Å, ©¸¸‰¸¸ ˆÅú ÷¸£ûÅ ¸¸½ ˆ»Å ¸ ¢ˆÅ¡¸¸— ™¸½ ¸¸£ ŽÀ íÉ÷¸¸Ê ÷¸ˆÅ ÷¸¸½ íŸ¸Ê ¤¸”õ¸ ‚¸£¸Ÿ¸ ¥¸Š¸›¸½ ¥¸Š¸¸ ퟸ ¬¨¸¡¸¿ ˆÅ¸½ ¢¨¸«µ¸º ¬¸Ÿ¸ ¸›¸½ ¥¸Š¸½, ©¸¸‰¸¸ ¨¸¾ˆºÅµ“ š¸¸Ÿ¸ ¥¸Š¸›¸½ ¥¸Š¸¸— ¢ûÅ£ ‡ˆÅ ¢™›¸ ˆ¾Å¥¸¸©¸ œ¸¨¸Ä÷¸ ¬¸½ ûöŸ½›¸ ‚¸¡¸¸ Æ¡¸¸ ˆÅ£ £í½ í¸½, ‚¸£¸Ÿ¸ ûÅ£Ÿ¸¸ £í½ í¸½— ÷¸ºŸí¸£½ ¬¸¸£½ figures below march í¾¿, Æ¡¸¸ Ÿ¸ºÉ÷¸ ˆÅú salary ‰¸¸ £í½ í¸½— closing ‚¸ £íú í¾, login day ž¸ú í¾, ’¸£Š¸½’ ¬¸¸£½ œ¸»£½ ˆÅ£¸½ ¸¥™ú ‚¸‚¸½, ™½£ ¬¸½ ¸¸‚¸½ œ¸£, ‚š¸»£½ ˆÅ¸Ÿ¸ ¬¸¸£½ œ¸»£½ ˆÅ£¸½— ™¸½ ¬¸¸¥¸ ˆÅú ¤¸ÿ¢ˆ¿ÅŠ¸ Ÿ¸Ê, Ÿ¸ÿ Æ¡¸¸-Æ¡¸¸ ˆÅ³Â , Ÿ¸ÿ £‹¸º£¸Ÿ¸ £¸ ¸›¸ ÷¸¸½ ›¸íú¿ Ÿ¸ÿ ž¸ú ™¸½ í¸˜¸ ™¸½ œ¸¾£¸Ê ¨¸¸¥¸¸ Ÿ¸¸›¸¨¸ í»Â , ˆÅ¸½ƒÄ ™©¸¸›¸›¸ ÷¸¸½ ›¸íú¿— ¢ûÅ£ ž¸ú ퟸ›¸½ ¢íŸŸ¸÷¸ ›¸ í¸£ú, ¢›¸ˆÅ¥¸ œ¸”õ½ business ˆÅú ÷¸¥¸¸©¸ Ÿ¸Ê Ÿ¸½‹¸›¸¸™, ˆºÅŸž¸ˆÅµ¸Ä, ‚¸¾£ ˆºÅŽ ¢¨¸×¸›¸Ã œ¸¿¢”÷¸ ¬¸¤¸ ˜¸½ ퟸ¸£½ ¬¸¸˜¸ Ÿ¸Ê— Š¸¸Â¨¸ Ÿ¸Ê ¥¸¸½Š¸¸Ê ›¸½ "íŸ¸Ê ¥¸¸½›¸ ™¸½, ¥¸¸½›¸ ™¸½" ˆÅ툽Š‹¸½£ ¢¥¸¡¸¸ ©¸í£ Ÿ¸Ê ¥¸¸½Š¸¸Ê ›¸½ "ˆÅíú¿ deposit ›¸¸ Ÿ¸¸¿Š¸ ¥¸½" ¡¸½ ¬¸¸½ ¸ ˆ½Å Ÿ¸º¿í û½Å£ ¢¥¸¡¸¸— Closing í¸½ Š¸¡¸ú, ퟸ ˆÅ¸½ƒÄ ž¸ú target achieve ›¸¸ ˆÅ£ ¬¸ˆ½Å Ÿ¸£½ œ¸”õ½ ˜¸½ ¸¸½ NPA ‰¸¸÷¸½, „›íÊ ¬¸ ¸ú¨¸ ›¸¸ ˆÅ£ ¬¸ˆ½Å— ûöŸ½›¸ ˆÅú ‹¸¿’ú ¤¸ ¸ú ÷¸¸½ ¸œ¸£¸¬¸ú ¤¸¸½¥¸¸ ¬¸£ ˆ¾Å¥¸¸©¸ œ¸¨¸Ä÷¸ ¬¸½ ûöŸ½›¸ í¾— ˜¸£˜¸£¸÷¸½ œ¸¾£, ˆÅ¸¿œ¸÷¸½ í¸½“¸Ê ¬¸½ ퟸ›¸½ œ¸»Ž¸ ¢ˆÅ ˆÅ¸¾›¸ í¾? ¬¨¸¡¸¿ ¢°¸›¸½°¸ú ¤¸¸½¥¸½ ˆÅú ÷¸ºŸí¸£ú œÏ¤¸¿š¸ˆÅ ˆÅú ˆºÅ¬¸úÄ ˆÅ¸½ ퟸ›¸½ ž¸¬Ÿ¸ ˆÅ£ ¢™¡¸¸ í¾— ‚¸¾£ ÷¸ºŸí¸£¸ ¬˜¸¸›¸¸¿÷¸£µ¸ ž¸ú ¢ˆÅ¦«ˆÅ›š¸¸ ˆ½Å ‹¸›¸½ ¸¿Š¸¥¸¸Ê Ÿ¸Ê ˆÅ£ ¢™¡¸¸ í¾— ퟸ ¤¸íº÷¸ £¸½‡, ¤¸íº÷¸ ˆº¿Å“¸‡, ¢Ž›¸ú ¸¤¸ œÏ¤¸¿š¸ˆÅú ퟸ¬¸½ œ¸Ž÷¸¸÷¸½ íú £í Š¸‡, ¢Ž›¸ú ¸¤¸ œÏ¤¸¿š¸ˆÅú ퟸ¬¸½—

‚¸©¸ú«¸ ªú¨¸¸¬÷¸¨¸ "¢ ¸°¸¸¿©¸" œ¸¸¥¸ú (£÷›¸¸¢Š¸£ú) ©¸¸‰¸¸ £÷›¸¸¢Š¸£ú ‚¿ ¸¥¸

Taarangan

December 2014

33


Cyber Terrorism-

A threat to the Society

Protect your devices - PCs, Laptops, Smart Phone, iPad, Tabs, Mobile Apps etc.

Team Staff Training College, Kolkata

B

anking over the years has been redefined and as on today, we have Branch Banking and Technology Banking. With the change in scenario in the industry, all the Banks have shifted the gear in favour of technology banking. The alternate Delivery Channel(ADC) of the Bank is becoming heavier with a lot of products for the customers. The present generation customers are also more inclined towards the ADC as they do not have much time to visit the Branch and moreover all the facilities of Banking can be used from the comfort of their home/Office. In case of Branch Banking, the physical security was the prime objective of any Bank. But with the introduction of technology Banking, other than the physical security, Banks have to take care the logical security, network security and administrative security. Also in case of traditional Banking, security was mainly the responsibility of the concerned Bank. But in case of Technology Banking, the security is equally distributed between the Bank and its customer. The Bank on its part is taking various measures to protect its customers.

34

leejebieCe

efomebyej 2014

However as Banking is not confined to the four walls of the Branch, the customer has a bigger role to play for safeguarding his interest whenever he is using the Banking products such as Debit Card, Credit Card, Internet Banking and Mobile Banking. As we have discussed about the ADC, there are so many channels of Banking available to the customers, he seldom comes to the Branch and all his needs are catered through Desktop PC, Laptop, Smartphone, Tab etc. However, he has to be very careful while handling these devices as there are various types of risks involved in these transactions, which we call as cyber crime. A cyber crime may be defined as the crime where the computer is the object of the crime or is used as a tool to commit an offence. There are various types of cyber crimes. However the Banking industry mostly is experiencing the following types of cyber crimes. Hacking : Unauthorised attempts to bypass the security mechanisms of an Information system or network. Also we can define hacking as the unauthorized access to computer system, programs, data and network.

Phishing : By means of spoof e-mail messages, the hacker can ask for confirmation of certain information like account information and password. It may cause huge financial losses to the customer. Vishing : It is done by using voice messages through telephone/ mobile where the hackers asked for the account details, card details and password. Skimming/Cloning : The card details were captured with the help of the skimmer and then clone the card. Virus threat : In most cases virus can do any amount of damage, the creator intends to do. It may delete all data, it may pass on the vital information to other person. It may install key loggers in the system so that any keystroke of the customer is captured by the fraudster. Identity theft : It is a form of fraud or cheating of another person’s identity which involves stealing of money or getting other benefits by pretending to be someone else. Generally these types of thefts occur at the time of card delivery when the card of one customer is delivered to another person knowingly or unknowingly.


E-Mail spoofing : It is the activity in which the sender address and other part of the email header are altered. A spoof email is one that appears to originate from one source but actually has been sent from another source. In order to safeguard the interest of the customer as well as the reputation of the Bank, we need to educate our customer about the safety measures to be followed while dealing with these Alternative delivery channel products. The customers who are using the gadgets should take adequate precautions so that no untoward incident occurs and they can utilise the services smoothly from their place. However we suggest some steps which should be followed by each customer and can minimize the risk.

Check points for the customers using Alternative Delivery Channel Precautions for using Desktop/Laptop/Mobile/Tab Keep the firewall turned on : A firewall helps protect the computer from hackers who might try to gain access to delete information, steal password and other sensitive information. Install Anti Virus : Antivirus software is designed to prevent malicious software invading the computer. Also update the antivirus on a regular basis. Install OS/Software updates : The computer operating system should be updated regularly to stay in tune with the technology requirement and to fix the security holes.

Install /update Antispyware software : These are software which if installed can allow others to peer into your activities on the computer. They collect information from your computer without your knowledge. There are many free antispyware available on the internet. But be careful and always download any content from trusted sites. Use strong password, which is easy to remember but difficult to guess. We all know that the cyber crime cannot be stopped fully. Our effort will be to keep it at a minimum. The person who is doing these types of crime is not an intelligent person, but he is taking advantage of our ignorance. So‌‌.. BE ALERT - BE SAFE

Taarangan

December 2014

35


£¸ ¸ž¸¸«¸¸ Š¸¢÷¸¢¨¸¢š¸¡¸¸¿ / Rajbhasha Activities

›¸£¸ˆÅ¸¬¸ (¤¸ÿˆÅ), ›¸¸Š¸œ¸º£ ˆÅ¸½ ¨¸«¸Ä 2013-14 í½÷¸º "ƒ¿¢™£¸ Š¸¸¿š¸ú £¸ ¸ž¸¸«¸¸ œ¸º£¬ˆÅ¸£" ¬¸½ ¬¸ŸŸ¸¸¢›¸÷¸ ¢ˆÅ¡¸¸ Š¸¡¸¸— ž¸¸£÷¸ ˆ½Å Ÿ¸¸›¸›¸ú¡¸ £¸«’¢÷¸ ªú œÏµ¸¤¸ Ÿ¸º‰¸ ¸úÄ ˆ½Å ˆÅ£-ˆÅŸ¸¥¸¸Ê ¬¸½ œ¸º£¬ˆÅ¸£ ŠÏíµ¸ ˆÅ£÷¸½ íº‡ ‚š¡¸®¸ ›¸£¸ˆÅ¸¬¸ ›¸¸Š¸œ¸º£ ‡¨¸¿ ‚¸¿.œÏ. ªú œÏˆÅ¸©¸ ž¸¸Š¸÷¸¨¸¸£— Ÿ¸¿ ¸ œ¸£ „œ¸¦¬˜¸÷¸ Š¸¼íŸ¸¿°¸ú ªú £¸ ¸›¸¸˜¸ ¢¬¸¿í ‡¨¸¿ Š¸¼í £¸ ¡¸Ÿ¸¿°¸ú ªú ¢ˆÅ£½›¸ £ú ¸ú ¸»— ƒ¬¸ú ˆÅ¸¡¸ÄÇÅŸ¸ Ÿ¸Ê ›¸£¸ˆÅ¸¬¸ ›¸¸Š¸œ¸º£ ˆ½Å ¬¸™¬¡¸ ¬¸¢ ¸¨¸ ‡¨¸¿ £¸.‚. ªú £Ÿ¸½©¸ ¬¸¸‰¸£½ Š¸ Žú œÏŸ¸¸µ¸ œ¸°¸ œÏ¸œ÷¸ ˆÅ£÷¸½ íº‡—

›¸ƒÄ ¢™¥¥¸ú ‚¿ ¸¥¸ ˆÅ¸½ ›¸£¸ˆÅ¸¬¸ ¢™¥¥¸ú ׸£¸ ¨¸«¸Ä 2013-14 ˆ½Å ™¸¾£¸›¸ £¸ ¸ž¸¸«¸¸ Ÿ¸Ê ª½«“ ˆÅ¸¡¸Ä¢›¸«œ¸¸™›¸ ˆ½Å ¢¥¸‡ `¢×÷¸ú¡¸ œ¸º£¬ˆÅ¸£' ¬¸½ ¬¸ŸŸ¸¸¢›¸÷¸ ¢ˆÅ¡¸¸ Š¸¡¸¸— ¬¸¿¡¸ºÆ÷¸ ¢›¸™½©¸ˆÅ, ¢¨¸.¬¸½.¢¨¸. ”¸Á. ¨¸½™ œÏˆÅ¸©¸ ™º¤¸½ ¬¸½ œ¸º£¬ˆÅ¸£ œÏ¸œ÷¸ ˆÅ£÷¸½ íº‡ ‚¸.œÏ. ªú ‡¬¸ ˆ½Å ‚ŠÏ¨¸¸¥¸ ‡¨¸¿ Ÿ¸º.œÏ. ‡›¸¤¸ú ¸ú ªú ¸½ œ¸ú Ÿ¸»µ¸ ‡¨¸¿ £¸.‚. ”¸Á. ˆÅŸ¸¥¸½©¸ ¤¸íº‰¸¿”ú—

›¸£¸ˆÅ¸¬¸ ‚Ÿ¸¼÷¸¬¸£ ׸£¸ £¸ ¸ž¸¸«¸¸ Ÿ¸Ê „÷ˆ¼Å«’ ˆÅ¸¡¸¸Ä›¨¸¡¸›¸ í½÷¸º ‚Ÿ¸¼÷¸¬¸£ ‚¿ ¸¥¸ ˆÅ¸½ œÏ˜¸Ÿ¸ œ¸º£¬ˆÅ¸£ œÏ™¸›¸ ¢ˆÅ¡¸¸ Š¸¡¸¸— Ÿ¸º‰¡¸ ‚¸¡¸ˆÅ£ ‚¸¡¸ºÆ÷¸ ªú Š¸º£Ÿ¸ú÷¸ ¢¬¸¿í ¬¸½ œ¸º£¬ˆÅ¸£ ŠÏíµ¸ ˆÅ£÷¸½ íº‡ „œ¸ ‚¸¿.œÏ. ªú ”ú ˆ½Å ©¸Ÿ¸¸Ä ‡¨¸¿ œÏ¤¸¿š¸ˆÅ (£¸.) ªú ¬¸º™úœ¸ ¬¸¾›¸ú—

›¸£¸ˆÅ¸¬¸, ›¸¸½‡”¸ ˆÅú ‚¸¡¸¸½¢ ¸÷¸ ŽŸ¸¸íú ¤¸¾“ˆÅ Ÿ¸Ê ‚¸¿.œÏ. ªú Ÿ¸›¸¸½ ¸ ˆÅœ¸»£, ¬¸¿¡¸ºÆ÷¸ ¢›¸™½©¸ˆÅ, ¢¨¸.¬¸½.¢¨¸. ”¸Á. ¨¸½™ œÏˆÅ¸©¸ ™º¤¸½ ˆÅú „œ¸¦¬˜¸¢÷¸ Ÿ¸Ê £¸ ¸ž¸¸«¸¸ œÏ¢÷¸¡¸¸½¢Š¸÷¸¸ ˆ½Å ¢¨¸ ¸½÷¸¸ ˆÅ¸½ œ¸º£¬ˆÅ¸£ ‡¨¸¿ œÏŸ¸¸µ¸ œ¸°¸ ¬¸¸ÿœ¸÷¸½ íº‡—

36

leejebieCe

efomebyej 2014

ž¸¸½œ¸¸¥¸ ‚¿ ¸¥¸ ˆ½Å ¨¸¢£.œÏ. ªú £¸ ¸Š¸¸½œ¸¸¥¸ ‚¡¡¸¿Š¸¸£ ˆÅ¸½ ž¸¸½œ¸¸¥¸ Ÿ¸Ê ‚¸¡¸¸½¢ ¸÷¸ ¬¸Ÿ¸¸£¸½í Ÿ¸Ê Ÿ¸í¸Ÿ¸¢íŸ¸ £¸ ¡¸œ¸¸¥¸ ªú £¸Ÿ¸›¸£½©¸ ¡¸¸™¨¸ ¬¸½ ``¨¸«¸Ä 2014 ˆÅ¸ ¢í¿™ú÷¸£ ž¸¸«¸ú ¢í¿™ú ¬¸½¨¸ú ¬¸ŸŸ¸¸›¸'' œÏ™¸›¸ ¢ˆÅ¡¸¸— ƒ¬¸ ‚¨¸¬¸£ œ¸£ ªú ‚¡¡¸¿Š¸¸£ ˆ½Å ¬¸¸˜¸ ÷¸÷ˆÅ¸¥¸ú›¸ ‚¸¿.œÏ. ªú £¸ ¸ú¨¸ ˆºÅŸ¸¸£ Š¸ºœ÷¸¸, „œ¸ Ÿ¸.œÏ. ªú £¸ˆ½Å©¸ ˆºÅŸ¸¸£ Š¸ºœ÷¸¸ ‡¨¸¿ „œ¸ ‚¸¿.œÏ. ªú œ¸ú ¨¸ú Ÿ¸¸½‹¸½, ¨¸¢£.œÏ. ªú ‚Ÿ¸£ú©¸ ˆºÅŸ¸¸£ ‡¨¸¿ ‚›¡¸ ‚¢š¸ˆÅ¸£úŠ¸µ¸—

›¸£¸ˆÅ¸¬¸ ‚¸Š¸£¸ ׸£¸ ‚¸Š¸£¸ ‚¿ ¸¥¸ ˆÅ¸½ £¸ ¸ž¸¸«¸¸ ˆÅ¸¡¸¸Ä›¨¸¡¸›¸ í½÷¸º œÏ˜¸Ÿ¸ œ¸º£¬ˆÅ¸£ œÏ™¸›¸ ¢ˆÅ¡¸¸ Š¸¡¸¸ — œ¸º£¬ˆÅ¸£ ŠÏíµ¸ ˆÅ£÷¸½ íº‡ ‚¸¿.œÏ. ªú ‡¬¸ ˆ½Å ¤¸½í£¸ ‚¸¾£ £¸.‚. ˆºÅŸ¸¸£ú œ¸» ¸¸ ˆÅ¸½¥¸ú—

¸¿”úŠ¸ ‚¿ ¸¥¸ Ÿ¸Ê œÏš¸¸›¸Ÿ¸¿°¸ú ¸›¸š¸›¸ ¡¸¸½ ¸›¸¸ ÷¸˜¸¸ ¤¸ÿˆÅ¸Ê Ÿ¸Ê ƒ¬¸ˆÅú ž¸»¢Ÿ¸ˆÅ¸ ¢¨¸«¸¡¸ œ¸£ ¬¸¿Š¸¸½«“ú ˆ½Å ™¸¾£¸›¸ ¸¿”úŠ¸ ¤¸ÿˆÅ ›¸£¸ˆÅ¸¬¸ ˆÅú ¨¸¸¢«¸ÄˆÅ œ¸¢°¸ˆÅ¸ `¤¸ÿˆÅ œÏž¸¸' ˆÅ¸ ¢¨¸Ÿ¸¸½ ¸›¸ ˆÅ£÷¸½ ‚¸¿.œÏ. ªú ž¸º¢œ¸›Í ¢¬¸¿í Ÿ¸º‰¡¸ ‚¢÷¸¢˜¸ ªú ˆ½Å©¸¨¸ ¤¸¾ ¸¥¸, ‚›¡¸ ¤¸ÿˆÅ¸Ê ˆ½Å „ ¸¸¢š¸ˆÅ¸£úŠ¸µ¸ ‡¨¸¿ ¬¸¿œ¸¸™›¸ Ÿ¸¿”¥¸ ˆ½Å ¬¸™¬¡¸Š¸µ¸—


›¸½©¸›¸¥¸ ¤¸¾¿¢ˆ¿ÅŠ¸ ¬¸Ÿ¸»í ( ¸¸£‰¸¿” ¨¸ Žî¸ú¬¸Š¸ õ) / National Banking Group (Jharkhand & Chattisgarh) ˜¸

í ¸¸£ú¤¸¸Š¸ ‚¸Š¸Ÿ¸›¸ œ¸£ Ÿ¸¸›¸›¸ú¡¸ ˆÊÅÍú¡¸ ¢¨¸î¸ £¸ ¡¸Ÿ¸¿°¸ú ªú ¸¡¸¿÷¸ ¢¬¸›í¸ ˆ½Å ¬¸¸˜¸ ‚¸.œÏ.ªú ‚¢Ÿ¸÷¸ £¸¡¸, ”ú‡¨¸ú í¸ƒÄ¬ˆ»Å¥¸ ˆ½Å œÏ¸ ¸¸¡¸Ä ªú ‚©¸¸½ˆÅ ˆºÅŸ¸¸£, „œ¸ ‚¸.œÏ. ªú ‚¸ƒÄ ¬¸ú ¢Ÿ¸ª ‡¨¸¿ ¨¸¢£.œÏ. ªú ‡¬¸ ‡Ÿ¸ ‡¬¸ ›¸ˆÅ¨¸ú

¸Ÿ¸©¸½™œ¸º£ ‚¿ ¸¥¸ ˆÅú œ¸£©¸º”úí ©¸¸‰¸¸ ˆÅ¸ „™Ã‹¸¸’›¸ ˆÅ£÷¸½ íº‡ ž¸¸£÷¸ ¬¸£ˆÅ¸£, Š¸¼í Ÿ¸¿°¸¸¥¸¡¸, £¸ ¸ž¸¸«¸¸ ¢¨¸ž¸¸Š¸ ˆÅú ÷¸÷ˆÅ¸¥¸ú›¸ ¬¸¢ ¸¨¸ ¬¸ºªú ›¸ú÷¸¸ ¸¸¾š¸£ú— ¬¸¸˜¸ Ÿ¸Ê, ‚¸¿.œÏ. ªú ™ºŠ¸¸Ä œÏ¬¸¸™ ¢Ÿ¸ª¸, „œ¸ ‚¸¿.œÏ. ªú ¤¸ú œ¸ú Ÿ¸í¸¿¢÷¸ ‡¨¸¿ ¬¸£ˆÅ¸£ú ˆÅ¸£¸½¤¸¸£ ˆ½Å „œ¸ Ÿ¸.œÏ. ªú ‡ ˆ½Å ¬¸¸í» —

£¸¿ ¸ú ‚¿ ¸¥¸ Ÿ¸Ê ‰¸º¿’ú ¢ ¸¥¸¸ Ÿ¸Ê Š¸£ú¤¸ œ¸¢£¨¸¸£¸Ê ˆÅ¸½ ˆ¿Å¤¸¥¸ ¢¨¸÷¸£µ¸ ˆÅ£÷¸½ íº‡ ‡¥¸”ú‡Ÿ¸ ‡¨¸¿ Ÿ¸º.œÏ. ªú ‚³µ¸ ˆºÅŸ¸¸£ Š¸ºœ÷¸¸ —

Protecting Desktop / Computers/ Laptops / ipads By following some simple precautions, system vulnerabilities may be prevented. 1. Use Antivirus software. 2. Run Windows updates. 3. Use a strong password. 4. Only install licensed software. 5. Check the source of email, be careful with attachments. 6. Avoid strange websites. 7. Lock the screen or log out when away; shut down the machine when not in use. 8. Don’t use an administrative account for daily work 9. Configure Anti virus Software for Daily updates.

Dhanbad Zone ZM Shri A K Sinha distributing blanket to the poor/needy people along with Mrs. Sinha, DZM Shri P K Sharma and Sr. Manager (Mktg.) Shri Amit Kumar.

£¸¿ ¸ú ‚¿ ¸¥¸ ׸£¸ ‚¸¡¸¸½¢ ¸÷¸ 49¨¸ú¿ ‡¬¸‡¥¸¤¸ú¬¸ú ¸¸£‰¸¿” £¸ ¡¸ ˆÅú ¤¸¾“ˆÅ Ÿ¸Ê ¸¸£‰¸¿” ¬¸£ˆÅ¸£ ˆ½Å ¬¸¢ ¸¨¸ ˆÅ¸ ¬¨¸¸Š¸÷¸ ˆÅ£÷¸½ íº‡ ‚¸¿.œÏ. ªú ƒ¿Í Ÿ¸µ¸ú Ÿ¸¦¥¥¸ˆÅ—

š¸›¸¤¸¸™ ‚¿ ¸¥¸ Ÿ¸Ê œÏš¸¸›¸Ÿ¸¿°¸ú ¸›¸-š¸›¸ ¡¸¸½ ¸›¸¸ ˆÅ¸¡¸ÄÇÅŸ¸ ˆÅ¸ „™Ã‹¸¸’›¸ ˆÅ£÷¸½ íº‡ Ÿ¸¸›¸›¸ú¡¸ ¬¸¸¿¬¸™ ªú œ¸ú ‡›¸ ¢¬¸¿í ‡¨¸¿ ‚¸¿.œÏ. ªú ‡ ˆ½Å ¢¬¸›í¸ — The 10 Most Dangerous Things You Can Do Online 1 Opening attachments from unknown senders. 2. To open any unsolicited/suspicious mail. 3. Installing unauthorized applications 4. Disabling security tools like anti-virus and/or firewall. 5. Surfing unsure sites is always dangerous. 6. Sharing of passwords 7. Wireless networks without password. 8. Filling in web forms and registration pages from Cyber café 9. Posting of information on social networking sites. 10. Leaving computer in an unsecured or unattended area.

Taarangan

December 2014

37


INFORMATION SECURITY PRINCIPLES A security policy is a high level depiction of the management’s commitment. It contains the security goals as to confidentiality, integrity, availability, accountability, assurance, critical assets, perceived threats, roles and responsibilities etc. These goals guide in the formulation of procedures, processes, standards and controls in the security design. Gagan Bihari Satapathy AGM, InfoSec. Cell HO

I

nformation is the true wealth for any organisation today. Organisations which are rich in information and efficient in processing such information will remain a step ahead of the times. There comes the onerous responsibility of protecting the information to save the organization from extinction.

To design, develop and operate secure information systems, the NIST has complied a set of principles which provide the building blocks for developing a robust and consistent security capability. The principles are flexible and can be applied in a contextual manner comprising of both technical and non-technical controls. For the uninitiated, some of these are explained in a simple understandable manner in the following paragraphs. Establish a sound security policy as the foundation for design. A security policy is a high level depiction of the management’s commitment. It contains the security goals as to confidentiality, integrity, availability, accountability, assurance, critical assets, perceived threats, roles and responsibilities etc. These goals guide in the formulation of procedures, processes, standards and controls in the security design.

38

leejebieCe

efomebyej 2014

Security as an integral part of the overall system design. Security must be considered at each stage of the system life-cycle up to disposal of the system. A patch-up security arrangement would be more costly and prone to loopholes which can be exploited. So security principles should be incorporated since the design and each modification stages. Clearly delineate the physical and logical security boundaries governed by associated security policies. Information stays in physical and logical spaces with different access control mechanisms and a compromise can happen in different manners. Boundaries can be defined in people, process and technology areas through well managed policies and procedures. Developers are trained in how to develop secure software. Software is the engine to churn data. Security knowledge and training is essential to incorporate the controls in design, development, configuration, integration and testing of the software. Reduce risk to an acceptable level. Identify potential trade-offs between reducing risk and increased costs and decrease in other aspects of operational effectiveness.

Risk is the likelihood that a particular threat source will exploit the vulnerabilities to inflict damage. Elimination of all risk may not be cost-effective. It can be in the form of more expenses than the damage it protects, decreased system performance, additional training etc. So a balanced view is to be taken to reduce the risk where elimination is not possible. Assume that external systems are insecure. Isolate public access systems from mission critical resources (e.g., data, processes, etc.). The boundary of an information domain represents the security perimeter for that domain. External systems are systems on which we not have control. If such systems interface with ours, specific precautions are to be taken for proper partitioning to protect our system. Implement tailored system security measures to meet organizational security goals. Consider custom products to achieve adequate security. Security is not a water-tight compartment with rigid demarcation lines. The level of trust obtaining in an arrangement is a factor to calibrate security requirements. Every system is unique in its own way. So the security design needs to be considered in its present context.


Risk levels vary according to the location of the data. So security measures are to be considered accordingly. Protect against all likely classes of “attacks.� Attack scenarios depend on various factors and possibilities. All such scenarios and effects are to be considered while designing the security solution and measures. Where possible, base security on open standards for portability and inter-operability. Distributed and heterogeneous systems are used to cater to various needs of business as every organisations looks for a cutting edge. In an interconnected world, inter-operability and portability are highly required. Open standards are the best way to develop uniform security capabilities across multifarious systems. Design security to allow for regular adoption of new technology, including a secure and logical technology upgrade process. Changing business requirements, new technologies, emerging threats require constant re-evaluation/changes/ upgrade to security process and technologies. The security capabilities should be adequately tuned accordingly. So the security design should be able to adapt to the changes without major overhauling. Implement layered security (ensure no single point of vulnerability). No single technology, approach, control may not be possible to thwart a threat from a determined attacker. Therefore, to avoid a single point of failure and making it harder for a breach, multiple, overlapping protection measures need to be considered. Design and operate a resilient IT system to limit damage and provide response. No IT system is fool-proof. So efforts should be taken to make the system resistant to attack, limit damage, recover from failure, and maintain a

,,

Protect information while being processed, in transit, and in storage.

No IT system is fool-proof. So efforts should be taken to make the system resistant to attack, limit damage, recover from failure, and maintain a stable state in the face of an adverse incident.

,,

stable state in the face of an adverse incident. There should be demonstrable assurance capability that the system can withstand the onslaught of a cyberattack and provide reasonable resistance to circumvention of the controls. Limit or contain vulnerabilities. IT systems should be designed to limit or contain vulnerabilities. Known vulnerabilities and control measures should be documented. Use boundary mechanisms to separate computing systems and network infrastructures. Computing systems store and process information whereas network infrastructure is used to carry and transmit information. It is required that there should be a well-protected boundary between the two. Design and implement audit mechanisms to detect unauthorized use and to support incident investigations. If an attack/wrongful-act cannot be protected, it must be diagnosed at the earliest to control the damage and identify the culprit. So a proper audit mechanism needs to be evolved commensurate with the security profile. Develop and exercise contingency or disaster recovery procedures to ensure appropriate availability. Data and business functions must be recovered to continue the critical operations within an acceptable period of disruption. So a business continuity and disaster recovery plan must be in

place and periodically tested. Strive for simplicity and operational ease of use. Systems which are simple to develop, learn, use and operate are the most effective. The security systems should be designed keeping in mind the ability and experience of the users or training needs are appropriately decided. Minimize the system elements to be trusted. The foundation of security is trust at its core. If the trust is breached, security is compromised. Keeping the trustable entities (people, process, technology) at a minimum reduces the chances of security incidents. Implement least privilege separation of duties.

and

The access provided to the systems should be strictly limited to the purpose for which it is given. The role is to be unambiguously defined, documented. A normal user should not be given admin rights. Also role and responsibilities should be separate for users for security purposes, like operator and authoriser Do not implement security mechanisms.

unnecessary

Every security mechanism should support a security service or set of services, and every security service should support one or more security goals. Extra measures should not be implemented if they do not support a recognized service or security goal.

Taarangan

December 2014

39


Essay Competition

1 Prize st

Cyber frauds in banks Reason and Remedies

Deepika Ramnani Rajasthan Zone

W

e live in an age of technology where we see the presence of computers and other gadgets like smartphones, tablets and laptops everywhere. With mobile phone companies introducing latest and most attractive features in enhanced models everyday in the market and laptop and PC manufacturing companies competing to survive in this ever changing and very demanding consumer dominating environment, technology is creeping in every nook and corner of a person's Iife.Such gadgets have also made life so convinient with things happening at the click of the mouse.However this has created one new branch of crime called cyber crime and frauds pertaining to cyber world are as grave in nature as a non-cyber crime is. The only difference between a fraud and cyber fraud is that the latter involves use of PC/ laptop or similar gadgets to get hold of crucial data. Cyber frauds have become a challenge for individual, companies, government agencies and a nation as a whole. It has become a potential threat to nation's security by compromising with sensitive databases containing confidential information. Banks and financial institutions are equally affected by cyber crimes when customers' private information like

40

leejebieCe

efomebyej 2014

account numbers, card numbers phone numbers and other such data is stolen by malicious hackers. Keeping this in mind CERT, which is a nodal department to protect Indian cyber space and software infrastructure against destructive hacking activities was brought into existence. This department issues regular advisories on how one can protect himself from these crimes. There are varieties of cyber frauds committed by hackers like phishing in which a fake website similar in look and appearance to a genuine one is created and user is forced to feed sensitive data which is then used to do unauthorised transactions by the perpetator. Similar to phishing attack is the vishing attack in which someone that pretends to be genuine bank staff calls up the customer and asks his credentials. These and many such social engineering techniques have been used to cheat customers and commit frauds. Customer also receives spam email from unknown sources which forces them to click on malicious links which redirects them to a website which steals their data. If somehow customer is saved by online frauds he should be equally vigilant in using his ATM card at ATM machines as he might be unaware that all his personal information is being

recorded by some pinhole camera inserted in a pen stand mounted near keypad or a skimmer device inserted in the card reader which reads all information stored in magnetic strip of the ATM Card. This information is then used to create clones of cards which can then be used at any ATM machine for withdrawal. Such frauds come to notice only when the customer visits the branch to update their passbooks, obtain monthly statements or on receiving SMS alert of withdrawal on their registered mobile numbers. Another more sophisticated example of such a crime is when a USB stick is inserted in printer port of ATM machine. The code inside the USB gets executed and the machine gets rebooted through this code which further takes control of the operating system of the ATM machine and entire cash dispenses out within few minutes until all its cassettes become empty. Use of CCTV cameras in such a situation helps catch the criminals involved. Not only ATM machines but POS machines at retail terminals are victimised by Trojan viruses which breach the security protocols of POS terminals and steal confidential information. Therefore retailers at POS machines should avoid unauthorised


access to pos machines and using of default or weak' credentials. This helps us to understand that frauds can be "card present" and "card not present" transactions. These and many other cyber frauds are an everyday phenomenon now and hackers find a new way every time to attack numerous accounts. When we try to search the reasons behind cyber frauds in Banks, we come across many loopholes like customers not using strong and complex passwords online and sharing these passwords with other people, opening attachments in emails not coming from valid sources, not using good antivirus and firewall, keeping internet connection open when the system is idle etc. Moreover regular data backups are also not taken by people and they loose their important data. People can use twopassword authentication system when accessing sites such as Gmail in which one password is entered by user and other which is one-time is sent to his mobile number making it impossible

for any person to access his account because he will not be able to possess his mobile phone. When people visit ATMs they should be vigilant enough to check the presence of any undesirable device installed inside the lobby. Even if customers overlook these precautions, bank staff can create awareness about these by holding seminars and educating them through pamphlets, notice boards in branch 'and ATM premises. Print media can also be asked to join hands to enlighten common masses because they reach far and remote places in a country. Staff should realise that they have the added responsibility of protecting their customers from such frauds. Even if the customer approaches branch that he has been cheated through any means, the staff should actively take interest and escalate the matter to the concerned department of his higher offices, block his card immediately and co-operate with him in getting all information desired. The top

management of a bank on the other hand should introduce and device such policies which will help redress the grievances in minimum possible time. One such measure could be providing a dedicated helpline number and an information cell where such frauds can be reported and officials of this cell can simultaneously block the card and provide information desired by customers or staff to catch hold of the perpetrator. Banks can also broadcast information of such frauds on their websites, internet banking and mobile banking portals to inform their customers. These and many such measures can help lessen cyber frauds and call for equal participation of all people concerned whether staff or customers because unless and until we do not understand the various nuances of cyber frauds, people will keep falling prey to such traps and the criminals involved will go scotfree. Let's not just be silent victims and encourage it!

Taarangan

December 2014

41


¬¸÷¸ˆÄÅ÷¸¸ ¸¸Š¸²ÅˆÅ÷¸¸ ¬¸œ÷¸¸í / Vigilance Awareness Week Š¸¢÷¸¢¨¸¢š¸¡¸¸Â /Activities

B

ank observed Vigilance Awareness Week from 27th October to 1st November 2014. On this occasion, a special journal was unveiled on 27th October 2014 containing various articles on vigilance matters including an article on this years’ theme i.e. “Combating Corruption-Technology as an enabler”. The valedictory function was held on 1st November 2014. Smt V R Iyer, Chairperson and Managing Director graced the occasion alongwith EDs, CVO, General Managers and other staff members. Also, to commemorate the Birth Anniversary of Sardar Vallabhbhai Patel, Vigilance Department came out with the "Special Booklet on Sardar Patel" which was released at the hands of CMD. Zones also observed Vigilance Awareness Week by organising various activities and programmes.

Release of Booklet on "Sardar Vallabhbhai Patel" at the hands of CMD Smt. V R Iyer in the presence of Board of Directors and Executives from Vigilance Department, Head Office

Head Office

œÏš¸¸›¸ ˆÅ¸¡¸¸Ä¥¸¡¸

£¸¿ ¸ú ‚¿ ¸¥¸

leejebieCe

efomebyej 2014

š¸›¸¤¸¸™ ‚¿ ¸¥¸

£¸¡¸œ¸º£ ‚¿ ¸¥¸

Mumbai South Zone

42

(L to R) DGM (Vig.) Shri Narendra Marwah, EDs Shri Arun Shrivastava, Shri B P Sharma and CVO Shri Manoj Jain at the release of special Journal on vigilance.

Kerala Zone


¬¨¸ Ž ž¸¸£÷¸ ‚¢ž¸¡¸¸›¸ / Clean India CampaignŠ¸¢÷¸¢¨¸¢š¸¡¸¸Â /Activities

í ¸¸£ú¤¸¸Š¸ ‚¿ ¸¥¸

ˆÅ¸½¥í¸œ¸º£ Ÿ¸š¡¸ ˆÅ¸£œ¸¸½£½’

ƒ¿™¸¾£ ‚¿ ¸¥¸

Hyderabad Zone

Navi Mumbai Zone

Siliguri Zone

ˆÅ¸›¸œ¸º£ ‚¿ ¸¥¸

‚¸£¬¸½’ú „ ¸¾›¸

Taarangan

December 2014

43


E-banking

Anytime, Anywhere and Anyhow Banking Sanjay Save RMD, InfoSec Cell, HO

T

echnology has become a part of life and more so in banking. Online Banking or e-banking can also be referred as Internet Banking. Traditional Branch banking has now moved to E-banking through ATM, Debit/Credit Cards, Internet Banking and Mobile Banking. E-banking makes available 24-hour banking options with faster services and low cost. Electronic banking is the automated delivery of new and traditional banking products and services directly to customer through electronic interactive communication channels. Electronic banking plays a vital role in the economic development of a country. Financial institutions took steps to implement e-banking i.e.

44

leejebieCe

efomebyej 2014

electronic banking services in the mid1990s. Internet banking in India The Reserve Bank of India constituted a working group on Internet Banking. The group divided the internet banking products in India into 3 types based on the levels of access granted. They are: Information Only System: General purpose information like interest rates, branch location, bank products and their features, loan and deposit calculations are provided in the banks website. Facilities are made available for downloading various types of application forms. There is no interaction between the customer and bank’s application system.

Electronic Information Transfer System: The system provides customer- specific information in the form of account balances, transaction details, and statement of accounts in the form of ‘read only’ format. Identification and authentication of the customer is through password. Fully Electronic Transactional System: This system comprises multilevel interface. This system requires high degree of security and control. In this environment, web server and application systems are linked over secure infrastructure involving networking, inter-bank payment gateway and legal infrastructure. Electronic banking is not only 24-hours access to cash through ATMs or


,, Credit/Debit Cards but also opening of accounts/paying bills/taxes/ purchase online. Banks are offering value added services throughout the world through internet to its customer in addition to traditional regular services like financial calculator, online stock quotes, insurance, D-mat facilities, online share trading, filing of Income tax Returns etc. However it is widely used to make purchases, pay bills etc. Advantage of e-banking to the bank Advantage is to operate more efficiently when customers perform transactions by themselves rather than going to a branch and dealing with a branch representative. Banks can cut operating costs and passing benefit to the customers by waiving many fees / charges. When you sign into Online Banking a secure session will be established between your computer and the bank. You will not be able to connect to the Online Banking sign in page unless your browser connects with full 128-bit SSL encryption. You can confirm your Online Banking session is encrypted by the appearance of a pad-lock symbol on the screen near the address bar. The challenges for banks Extending e-banking services is to provide quality customer services with Confidentiality, Integrity and Availability along with the security from emerging threats of cybercrime. From bank’s point of view risk involved is Financial Risk, Operational

Advantage is to operate more efficiently when customers perform transactions by themselves. Banks can cut operating costs and pass benefit to the customers.

,,

Risk as well as Reputational Risk.

and disclose his credentials.

One of the main apprehensions of e-banking is security. Without confidence, customers are not willing to use e-banking service to carry financial transactions. We must be proud that our bank has facilitated public / customers by offering value additional services like Abhay, AML Questionnaires, Regulatory Disclosures, Pension grievances redressal, Policies and guidelines etc. through corporate Website.

Examples on internet banking attacks

Banks with e-banking service offer several methods to ensure a high level of security: • Identification and authentication, • Virtual Keyboard, • Encryption, and • Two Factor Authentication. Internet Banking Fraud Fraud or theft are committed using online technology to illegally remove/ transfer money from a bank account. Internet Banking Fraud is a form of identity theft and is usually made possible through techniques such as phishing. Generally, the identity of the customer is his user-id and password which is provided to secure transactions. But due to some ignorance or silly mistakes users easily fall into the trap of cyber criminals

Phishing and pharming, Cross-site scripting and key logger / Trojan horses can also be used to steal login information. Another kind of attack is the so-called Man in the Browser attack, where a Trojan horse permits a remote attacker to modify the destination account number and also the amount. There are attacks using malware and social engineering to persuade the user himself to transfer money to the fraudsters on the ground of false claims. Authentication methodologies involve three factors: X Something the user knows i.e. password, PIN X Something the user has i.e. Card X Something the user is i.e. finger prints with the use of biometric technology Security Precautions The best defence against fraud is education and awareness. The time has come for us to take a proactive stance by being both aware and protected from the smartly crafted malware that hackers offer. Follow Do's and Don’ts for safety and security. Be alert and cautious.

Taarangan

December 2014

45


¬¸º£®¸¸ „œ¸¸¡¸ / Security Tips Š¸¢÷¸¢¨¸¢š¸¡¸¸Â /Activities USB Storage Device Security

Do’s

USB (Universal Serial Bus) storage devices are very convenient to transfer data between different computers. You can plug it into a USB port, copy your data, remove it and be on your way. Unfortunately this portability, convenience and popularity also brings different threats to your information. Types of devices which support USB • Card readers • Mobile phones • PDAs • Digital cameras • Digital audio players • Portable Media Players • Portable flash memory devices

Tips for Social Networking Safety 1. Be careful when you click links. 2. Be aware about what you’ve posted. 3. Don’t trust that a message really is from whom it says it’s from. 4. To avoid giving away e-mail addresses of your friends, do not allow social networking services to scan your e-mail address book. 5. Type the address of your social networking site directly into your browser. 6. Be careful about who you accept as a friend on a social network. 7. Choose your social network carefully. 8. Agree that everything you put on a social networking site is permanent. 9. Be careful about installing extras on your site. 10. Talk to your kids about social networking.

46

leejebieCe

efomebyej 2014

• Always do low format for first time usage. • Always delete the drive securely to clear the contents. • Always scan USB disk with latest Antivirus before accessing. • Protect your USB device with a password. • Encrypt the files / folders on the device. • Use USB security products to access or copy data in your USB. • Always protect your documents with strong password.

Don’ts

• Do not accept any promotional USB device from unknown members. • Never keep sensitive information like username/passwords on USB disk.

Top 10 Passwords Tips 1. Never tell your password to anyone including colleagues and IT staff. 2. Make your password hard to guess — do not use the name of your pet (or your child). 3. Avoid using words found in a dictionary. 4. Never write down your password. 5. The more random your password is, the better. Always use combination of upper case, alpha, numeric and charters. 6. Be sure that you don’t use personal identifiers in your password (like your name or Branch Name). 7. Ensure that nobody is watching when you are entering password into the system. 8. Use a password that you can type quickly without having to look at your keyboard. This makes it harder for someone to notice your password if they happen to be watching over your shoulder. 9. Report to the system administrator if account is locked out before 3 bad attempts. 10. Change password whenever there is a suspicion of compromised.


Š¸¢÷¸¢¨¸¢š¸¡¸¸Â /Activities Browsing

Do’s

1. Install and use a firewall, pop-up blocker and spyware detector. 2. Ensure that Anti-Virus is up to date. 3. Run anti-virus and spyware detectors/cleaners regularly. 4. Habitually download security protection update patches & Keep your browser and operating system up to date. 5. Make Backups of Important Files and Folders. 6. Use strong passwords (alphanumeric and special characters) - Easy to remember and difficult to guess. Change administrator’s password from the default password. 7. Use a variety of passwords, not same for all of your account. 8. Disconnect internet connection when not in use. 9. Make the wireless network invisible by disabling identifier broadcasting. If the wireless network does not have a default password, create one and use it to protect the network. 10. Disable file sharing on computers. 11. Avoid online banking, shopping, entering credit card details, etc if the network is not properly secured. 12. Check your online account frequently and make sure all listed transactions are valid. 13. Be extremely wary of spam legitimate looking email asking for confidential information. Never ever click on the link given in the spam email. 14. Always delete spam emails immediately and empty the trash box to prevent accidental clicking on the same link. 15. Be wary of websites that require your card details up front before you actually place an order. 16. Never respond to text messages from someone you don’t know. 17. Open email attachment carefully. 18. Be careful while downloading any free software or screensaver etc. 19. Not delete email in question, save the compromised email and take out the full header

of such email and report the crime for further investigation. 20. Be cautious when dealing with individuals not known to you or outside of your own country. 21. Be cautious of unsolicited offers. Never purchase anything advertised through an unsolicited email. 22. Beware of promises to make fast profits. Be cautious of exaggerated claims of possible earnings or profits. 23. Beware of lotteries that charge a fee prior to delivery of your prize. 24. Always type website addresses yourself, rather than clicking on a link provided. 25. Assign a computer to a particular person with password protection.

Don’ts

1. Expose yourself that you are not available in town or give your details about location and itinerary when email auto responder enabled. 2. Hand over your credit card to any person. 3. Auto-connect to open Wi-Fi (wireless fidelity) networks. 4. Get confused, frightened or pressured into divulging information if you receive an e-mail purporting to be from your bank or credit card provider as criminal use scare tactics. 5. Keep passwords stored on your computer. 6. To go online without virus protection and a firewall in place and not preserving evidence / logs. 7. Open email attachment if you are not sure about it. 8. Provide any information like Your real name, home address, your phone number, your friends’ or family members’ private information, your passwords to anonymous chat friend. 9. Post your cellphone number online. 10. Respond to text message received from unknown.

Taarangan

December 2014

47


¬¸º£®¸¸ „œ¸¸¡¸ / Security Tips Š¸¢÷¸¢¨¸¢š¸¡¸¸Â /Activities Broadband Internet Security

Do’s

• In case of terminal adapter modem make sure that filter is enabled for broadband lines. To filter unnecessary noise generated during the transmission. • Change Default Administrator ( Passwords and User names). • Assign Static IP Addresses to Devices. • Enable MAC Address Filtering. • Enable Wireless Security. • Turn on (Compatible) WPA / WEP Encryption. • Change the Default SSID (Service Set Identifier). • Use effective end point security solution (with anti virus, anti spyware, desktop firewall etc) to protect computer/ laptop from broadband Internet security threats. • Enable Firewall on Modem Router as well as Computer. • Turn off Modems during extended periods of NonUse. • In case of USB broadband modem, disconnect and remove the device after usage. • Install broadband Internet bandwidth usage monitoring tool. • Enable SSH (secure channel) for remote administration.

Securing Broadband Internet access.

Don’ts

• Don’t enable the option for remote administration (via Internet), as it is not required for a home user. • Don’t enable the option “Restore Factory Default Setting” in broadband modem. • Don’t use connection without a filter for each broadband Internet line. • Don’t tap the line before the splitter (a small dvice that separates phone line from data / PC port). • Don’t use USB broadband modem with insecure computer/laptop. • Do not Enable SSID Broadcast: • Do not Enable Auto-Connect to Open Wi-Fi Networks. • Do not leave broadband connectivity open when it is not utilized. • Never connect to unkown or untrusted network in case of Wi-Fi.

48

leejebieCe

efomebyej 2014

Do’s

To protect from VIRUS

• Install anti-virus software on your computer. • Keep your anti-virus software up to date. • Disable images by default on your email client. • Make sure that anti-virus software is installed on every machine. • Enable scans of the memory, master and boot records, and system files upon start up of every machine. • Enable Macro Virus Protection in all your Microsoft Office programs. • Disable the Preview Pane view in Outlook and Outlook Express. Some viruses can be launched by simply previewing them. • Educate all your friends and family on the dangers of e-mail attachments and viruses in general. • Activate/install a firewall on your computer’s network. Don’ts • Click any links from a source you do not trust. • Download illegal software. • Assume you are safe, always check it.

Computer Security Basics What Every Computer User Should Know

1. Use protection software "anti-virus software" and keep it up to date. 2. Don't open unknown, unscanned or unexpected email attachments. 3. Use hard-to-guess passwords. 4. Don't share access to your computers with strangers. 5. Disconnect from the Internet when not in use. 6. Back up your computer data. 7. Regularly download security protection update "patches". 8. Check your security on a regular basis. Understand the risks and use measures to minimize your exposure. 9. Share security tips with family members, co-workers and friends.


Š¸¢÷¸¢¨¸¢š¸¡¸¸Â /Activities

Credit / Debit Card •

techniques useD for Credit / Debit card fraud

Do’s

Please change your ATM PIN regularly as advised by banks. • Keep your credit card receipts to guard against transaction frauds, check your receipts against your monthly statement. • Carry credit cards that you use or absolutely need. • Shred/destroy anything that contains your credit card number written on it (Bill). • Notify your credit card issuers in advance of your change of registered, and then you change home address. • If you lose your credit card, please report the loss immediately. • When you dispose a card at the time of renewal/ upgradation, please make sure to cut it diagonally into multiple pieces before disposal. • If your phone number is registered with the bank and due to any reason the number stops working, immediately block transactions/accounts linked to the card/s. • Read the guidelines and advisories of the issuing card issuing bank/organization regularly and follow it without lapses. Don’ts • Accept the card received directly from bank in case if it is damaged or seal is open. • Write your PIN number on your credit card. • Disclose your Credit Card Number/ATM PIN to anyone. • Hand over the card to anyone, even if he/she claims to represent the Bank. • Get carried away by strangers who try to help you use the ATM machine. • Access Net banking or make payment using your Credit/Debit card from shared or unprotected computers in public places. • Provide your credit card information on a website that is not a secure site. • Share any confidential information such as password, customer id, Debit card number, Pin, CVV2, DOB, account details to any email requests, from known sources even if the request is from government authorities like Income Tax department, RBI or any card association company like VISA or RuPay.

Skimming Skimming is the theft of credit card / Debit card information. Thief can procure victim’s credit card number using basic methods such as photocopying receipts or more advanced methods such as using a small electronic device (skimmer) to swipe and store hundreds of victim’s credit card numbers. Common scenarios for skimming are restaurants or bars where the skimmer has possession of the victim’s credit card and makes note of card details for further use. Installing Skimmers in Card Slot of ATM

ATM with skimmer fitted by fraudulently

Vishing It is one of the method of social engineering over the telephone system, most often using features facilitated by Voice over IP (VoIP), to gain access to private personal and financial information from the public for the purpose of financial reward. The term is a combination of “voice” and “phishing”. Social Engineering Social engineering involves gaining trust, hence the fraudster poses as a member of staff or even security guard. The fraudster would then ask the customer to check the card for damages. The fraudster would have gained confidence from his prey using various tactics such as offering assistance to the customer who perhaps would have tried to use the ATM without success or perhaps the customer who is not familiar with use of ATM machine and requires assistance.

Taarangan

December 2014

49


n

mo m o C

Tips for Spotting fraudulent e-mail • Links that appear to be genuine but aren’t. If you place your cursor over a link in a suspicious email, your email program most likely shows you the destination URL. Do not click the link, but look closely at the URL, e.g. “bankofindia.co.in” may be spelled as “bankofindaia.co.in”. • Requests for personal information. Bank will never ask you to reply in an email with any personal information such as your PAN, ATM or PIN. • Urgent appeals. Bank will never claim your account may be closed if you fail to confirm, verify or authenticate your personal information via email. • Messages about system and security updates. Bank will never claim the need to confirm important information via email due to system upgrades. • Offers that sound too good to be true. Be careful from the emails asking you to fill out a customer service survey in exchange for money, then ask you to provide your account number so you can receive the money. • Obvious typos and other errors. These are often the mark of fraudulent emails and websites. Be on the lookout for typos or grammatical errors, awkward writing and poor visual design.

Tips for email security 1. Keep your inbox clean, Turn on the junk mail filtering system. 2. Beware of links in emails. May divert you to a site containing a virus or spyware. 3. Confirm from the source if you’re unsure about a link they have sent you in an email. 4. Break up your email address by using spaces or extra characters in between, fonts. 5. DON’T open, forward attachments received from unknown sources. And do not set your e-mail program to “auto-open” attachments. 6. DON’T give your user ID or password to another person. 7. DON’T post your email address on a social network site, chat-room or webpage. 8. DON’T: Believe everything you read. Spam emails will often have a false subject line to try and trick you into opening the message. 9. DON’T set your e-mail program to “auto-open” attachments. If you receive a suspicious email that uses Bank of India’s name, forward it to us immediately at Security. Information@bankofindia.co.in.

50

leejebieCe

efomebyej 2014

What are some common myths, and what is the truth behind them?  Myth: Anti-virus software and firewalls are 100% effective. Truth: Anti-virus software and firewalls are important elements to protecting your information. However, neither of these elements are guaranteed to protect you from an attack. Combining these technologies with good security habits is the best way to reduce your risk.  Myth: Once software is installed on your computer, you do not have to worry about it anymore. Truth: Vendors may release updated versions of software to address problems or fix vulnerabilities. You should install the updates as soon as possible; some software even offers the option to obtain updates automatically. Making sure that you have the latest virus definitions for your anti-virus software is especially important.  Myth: There is nothing important on your machine, so you do not need to protect it. Truth: Your opinion about what is important may differ from an attacker's opinion. If you have personal or financial data on your computer, attackers may be able to collect it and use it for their own financial gain. Even if you do not store that kind of information on your computer, an attacker who can gain control of your computer may be able to use it in attacks against other people.  Myth: Attackers only target people with money. Truth: Anyone can become a victim of identity theft. Attackers look for the biggest reward for the least amount of effort, so they typically target databases that store information about many people. If your information happens to be in the database, it could be collected and used for malicious purposes. It is important to pay attention to your credit information so that you can minimize any potential damage.  Myth: When computers slow down, it means that they are old and should be replaced. Truth: It is possible that running newer or larger software programs on an older computer could lead to slow performance, but you may just need to replace or upgrade a particular component (memory, operating system, CD or DVD drive, etc.). Another possibility is that there are other processes or programs running in the background. If your computer has suddenly become slower, it may be compromised by malware or spyware, or you may be experiencing a denial-of-service attack.


‚›¡¸ Š¸¢÷¸¢¨¸¢š¸¡¸¸Â / Other Activities

Visit of CMD to Stock Exchange Mid Corporate Branch Stock Exchange Branch Staff Shri Sunil Pathare welcoming CMD Smt. V R Iyer in presence of GM NBG (W) Shri Tarlochan Singh, ZM MSZ Shri D K Garg & AGM Shri Monoj Das.

CMD Smt. V R Iyer along with GM NBG (W) Shri Tarlochan Singh, ZM MSZ Shri D K Garg, DM MC (W) Shri Arvind Verma & AGM Shri Monoj Das with the staff members of Stock Exchange Branch.

œ¸º£¬ˆÅ¸£ / Awards

Jadrboblad Branch, Sangli was awarded with ‘Rajmata Jijau Swavalamban Puraskar’ for best performace branch under MSRLM in Sangli Distt. BM Jadrboblad Branch Shri Namdeo Mane & LDM Sangli Shri M D Kulkarni receiving the award from State Cabinet Minister for Rural Development Mrs. Pankajatai Mundhe.

œÏš¸¸›¸Ÿ¸¿°¸ú ¸›¸ š¸›¸ ¡¸¸½ ¸›¸¸ ˆ½Å ÷¸í÷¸ ©¸÷¸-œÏ¢÷¸©¸÷¸ ¢¨¸î¸ú¡¸ ¬¸Ÿ¸¸¨¸½©¸›¸ í½÷¸º Ÿ¸º‰¡¸Ÿ¸¿°¸ú ªú ¢©¸¨¸£¸ ¸ ¢¬¸¿í ¸¸¾í¸›¸ ¬¸½ „ ¸¾›¸ ¢ ¸¥¸½ ˆ½Å ˆÅ¥¸½Æ’£ ªú ˆÅ¢¨¸›Í ¢ˆÅ¡¸¸¨¸÷¸ ‡¨¸¿ „ ¸¾›¸ ‚ŠÏµ¸ú ¢ ¸¥¸¸ œÏ¤¸¿š¸ˆÅ ªú ¤¸ú ‡Ÿ¸ ¸¸¾í£ú œÏ©¸¢¬÷¸ œ¸°¸ ŠÏíµ¸ ˆÅ£÷¸½ íº‡—

toon

- Vinod C Dixit, NBG (C), Ahmedabad

Taarangan

December 2014

51


Š¸¢÷¸¢¨¸¢š¸¡¸¸Â /Activities

Æ¥¸ú›¸ ”½¬ˆÅ ˆÅ¸ Ÿ¸í÷¨¸ ’úŸ¸ ¬’¸ûÅ œÏ¢©¸®¸µ¸ Ÿ¸í¸¢¨¸Ô¸¸¥¸¡¸, ›¸¸½‡”¸

2

‚Æ÷¸»¤¸£' 2014 ˆÅ¸½ ™½©¸ ›¸½ £¸«’¸÷¸¸ Ÿ¸í¸÷Ÿ¸¸ Š¸¸¿š¸ú ˆÅú 145¨¸ú ¸¡¸¿÷¸ú Ÿ¸›¸¸ƒÄ — ƒ¬¸½ ¡¸¸™Š¸¸£ ¤¸›¸¸›¸½ í½÷¸º ퟸ¸£½ œÏš¸¸›¸Ÿ¸¿°¸ú ªú ›¸£ÊÍ Ÿ¸¸½™ú ›¸½ ¢™¥¥¸ú Ÿ¸½ ¸¸”õ» ¥¸Š¸¸ ˆÅ£ ¬¨¸ Ž ž¸¸£÷¸ ‚¢ž¸¡¸¸›¸ ˆÅú ©¸º£€‚¸÷¸ ˆÅú — œÏš¸¸›¸Ÿ¸¿°¸ú ›¸½ ™½©¸¨¸¸¢¬¸¡¸¸Ê ¬¸½ ¬¸ž¸ú ¬¸¸¨¸Ä ¸¢›¸ˆÅ ¨¸ ¤¡¸¢Æ÷¸Š¸÷¸ ¬˜¸¸›¸¸½ œ¸£ ¬¸¸ûÅ -¬¸œ¸€¸ƒÄ £‰¸›¸½ ˆÅú ‚œ¸ú¥¸ ˆÅú, Æ¡¸»¿ˆÅú ퟸ¸£½ £¸«’¸÷¸¸ ž¸ú ¬¨¸ Ž÷¸¸ œ¸£ œ¸»£¸ š¡¸¸›¸ ™½÷¸½ ˜¸½ ‚¸¾£ ‡ˆÅ ¬¨¸ Ž ž¸¸£÷¸ íú „›¸ˆ½Å ¬¸œ¸›¸¸Ê ˆÅ¸ ž¸¸£÷¸ í¾ — œ¸£ Æ¡¸¸ ‚¸œ¸›¸½ ˆÅž¸ú ¡¸½ ¬¸¸½ ¸¸ ¢ˆÅ ¬¸¸¨¸Ä ¸¢›¸ˆÅ ¨¸ ¤¡¸¢Æ÷¸Š¸÷¸ ¬˜¸¥¸¸Ê ˆÅú ¬¸¸ûÅ-¬¸ûŸƒÄ ˆ½Å ¬¸¸˜¸ ¬¸¸˜¸ ퟸ½ ‚œ¸›¸½ ˆÅ¸¡¸¸Ä¥¸¡¸ Ÿ¸½ ‚œ¸›¸½ ”½¬ˆÅ / ˆÅ¸„¿’£ ¸í¸¿ œ¸£ ퟸ œÏ¢÷¸¢™›¸ 8 -10 ‹¸¿’½ ˆÅ¸ ¬¸Ÿ¸¡¸ ¨¡¸÷¸ú÷¸ ˆÅ£÷¸½ í¾, ˆÅú ¬¸¸ûÅ-¬¸ûŸƒÄ œ¸£ ž¸ú „÷¸›¸¸ íú š¡¸¸›¸ ™½›¸½ ˆÅú ‚¸¨¸©¡¸ˆÅ÷¸¸ í¾ — ¡¸í¸Â œ¸£ ‚œ¸›¸ú ”½¬ˆÅ /ˆÅ¸„¿’£ ˆÅú ¬¸¸ûÅ-¬¸ûŸƒÄ ¬¸½ ‚¸©¸¡¸ í¾, ‚œ¸›¸ú ”︂£ ‚¸¾£ Ÿ¸½ ¸ œ¸£ ‚œ¸›¸½ ˆÅ¸¡¸Ä ¬¸½ ¬¸¿¤¸¿¢š¸÷¸ ¬¸Ÿ¸¬÷¸ ˆÅ¸Š¸ ¸¸÷¸, ûŸƒ¥¸½, ¥¸½‰¸›¸ ¬¸¸Ÿ¸ŠÏú, ˆÅŸœ¡¸»’£ ¨¸ ¥¸¾œ¸’¸œ¸, ¬’¸½£½ ¸ Ÿ¸ú¢”¡¸¸ ¸¾¬¸½ œ¸½›¸ ”︃¨¸ /¬¸ú ”ú ‚¸¢™ ˆÅ¸½ œÏ¡¸¸½Š¸ „œ¸£¸¿÷¸ ˆÅ¸¡¸Ä ¬¸Ÿ¸¸¦œ÷¸ œ¸£ ¡¸¸ ‚¢š¸ˆÅ ¬¸Ÿ¸¡¸ ˆ½Å ¢¥¸¡¸½ ¬¸ú’ Ž¸½”÷¸½ ¨¸Æ÷¸ ¤¡¸¨¸¦¬˜¸÷¸ ¨¸ ¬¸º£¢®¸÷¸ ÷¸£úˆ½Å ¬¸½ £‰¸›¸½ ¬¸½ í¾ — ¤¸íº÷¸ ¬¸½ ¬¸¿Š¸“›¸ ƒ¬¸½ ‚œ¸›¸½ ¡¸í¸Â Æ¥¸ú›¸ ”½¬ˆÅ ›¸ú¢÷¸ ˆ½Å ›¸¸Ÿ¸ ¬¸½ ¥¸¸Š¸» ˆÅ£÷¸½ í¾— ÷¸¸½ Æ¡¸¸ í¾ Æ¥¸ú›¸ ”½¬ˆÅ ›¸ú¢÷¸ - œÏ÷¡¸½ˆÅ ˆÅŸ¸Ä ¸¸£ú ˆ½Å ¢¥¸¡¸½ ˆÅ¸¡¸Ä ¢™¨¸¬¸ ˆÅú ¬¸Ÿ¸¸¦œ÷¸ œ¸£ ˆÅ¸¡¸¸Ä¥¸¡¸ ¬¸½ ¸¸›¸½ ¬¸½ œ¸»¨¸Ä ‚œ¸›¸½ ˆÅ¸„¿’£ /Ÿ¸½ ¸ ¸í¸¿ œ¸£ ¨¸í ˆÅ¸¡¸Ä£÷¸ í¾ ¢›¸Ÿ›¸ ¢™©¸¸ ¢›¸™½Ä©¸¸Ê ˆÅ¸ ‚›¸ºœ¸¸¥¸›¸ ¬¸º¢›¸¢ä¸÷¸ ˆÅ£›¸¸ À 1. ¬¸Ÿ¸¬÷¸ Š¸¸½œ¸›¸ú¡¸ ¨¸ ¬¸¿¨¸½™›¸©¸ú¥¸ œ¸°¸/œ¸¢£œ¸°¸ ¨¸ ûŸƒ¥¸½ ¸¸í½ ¨¸½ HARD COPY í¸½ ‚˜¸¨¸¸

52

leejebieCe

efomebyej 2014

,,

¬¸» ¸›¸¸ œÏ¸¾Ô¸¸¾¢Š¸ˆÅú ˆ½Å ¡¸ºŠ¸ Ÿ¸¿½

‚œ¸›¸ú ”½¬ˆÅ /ˆÅ¸„¿’£ ˆÅú ¬¸¸ûÅ-¬¸ûŸƒÄ ¬¸½ ‚¸©¸¡¸ í¾, ‚œ¸›¸ú ”︂£ ‚¸¾£ Ÿ¸½ ¸ œ¸£ ‚œ¸›¸½ ˆÅ¸¡¸Ä ¬¸½ ¬¸¿¤¸¿¢š¸÷¸ ¬¸Ÿ¸¬÷¸ ˆÅ¸Š¸ ¸¸÷¸, ûŸƒ¥¸½, ¥¸½‰¸›¸ ¬¸¸Ÿ¸ŠÏú, ˆÅŸœ¡¸»’£ ¨¸ ¥¸¾œ¸’¸œ¸, ¬’¸½£½ ¸ Ÿ¸ú¢”¡¸¸ ¸¾¬¸½ œ¸½›¸ ”︃¨¸ /¬¸ú ”ú ‚¸¢™ ˆÅ¸½ œÏ¡¸¸½Š¸ „œ¸£¸¿÷¸ ˆÅ¸¡¸Ä ¬¸Ÿ¸¸¦œ÷¸ œ¸£ ¡¸¸ ‚¢š¸ˆÅ ¬¸Ÿ¸¡¸ ˆ½Å ¢¥¸¡¸½ ¬¸ú’ Ž¸½”÷¸½ ¨¸Æ÷¸ ¤¡¸¨¸¦¬˜¸÷¸ ¨¸ ¬¸º£¢®¸÷¸ ÷¸£úˆ½Å ¬¸½ £‰¸›¸½ ¬¸½ í¾ —

,,

SOFT COPY Ÿ¸½ í¸½, ÷¸¸¥¸¸ ¤¸¿™ ¬¸º£¢®¸÷¸ ¬˜¸¸›¸ Ÿ¸½ £‰¸¸ ¸¸‡, ¢ ¸¬¸¬¸½ ¡¸½ ¢ˆÅ¬¸ú ‡½¬¸½ ¨¡¸¢Æ÷¸ ˆ½Å í¸˜¸ ›¸ œ¸”õ½, ¢ ¸›¸¬¸½ ퟸ¸£½ ¬¸¿Š¸“›¸ ¨¸ ŠÏ¸íˆÅ¸Ê ˆ½Å ¢í÷¸¸½ ˆÅ¸½ ›¸ºˆÅ¬¸¸›¸ œ¸íº ¸›¸½ ˆÅú ¬¸¿ž¸¸¨¸›¸¸ í¸½ — 2. ˆÅŸœ¡¸»’£ ˆÅ¸½ ›¸ ¢¬¸ûÄÅ œ¸¸¬¸¨¸”Ä ¬¸½ £¢®¸÷¸ ¢ˆÅ¡¸¸ ¸¸‡, ¡¸í ž¸ú ¬¸º¢›¸¢ä¸÷¸ ¢ˆÅ¡¸¸ ¸¸‡ ˆÅú ˆÅ¸¡¸Ä ˆÅú ¬¸Ÿ¸¸¦œ÷¸ ‚˜¸¨¸¸ ”½¬ˆÅ /ˆÅ¸„¿’£ ¬¸½ ‚¢š¸ˆÅ ¬¸Ÿ¸¡¸ ÷¸ˆÅ ™»£ £í›¸½ ˆÅú ¦¬˜¸¢÷¸ Ÿ¸½ ƒ¬¸½ œ¸»µ¸Ä÷¸¡¸¸ ¤¸¿™ ‚˜¸¨¸¸ ¥¸¸ÁŠ¸ ‚¸ÁûÅ ¢ˆÅ¡¸¸ ¸¸‡ ¢ ¸¬¸¬¸½ ¢ˆÅ¬¸ú ‚›¸¢š¸ˆ¼Å÷¸ ¨¡¸¢Æ÷¸ ׸£¸ ƒ¬¸½ ‰¸¸½¥¸ ˆÅ£ ¬¸¿¨¸½™›¸©¸ú¥¸ /Š¸¸½œ¸›¸ú¡¸ ûŸƒ¥¸½ ¨¸ ¬¸» ¸›¸¸¡¸½ œÏ¸œ÷¸ ›¸ ˆÅú ¸¸ ¬¸ˆ½Å — 3. ûöŸƒ¥¸ ˆ¾Å¢¤¸›¸½’ì¸/”ï¸Á‚£ ¸í¸¿ ¬¸¿¨¸½™›¸©¸ú¥¸ /Š¸¸½œ¸›¸ú¡¸ HARDCOPIES ¡¸¸ SOFTCOPIES œ¸½›¸ ”︃¨¸ /¬¸ú ”ú ‚¸¢™ £‰¸ú ¸¸÷¸ú í¸½ ˆÅ¸½ ˆÅ¸¡¸Ä ¬¸Ÿ¸¸¦œ÷¸ œ¸£ ¡¸¸ ‚¢š¸ˆÅ ™½£ ÷¸ˆÅ ‚¸¨¸©¡¸ˆÅ÷¸¸ ›¸ í¸½›¸½ œ¸£ ÷¸¸¥¸½ Ÿ¸½ ¤¸¿™ ¢ˆÅ¡¸¸ ¸¸‡ ÷¸˜¸¸ ¡¸í ž¸ú ¬¸º¢›¸¢ä¸÷¸ ¢ˆÅ¡¸¸ ¸¸‡ ˆÅú ¸¸¢¤¸¡¸¸Â ‰¸º¥¸½ Ÿ¸½ ƒš¸£ „š¸£ ›¸ Ž¸½”õú ¸¸‡ , ÷¸˜¸¸¢œ¸ ƒ›í½ ¢ˆÅ¬¸ú ‚¢š¸ˆ¼Å÷¸ ¨¡¸¢Æ÷¸ ˆ½Å œ¸¸¬¸ ¬¸º£¢®¸÷¸ £‰¸¸ ¸¸‡ — 4. ‡½¬¸½ ˆÅŸ¸Ä ¸¸£ú ¸¸½ ¥¸¾œ¸’¸œ¸ œÏ¡¸¸½Š¸ ˆÅ£÷¸½ í¸½ , ˆÅ¸„¿’£ ¡¸¸ ”½¬ˆÅ Ž¸½”õ›¸½ ¬¸½ œ¸»¨¸Ä ¬¸º¢›¸¢ä¸÷¸ ˆÅ£½ ˆÅú ¥¸¾œ¸’¸œ¸ ˆÅ¸½ ¥¸¸½¢ˆ¿ÅŠ¸ ˆ½Å¢¤¸¥¸ ¬¸½ ¥¸¸ÁˆÅ ¢ˆÅ¡¸¸ Š¸¡¸¸ í¸½ ‚˜¸¨¸¸ ”ï¸Á‚£ Ÿ¸½ ¤¸¿™ ¢ˆÅ¡¸¸ Š¸¡¸¸ í¸½ — 5. œ¸¸¬¸¨¸”Ä ›¸ ÷¸¸½ œ¸½œ¸£ œ¸£ ¢¥¸‰¸ ˆÅ£ ’½¤¸¥¸ Š¥¸¸¬¸ ˆ½Å ›¸ú ¸½ ¥¸Š¸¸¡¸¸ ¸¸‡ ›¸ íú ƒ¬¸½ ˆÅŸœ¡¸º’£ /Ÿ¸¸Á¢›¸’£ ¡¸¸ ‚¸¬¸ œ¸¸¬¸ ™ú¨¸¸¥¸ œ¸£ ¢¥¸‰¸¸ ¸¸‡— 6. ¬¸ž¸ú ¢œÏ¿’ì¸ ¢œÏ¿’£/ûö¾ÅƬ¸ Ÿ¸©¸ú›¸ ˆ½Å œ¸¸¬¸ ¬¸½ ÷¸º£¿÷¸ í’¸ ¢¥¸¡¸½ ¸¸‡ ¨¸ ¡¸í ž¸ú ¬¸º¢›¸¢ä¸÷¸ ¢ˆÅ¡¸¸ ¸¸‡ ˆÅú ˆÅ¸„¿’£ /”½¬ˆÅ Ž¸½”õ›¸½ ¬¸½ œ¸»¨¸Ä ‚›¸¸¨¸©¡¸ˆÅ ¢œÏ¿’ì¸ ¨¸ ˆÅ¸Š¸ ¸¸½ ˆÅ¸ ¢›¸¬÷¸¸£µ¸ ƒ¬¸ œÏˆÅ¸£ ¢ˆÅ¡¸¸ ¸¸‡ ¢ˆÅ ¢ˆÅ¬¸ú ž¸ú ‚›¸¢š¸ˆ¼Å÷¸

¨¡¸¢Æ÷¸ ׸£¸ ˆ»Å”õ½ ¢ˆÅ ’¸½ˆÅ£ú ¬¸½ „“¸ ˆÅ£ ž¸ú ƒ›¸¬¸½ ¢ˆÅ¬¸ú œÏˆÅ¸£ ¢ˆÅ ¬¸» ¸›¸¸ ›¸ œÏ¸œ÷¸ ¢ˆÅ ¸¸ ¬¸ˆ½Å — 7. ˆÅŸœ¡¸º’£/¥¸¾œ¸’¸œ¸ œ¸£ ¢ˆÅ‡ Š¸‡ ¬¸Ÿ¸¬÷¸ ‚¸¨¸©¡¸ˆÅ ˆÅ¸¡¸Ä ‚¸¾£ ûöŸƒ¥¸ ˆÅ¸ ¤¸¾ˆÅ ‚œ¸ ¢¥¸¡¸¸ ¸¸‡ — 8. ”½¬ˆÅ’¸Áœ¸ œ¸£ ‚›¸¸¨¸©¡¸ˆÅ ‚¸ƒˆÅ¸½›¬¸ ¨¸ ûöŸƒ¥¸ ›¸ £‰¸ú ¸¸‡ ¨¸ ƒ›í½ ¬¸Ÿ¸¡¸ ¬¸Ÿ¸¡¸ œ¸£ DESKTOP ‚¸¾£ £ú¬¸¸ƒˆÅ¥¸ ¢¤¸›¸ ¬¸½ DELETE ž¸ú ¢ˆÅ¡¸¸ ¸¸‡ — ‚œ¸›¸ú ”½¬ˆÅ ˆÅ¸½ Æ¥¸ú›¸ ”½¬ˆÅ ¤¸›¸¸›¸½ ˆ½Å ¢¥¸¡¸½ ‚¸œ¸ ‚¸¿Š¥¸ ž¸¸«¸¸ ˆ½Å 3 `P' ¡¸¸™ £‰¸½ — 1. PLAN 2. PROTECT 3. PICK UP PLAN ¬¸½ ‚˜¸Ä í¾ ¢™›¸ ž¸£ ˆ½Å ˆÅ¸¡¸Ä ¢ˆÅ ¡¸¸½ ¸›¸¸ ¤¸›¸¸ ˆÅ£ ¬¸¸£½ ‚¸¨¸©¡¸ˆÅ ™¬÷¸¸¨¸½ ¸¸½ ˆÅ¸½ ¤¡¸¨¸¦¬˜¸÷¸ ˆÅ£¥¸½ — PROTECT ¬¸½ ‚˜¸Ä í¾ ¬¸ž¸ú ¬¸¿¨¸½™›¸©¸ú¥¸ / Š¸¸½œ¸›¸ú¡¸ ¬¸» ¸›¸¸‚¸Ê ˆÅ¸½ ‚›¸¢š¸ˆ¼Å÷¸ ¨¡¸¢Æ÷¸¡¸¸Ê ÷¸ˆÅ œ¸íº ¸›¸½ ¬¸½ £¸½ˆÅ›¸¸ — PICK UP ¬¸½ ‚˜¸Ä í¾ ˆÅ¸¡¸Ä ¬¸Ÿ¸¸¦œ÷¸ œ¸£ ¬¸ž¸ú ‚¸¨¸©¡¸ˆÅ ¨¸ ¬¸¿¨¸½™›¸©¸ú¥¸ /Š¸¸½œ¸›¸ú¡¸ ™¬÷¸¸¨¸ ¸¸Ê ˆÅ¸½ ¨¸¸œ¸¬¸ ¬¸º£¢®¸÷¸ £‰¸›¸¸ — ¡¸¢™ ‚¸œ¸ 3 `œ¸ú' ¡¸¸™ £‰¸÷¸½ í¾ ‚¸¾£ ƒ›¸ œ¸£ ‚Ÿ¸¥¸ ž¸ú ˆÅ£÷¸½ í¾ ÷¸¸½ ‚¸œ¸ ž¸ú ‚œ¸›¸½ ‚¸œ¸ ˆÅ¸½ Æ¥¸ú›¸ ”½¬ˆÅ OWNER ˆÅí ¬¸ˆÅ÷¸½ í¾ — ‡ˆÅ Æ¥¸ú›¸ ”½¬ˆÅ /ˆÅ¸„¿’£ ퟸ¸£½ ŠÏ¸íˆÅ¸Ê ˆÅ¸½ ž¸ú ퟸ¸£ú ÷¸£ûÅ ‚¸ˆÅ¢«¸Ä÷¸ ˆÅ£÷¸¸ í¾ ¬¸¸˜¸ íú œÏ¢÷¸¢™›¸ ‚¸¨¸©¡¸ˆÅ ™¬÷¸¸¨¸½ ¸¸½ /œ¸½›¸ ”︃¨¸ / ûöŸƒ¥¸ /¬¸ú ”ú ‚¸¢™ ˆÅ¸½ ‰¸¸½ ¸›¸½ Ÿ¸½ ›¸«’ í¸½›¸½ ¨¸¸¥¸½ ¬¸Ÿ¸¡¸ ˆÅú ž¸ú ¤¸ ¸÷¸ ˆÅ£÷¸¸ í¾ —

¬¸» ¸›¸¸ ¬¸º£®¸¸ ›¸ú¢÷¸ ˆÅú í¸½ ¬¸¤¸ˆÅ¸½ ¸¸›¸ˆÅ¸£ú— ¤¸›¸½ ¸¸Š¸³ˆÅ, £í½ ¬¸¸¨¸š¸¸›¸ í£ ˆÅŸ¸Ä ¸¸£ú—— - ‚¢ ¸÷¸ ”¸¿Š¸ú, ‡¬¸‡Ÿ¸ƒÄ, ˆÅ¸½¡¸¿¤¸÷¸»£


After Credit cards and Debit cards we now have Internet banking. The use of mobiles has seen a quantum jump from the beginning of this decade. This has necessitated the various service providers to link their service to the mobile phones. The smart phones invasion in the mobile phone market has made a sea change in the Banking operations. Mobile banking application to suit the simplest mobile phones have been designed, but due to fast and continuous change in the technology it also is facing challenges.

K Murali MDI, Belapur

,,

W

ith every day passing new innovations are coming. New innovations also bring with them new risks. The innovators are required to address these to make their products gain popularity and sustain in the changing time.

In all these, security, both physical and virtual is a great concern. A new application called e wallet has now arrived which renders carrying Credit and Debit Cards with you a thing of past. It also assures double security to your card, as another layer is created over cards. Let us understand that the term e-wallet is a blanket descriptor for a range of technologies that let you perform many tasks. In general, though e-wallet is a transformation in the way you pay for things. Many digital wallet services work through apps on your smartphone. At the supermarket, for instance, you might simply tap your phone to a compatible check-out register to pay instantly. For others, all you need to use them is something you know, such as your mobile phone number and a PIN (personal identification number). A digital wallet is based on encryption software that

The term e- wallet is a blanket descriptor for a range of technologies that let you perform many tasks. In general, though e-wallet is a transformation in the way you pay for things.

,,

substitutes for your old, analog wallet during monetary transactions. You benefit from the protection and convenience. Merchants benefit because they're more protected against fraud and they sell more products, faster. Now this is available for Mac and iphone applications. In days to come it will be available for Android applications also. At POS you need not part with your card, you just select your CARD and allow payment from selected card or account. These e-wallets are secured by 256 bit AED encryption and has backup in icloud. This cash less form may become most acceptable form of transaction in days to come which our Government desires. A smartphone digital wallet will help you pay for stuff, but it will also store your concert tickets, bus and subway passes and gift cards. Retailers will reward your loyalty by offering instant freebies, discounts and coupons. Your digital wallet might even unlock the doors to your house. A digital wallet could alter the way you organize your finances and your life in general.

œ¸¸¬¸¨¸”Ä ˆÅ¸½ £‰¸½¿ Š¸ºœ÷¸, ¢Ÿ¸¥¸½ ¬¸º£®¸¸ ¢¤¸¥¸ˆºÅ¥¸ Ÿ¸ºÉ÷¸ - ¢¨¸ ¸¡¸ œÏˆÅ¸©¸ ªú¨¸¸¬÷¸¨¸, ‡Ÿ¸”ú‚¸ƒÄ, ¤¸½¥¸¸œ¸º£

Taarangan

December 2014

53


Information Security Team InfoSec Cell, Head Office

S

ustenance and growth have always been of paramount importance to any organization in a competitive environment. Information is an asset to an organization and needs to be suitably protected to safeguard the interest of organization’s stakeholders, customers, business partners and employees and also to comply with the statutory & regulatory (local as well as host countries) requirements. Corporate Information Security Policy (CISP) All Bank of India’s information assets (including paper based and IT assets), regardless of the form or format, that are created or used in support of organization’s business activity, shall be protected adequately against breach of Confidentiality, Integrity & Availability. Overall objective is to provide guidance and direction to the Bank for protection of its information and information assets. This policy applies to all information assets owned and leased by Bank of India within India and abroad, all personnel comprising owners, custodians, users of Bank of India’s information assets and employees of Bank of India, all third party vendors having access to the Bank’s information assets. In our bank CISP Ver. 4.1, comprising 22 policies, approved by the Board and in force.

National Critical Information Infrastructure Protection Centre (NCIIPC) As per Section 70 A of the Information Technology Act 2000, the Central Government established “National Critical Information Infrastructure Protection Centre” [NCIIPC] on 16.01.2014. NCIIPC will deal with various critical Sectors like Energy, Telecommunication, Defence, Water Supply and Banking and Finance etc. Mission of NCIIPC is to take all necessary measures to facilitate protection of Critical Information Infrastructure from unauthorized access, modification, use, disclosure, disruption, incapacitation or destruction through coherent coordination, synergy and raising Information Security awareness among all stakeholders.” Indian Computer Emergency Response Team (CERT-In) Is the Government organization under the Department of Information Technology of Ministry of Communications and Information Technology, works to enhance the security of India’s communications and information infrastructure through proactive action and effective collaboration. Reserve Bank of India (Gopalakrishna Committee recommendations) and the National Security Council

54

leejebieCe

efomebyej 2014

Secretariat(NSCS) has advised Banks and IDRBT to set-up a body to report and analyse security events (incidents/threats/ vulnerabilities) identified across the banking Industry. Based on the direction, Chief Information Security Officers(CISO) Forum of Indian Banks, Data Security Council of India (DSCI) and IT Vision of Reserve Bank of India (2011-2017) suggests a need for a platform for information sharing maintaining confidentiality of data. Based on the recommendations from various bodies and the direction from regulator, IB-CART has been set-up. Indian Banks – Center for Analysis of Risks and Threats (IB-CART) IT Vision of Reserve Bank of India (2011-2017) suggests a need for a platform for information sharing maintaining confidentiality of data. Based on the recommendations from various bodies and the direction from regulator, IB-CART has been set-up. The primary objective is to disseminate and foster the sharing of relevant and actionable threat information among members to ensure the continued public confidence in the banking sector. IB-CART shall use the information being logged in IB-CART portal for the benefit of member organisations in terms of providing direction on potential security events to the banking infrastructure and sharing information on security events between members. I S LITERACY, LEARNING AND LESSON (LLL) We are publishing LLL on 10th of every month. LLL is a part of employee awareness/learning program with an idea to educate/ alert customers about cyber frauds. Under LLL, news on Cyber Crimes are published (Literacy & Learning) with the suggestive precautionary measures (Lesson) to avert becoming /falling a victim of such incidents in future. Development of E-Learning modules under StarDesk We have proposed 5 online E-Learning Audeo/Video modules on Information Security. These modules are part of Education and awareness program comprising animation/Audio/Video messages, clips, questions, scores, feedback etc. One of the module “Internet Banking” is ready and very soon it will be made available to the staff under StarDesk -> E-learning. Information Security Portal Information Security Portal has been revamped. Circulars, Policies, Tech News, Material for education and awareness program are being uploaded on regular basis.


©¸¤™¸¨¸¥¸ú / Glossary • Access Control - Access Control ensures that resources are only granted to those users who are entitled to them. • Backdoor - A backdoor is a tool installed after a compromise to give an attacker easier access to the compromised system around any security mechanisms that are in place. • Bandwidth - Commonly used to mean the capacity of a communication channel to pass data through the channel in a given amount of time, expressed in bits per second. • Biometrics - Biometrics use physical characteristics of the users to determine access. • Business Continuity Plan (BCP) - A BCPlan is the plan for emergency response, backup operations, and postdisaster recovery steps that will ensure the availability of critical resources and facilitate the continuity of operations in an emergency situation. • Cryptography - In cryptography, encryption is the process of encoding messages or information in such a way that only authorized parties can read it. • Digital certificate - A digital certificate allows a person, computer or organization to exchange information securely over the Internet using the public key infrastructure (PKI). • Demilitarized Zone (DMZ) - Is a network area that sits between an organization's internal network and an external network, usually the Internet. DMZ's help to enable the layered security model. • Denial of Service - The prevention of authorized access to a system resource or the delaying of system operations and functions. • Disaster Recovery Plan (DRP) - A DRPlan is the process of recovery of IT systems in the event of a disruption or disaster. • Domain Name - A domain name locates an organization or other entity on the Internet. • File Transfer Protocol (FTP) - A TCP/IP protocol specifying the transfer of text or binary files across the network. • Firewall - A logical or physical discontinuity in a network to prevent unauthorized access to data or resources. • Honey pot - Programs that simulate one or more network services that you designate on your computer's ports. • HTTPS - When used in the first part of a URL, this term specifies the use of HTTP enhanced by a security mechanism, which is usually SSL. • Hypertext Markup Language (HTML) - The set of markup symbols or codes inserted in a file intended for display on a World Wide Web browser page. • Hypertext Transfer Protocol (HTTP) • IP Spoofing - The technique of supplying a false IP address. • Malicious Code - Software (e.g., Trojan horse) that appears to perform a useful or desirable function, but actually gains

• • • •

• •

unauthorized access to system resources or tricks a user into executing other malicious logic. Pharming - This is a more sophisticated form of attack. A user’s session is redirected to a masquerading website. This can be achieved by corrupting a DNS server on the Internet and pointing a URL to the masquerading website’s IP. Phishing - The use of e-mails that appear to originate from a trusted source to trick a user into entering valid credentials at a fake website. Rootkit - A collection of tools (programs) that a hacker uses to mask intrusion and obtain administrator-level access to a computer or computer network. Security Policy - A set of rules and practices that specify or regulate how a system or organization provides security services to protect sensitive and critical system resources. TCP/IP - TCP/IP is the basic communication language or protocol of the Internet. Uniform Resource Locator (URL) The global address of documents and other resources on the World Wide Web. Vulnerability - In computer security, a vulnerability is a weakness which allows an attacker to reduce a system's information assurance. Vishing - The word is a combination of "voice" and phishing. Voice phishing is typically used to steal credit card numbers or other information used in identity theft schemes from individuals. Worm - A computer program that can run independently, can propagate a complete working version of itself onto other hosts on a network, and may consume computer resources destructively.

Malware Attack 1. Ensure that your computer has Anti-Virus and Anti Malware / Spyware installed and it is updated. 2. Updates regularly to keep your operating system patched against known vulnerabilities. Install patches. 3. Use extreme caution when opening attachments. 4. Avoid downloading files with the extensions .exe, .scr, .lnk, .bat, .vbs, .dll, .bin, and cmd. 5. Don’t reply to an email or pop-up message that asks for personal information. 6. Never download / install / run programs / files from untrusted sources. 7. Don’t click on any link which has come through unknown sources. 8. Never leave the PC unattended while using internet banking. 9. Generally games, pornographic sites, chat rooms, messaging service sites and the like are storehouse of viruses / malware. Browse those judiciously. 10. Be certain a web site is legitimate before you go there. If your computer has suddenly become slower, it may be compromised by malware or spyware, or you may be experiencing a denial-of-service attack.

Taarangan

December 2014

55


¡¸»¢›¸¡¸›¸ ¤¸ÿˆÅ ׸£¸ ž¸¸½œ¸¸¥¸ Ÿ¸Ê ‚¸¡¸¸½¢ ¸÷¸ ‚¢‰¸¥¸ ž¸¸£÷¸ú¡¸ ‚¸¿÷¸£ ¤¸ÿˆÅ ¬¸¿Š¸ú÷¸ œÏ¢÷¸¡¸¸½¢Š¸÷¸¸ Ÿ¸Ê ¤¸ÿˆÅ ˆÅú ¬¸¿Š¸ú÷¸ ’úŸ¸ ›¸½ ¢¨¸¢ž¸››¸ œÏ¢÷¸¡¸¸½¢Š¸÷¸¸‚¸Ê Ÿ¸Ê 9 œ¸º£¬ˆÅ¸£ œÏ¸œ÷¸ ˆÅ£÷¸½ íº‡ „œ¸¢¨¸ ¸½÷¸¸ ’úŸ¸ ˆÅ¸ ¢‰¸÷¸¸¤¸ ‚œ¸›¸½ ›¸¸Ÿ¸ ¢ˆÅ¡¸¸— ’úŸ¸ ˆÅ¸ ›¸½÷¸¼÷¨¸ ªú ¬¸º£½©¸ ¤¸¸œ¸’ ›¸½ ¢ˆÅ¡¸¸—

BOI STAR

PANDIT SURESH P BAPAT

P

andit Suresh P. Bapat started learning music at the age of 10. His initial Gurus were Smt. Leela Shelar, Late Bhaskarrao Phatak, Achyut Abhyankar. Thereafter, he remained under the guidance of popular Vocalist Pt. Prabhakar Karekar for about 7-8 years. Since last 18 years, he is under the tutelage of Dr. Ashok Ranade, great musicologist & expertise in Gwalior, Agra & Jaipur Gharana Gayaki. He has now developed his own style in these years with his vigorous Riyaz & learning from the above Gurus. He has learnt variety of Anavat Ragaas with different types of uncommon Bandish from Dr. Ranade. The method of developing a Raga with logical Alaaps layakari & taans with different patterns Bol Banav is the outcome of Dr. Ranade's teaching in Suresh's Gayaki. ACHIEVEMENTS Shri Bapat passed Sangeet Visharad with 1st place in India during the year 1993. He has 5 other major Awards in his name viz. Pt. D V Paluskar, Pt. Shankarrao Sapre, Hari om trust, Nalini Kanvinde, Shailaja Jawdekar & Shankar Rao Modak. He has been awarded Gold medal from Government of Maharashtra for performance in Sangeet Natak Panditraj Jagannath. He achieved ‘A Grade’ in Hindustani Vocal on AIR in 2001. The National Program was broadcasted on 4th August 2007 and 28th August 2007. Recently, his 3rd National programme was recorded at Bangalore and was broadcasted on 4th December 2014. He has also performed at many places in India organized by various music circles as Dadar Matunga Cultural Centre,

56

leejebieCe

efomebyej 2014

NCPA, Saptak Nagpur, Samrat Sangeet Sameelan Goa, Ram Marathe Sangeet Samaroh, Gopi Krishna Mohotsav, Swanand Indore, Pt. Kumar Gandharva Sangeet Samaroha at Phaltan in 2008, Pt. Basavaraj Rajguru Sangeet Sammelan in 2009, Bharat Gayan Samaj Pune on 30/01/2011, Bajaa Gajaa Sammelan, Pune on 04/02/2011 & also performed at Sawantwadi Sangeet Sammelan a morning classical concert. He had a very successful tour of USA in July 2007 and also toured Australia during June-July, 2012. During this period, he gave wonderful performances at Melbourne , Sydney etc. He has also performed on various channels of Television as Sahyadry, Zee TV, E-TV, Saam & recently performed at PRATASWAR, organized by well-known organization ‘Pancham-Nishad’ & was highly appreciated by the large volume of elite class audience. In the words of the organizer, Shri Shashi Vyas what they heard was one of the authentic and pure Raaga-sangeet. His various Audio CDs of Bhajan, Natyasangeet, Thumris Classical have been released and appreciated worldwide. His recently released CDs are ‘Amrutwani’ of traditional bhajans, ‘Parampara’ of Exclusive classical contains four ragas with Dr. Ashok Ranadeji’s innovative bandishs. ‘Marmabandhatli Thev Hi’ of Natya Sangeet & ‘Swaroop Sanjivani’ MP3 CD of Swami Swaroopananda’s 18 Abhangas Composed and Sung by Pt. Suresh Bapat.


¬’¸œ¸€ ˆÅú „œ¸¥¸¢¤š¸¡¸¸¿ / Staff Achievements Cartoonist-

Shri Vinod C Dixit

œ¸¡¸¸Ä¨¸£µ¸ ¢Ÿ¸°¸ ‡¨¸¿ ¬¸Ÿ¸¸ ¸¬¸½¨¸ú

ªú Ÿ¸º£¥¸úš¸£ ¤¸½¥¸‰¸¸½”½

›¸¸

A

book on cartoons “BANKING THE OTHER VIEW” written and sketched by Vinod Chandrashekhar Dixit, Manager, NBG-Central was released at the hands of ED Shri B P Sharma, the then GM NBG (C), Shri Arihant Kumar Jain, GM NBG (C), Shri T Sudhakar, ZM Ahmedabad Zone and Shri R K Mitra in Ahmedabad. He is the first officer of Bank of India who has come out with a book on cartoons. He has sketched many Cartoons. His cartoons belonging to various situations in the Bank are rich in artistic expressions and demonstrate with a deep sense of humor and his understanding of lighter side in a rather tense scenario. Dixit - a Free – Lance Journalist, Writer & Cartoonist, has developed interest in cartooning, rigorously pursued it as a hobby. Readers greatly appreciate the artistic way he expresses sarcasm in his humor in day-to-day dealings. By creating cartoons he has left his own stamp in society. "The world can be changed through humor and simple laughter when most of the people are leading stressful life" is what Dixit believes in. His cartoons are a powerful tool of communication with a power of observational comedy. Every issue that forms the theme of a cartoon is made more interesting by bold and colorful strokes and funny text.

Š¸œ¸º£ ‚¿ ¸¥¸ ˆÅú ¨¸š¸¸Ä ©¸¸‰¸¸ Ÿ¸Ê ˆÅ¸¡¸Ä£÷¸ ªú Ÿ¸º£¥¸úš¸£ ¤¸½¥¸‰¸¸½”½ ˆÅ¸ ›¸¸Ÿ¸ ¨¸š¸¸Ä ¢ ¸¥¸¸ Ÿ¸Ê œ¸¡¸¸Ä¨¸£µ¸ ¢Ÿ¸°¸ ˆ½Å ³Åœ¸ Ÿ¸Ê ‚œ¸›¸ú ‚¥¸Š¸ œ¸í ¸¸›¸ ¤¸›¸¸ ¸ºˆÅ¸ í¾— ªú ¤¸½¥¸‰¸¸½”½ ¢œ¸Ž¥¸½ 20 ¨¸«¸¸½ô ¬¸½ ¨¸š¸¸Ä ©¸í£ Ÿ¸Ê œ¸¡¸¸Ä¨¸£µ¸ ˆÅ¸½ œÏ™º«¸µ¸Ÿ¸ºÆ÷¸ ˆÅ£›¸½ ˆ½Å ‚¢ž¸¡¸¸›¸ Ÿ¸Ê ¸º”õ½ íº‡ íÿ ‚¸¾£ ¥¸¸½Š¸¸Ê ˆ½Å ¤¸ú ¸ ¨¸¼®¸¸£¸½œ¸µ¸ ˆ½Å Ÿ¸í÷¨¸ ˆÅ¸½ œ¸íº¿ ¸¸›¸½ ˆÅ¸ ˆÅ¸¡¸Ä ˆÅ£ £í½ íÿ— ªú ¤¸½¥¸‰¸¸½”½ ˆ½Å ‚˜¸ˆÅ œÏ¡¸¸¬¸¸Ê ¬¸½ ¨¸š¸¸Ä ©¸í£ ˆ½Å ¢¨¸¢ž¸››¸ œÏž¸¸Š¸¸Ê, ¤¸ÿˆÅ ˆÅú ¨¸š¸¸Ä ¦¬˜¸÷¸ ¬¸Ÿ¸¬÷¸ ©¸¸‰¸¸‚¸Ê ‚¸¾£ ˆÅ¬¤¸¸Ê Ÿ¸Ê ¥¸Š¸ž¸Š¸ 1 ¥¸¸‰¸ ¬¸½ ‚¢š¸ˆÅ ¨¸¼®¸ ¥¸Š¸¸‡ ¸¸ ¸ºˆ½Å íÿ— ƒ¬¸ˆ½Å ‚¢÷¸¢£Æ÷¸ ¨¸í ©¸¸‰¸¸ ˆ½Å ¢¥¸‡ ‚¥¸Š¸-‚¥¸Š¸ ¢¨¸ž¸¸Š¸¸Ê ‚¸¾£ ‚œ¸›¸½ ¬¸¿œ¸ˆÅ¸½ô ¬¸½ ˆÅƒÄ ˆÅ£¸½”õ ³Åœ¸‡ ˆÅú ¸Ÿ¸¸£¸¢©¸ ¬¸¿ŠÏíµ¸ ˆÅ¸ ¬¸í¡¸¸½Š¸ ˆÅ£ ¸ºˆ½Å íÿ— ‡ˆÅ ‹¸£, ‡ˆÅ ¨¸¼®¸, ¬Ÿ¸¼¢÷¸ ¨¸¼®¸, ¸›Ÿ¸¢™›¸ ¨¸¼®¸ ˆÅ¸ ¬¸¿ˆÅ¥œ¸ ¥¸½ˆÅ£ ¨¸¼®¸¸£¸½œ¸µ¸ ˆÅ£›¸½ ¨¸¸¥¸½ ƒ¬¸ ¤¸íº‚¸¡¸¸Ÿ¸ú ¨¡¸¢Æ÷¸÷¨¸ ›¸½ œ¸¡¸¸Ä¨¸£µ¸ ˆÅ¸½ ¬¨¸ Ž ¤¸›¸¸›¸½ ˆÅ¸ ‚œ¸›¸¸ œÏ¡¸¸¬¸ ¸¸£ú £‰¸¸ íº‚¸ í¾— ƒ¬¸ ‚¢÷¸¢£Æ÷¸ ¬¸Ÿ¸¸ ¸¬¸½¨¸ú ˆ½Å ³Åœ¸ Ÿ¸Ê ž¸ú ¤¸¸¥¸ ¬¸¿¬ˆÅ¸£ ¢©¸¢¨¸£, £Æ÷¸™¸›¸, ŠÏ¸Ÿ¸ ¬¨¸ Ž÷¸¸ ‚¢ž¸¡¸¸›¸, ¡¸º¨¸¸ ¨¡¸¢Æ÷¸÷¨¸ ¢¨¸ˆÅ¸¬¸, ‚œ¸¸£¿œ¸¢£ˆÅ … ¸¸Ä ‚¸¢™ ˆÅ¸ ˆÅ¸¡¸Ä ž¸ú ‚¸Š¸½ ¤¸ ¸ £íÊ íÿ— ƒ›íÊ ¬¸Ÿ¸¸ ¸ ¬¸½¨¸¸ ‚¸¾£ œ¸¡¸¸Ä¨¸£µ¸ ¬¸¿£®¸µ¸ ˆ½Å ®¸½°¸ Ÿ¸Ê ¬¸£¸í›¸ú¡¸ ¡¸¸½Š¸™¸›¸ ˆ½Å ¢¥¸‡ œ¸¡¸¸Ä¨¸£µ¸ Ÿ¸¿°¸¸¥¸¡¸ ž¸¸£÷¸ ¬¸£ˆÅ¸£ ׸£¸ ƒ¿¢™£¸ ¢œÏ¡¸¼™©¸Ä›¸ú ¨¸¼®¸¢Ÿ¸°¸ œ¸º£¬ˆÅ¸£, ÷¸˜¸¸ Ÿ¸í¸£¸«’ï £¸ ¡¸ ˆÅ¸½ Š¸ºµ¸¨¸¿÷¸ ˆÅ¸Ÿ¸Š¸¸£ œ¸º£¬ˆÅ¸£, ¨¸›¸ªú, œ¸¡¸¸Ä¨¸£µ¸ ˆ¼Å÷¸±¸÷¸¸ œ¸º£¬ˆÅ¸£, Ÿ¸í¸£¸«’ï ¬¸ŸŸ¸¸›¸ œ¸º£¬ˆÅ¸£, ¬¸¿÷¸ Š¸¸”Š¸½ ¤¸¸¤¸¸ ¬¸½¨¸¸ œ¸º£¬ˆÅ¸£, ¥¸¸½ˆÅ¬¸½¨¸¸ Ÿ¸¿ ¸ ¨¸š¸¸Ä ˆÅ¸ ¬¸Ÿ¸¸ ¸ ¬¸½¨¸¸ œ¸º£¬ˆÅ¸£, ÷¸˜¸¸ ˆÅƒÄ ‚›¡¸ ¤¸”õú ¬¸¿¬˜¸¸‚¸Ê ׸£¸ œ¸¡¸¸Ä¨¸£µ¸ ¢Ÿ¸°¸ œ¸º£¬ˆÅ¸£¸Ê ¬¸½ ¬¸ŸŸ¸¸¢›¸÷¸ ¢ˆÅ¡¸¸ ¸¸ ¸ºˆÅ¸ í¾— ªú ¤¸½¥¸‰¸¸½”½ ›¸½ ‚œ¸›¸½ ƒ¬¸ ˆÅ¸¡¸Ä ¬¸½ ¤¸ÿˆÅ ‚¸ÁûÅ ƒ¿¢”¡¸¸ ˆÅ¸ ›¸¸Ÿ¸ £¸½©¸›¸ ¢ˆÅ¡¸¸ í¾— ¤¸ú‚¸½‚¸ƒÄ œ¸¢£¨¸¸£ ªú ‰¸¸½”½ ˆ½Å ƒ¬¸ œ¸£¸½œ¸ˆÅ¸£ú ˆÅ¸¡¸Ä ˆ½Å ¢¥¸‡ „›¸ˆÅú ¬¸£í¸›¸¸ ˆÅ£÷¸¸ í¾—

‘BOI Parivar’ wishes him all the very best for his future endeavors.

‚™Ÿ¡¸ ¢¨¸©¨¸¸¬¸ ˆ½Å œÏ÷¸úˆÅ

ªú £¸Ÿ¸ˆºÅŸ¸¸£ ¡¸¸™¨¸

Shri Sandeep S/o Mr. Shambhu Nath Mishra, Faculty, STC Noida. Release of Debut Novel "Almost There But Yet Not Arrived" at Leadership Summit in Bengaluru.

‘BOI Parivar’ wishes him Bright Future.

ªú £¸Ÿ¸ˆºÅŸ¸¸£ ¡¸¸™¨¸ ¢™›¸¸¿ˆÅ 13-4-2010 ¬¸½ Ÿ¸º{¸Éœ¸€£œ¸º£ ‚¿ ¸¥¸ ˆÅú Ÿ¸š¸º¤¸›¸ú ©¸¸‰¸¸ Ÿ¸Ê ¢¥¸¢œ¸ˆÅ ˆ½Å œ¸™ œ¸£ ˆÅ¸¡¸Ä£÷¸ í¾¿— ƒ›¸ˆ½Å ™¸½›¸¸½¿ í¸˜¸ ˆÅ’½ íº‡ í¾¿ — ƒ¬¸ˆ½Å ¤¸¸¨¸ ¸»™ ¨¸½ ©¸¸‰¸¸ ˆ½Å ¬¸ž¸ú ˆÅ¸¡¸¸½ô ˆÅ¸½ ˆºÅ©¸¥¸÷¸¸œ¸»¨¸ÄˆÅ ˆÅ£ £í½ íÿ — ¨¸½ œ¸»£½ „÷¬¸¸í ‚¸¾£ Š¸Ÿ¸Ä ¸¸½©¸ú ˆ½Å ¬¸¸˜¸ ŠÏ¸íˆÅ¸½¿ ˆÅ¸½ ¤¸ÿ¢ˆ¿ÅŠ¸ ¬¸º¢¨¸š¸¸ ™½÷¸½ í¾¿ — ƒ›¸ˆ½Å ª½«“ ˆÅ¸¡¸Ä¢›¸«œ¸¸™›¸ ®¸Ÿ¸÷¸¸ ¬¸½ ¬¸ž¸ú ¬’¸œ¸€ ¬¸™¬¡¸ ‡¨¸¿ ©¸¸‰¸¸ œ¸¢£¬¸£ Ÿ¸½¿ ‚¸›¸½¨¸¸¥¸½ ŠÏ¸íˆÅ ¤¸íº÷¸ œÏ¬¸››¸ £í÷¸½ íÿ — ¡¸½ Ÿ¸š¸º¤¸›¸ú ©¸í£ Ÿ¸½¿ ¬¸ž¸ú ›¸¸Š¸¢£ˆÅ¸½¿ ˆ½Å ¢¥¸‡ œÏ½£µ¸¸è¸¸½÷¸ ¤¸›¸ Š¸‡ íÿ — ‡½¬¸½Å ˆÅ÷¸Ä¨¡¸¢›¸«“ ¨¡¸¢Æ÷¸ ›¸ ¢¬¸œ¸Ä€ ퟸ¸£½ ¤¸ÿˆÅ ¤¸¢¥ˆÅ ¬¸Ÿ¸¸ ¸ ˆÅú ‚Ÿ¸»¥¡¸ ¬¸¿œ¸™¸ íÿ— `¤¸ú‚¸½‚¸ƒÄ œ¸¢£¨¸¸£' ƒ›¸ˆ½Å ƒ¬¸ ‚™Ÿ¡¸ ¢¨¸©¨¸¸¬¸ ˆÅú ¬¸£¸í›¸¸ ˆÅ£÷¸¸ í¾—

Taarangan

December 2014

57


¢©¸®¸µ¸ - œÏ¢©¸®¸µ¸ / Training

ž¸¸

‚š¡¸®¸ ‡¨¸¿ œÏ¤¸¿š¸ ¢›¸™½©¸ˆÅ ˆÅ¸ ‡¬¸’ú¬¸ú ž¸¸½œ¸¸¥¸ Ÿ¸Ê ‚¸Š¸Ÿ¸›¸

£÷¸ ž¸»¢Ÿ¸ ˆÅ¸ ᙡ¸ œÏ™½©¸, Ÿ¸š¡¸ œÏ™½©¸ ˆÅú £¸ ¸š¸¸›¸ú ž¸¸½œ¸¸¥¸ `` ¸ú¥¸¸Ê ˆÅú ›¸Š¸£ú'' ˆ½Å ›¸¸Ÿ¸ ¬¸½ ™½©¸-¢¨¸™½©¸ Ÿ¸Ê ¢¨¸‰¡¸¸÷¸ í¾ ‚¸¾£ ƒ¬¸ú ›¸Š¸£ú Ÿ¸Ê ‚£½£¸ ¢í¥¬¸ œ¸£ ‡¬¸’ú¬¸ú Ÿ¸í¸¢¨¸Ô¸¸¥¸¡¸ ¦¬˜¸÷¸ í¾— ¤¸ÿˆÅ ˆÅú ¬¸ú‡Ÿ¸”ú ªúŸ¸÷¸ú ¨¸ú ‚¸£ ‚¡¡¸£ ›¸½ ‚œ¸›¸½ ¤¸íºŸ¸º¥¡¸ ¬¸Ÿ¸¡¸ Ÿ¸Ê ¬¸½ ‡ˆÅ ¢™›¸ ‡¬¸’ú¬¸ú Ÿ¸í¸¢¨¸Ô¸¸¥¸¡¸ ˆ½Å ¢¥¸‡ ™½ˆÅ£ ƒ¬¸ ®¸µ¸ ˆÅ¸½ ¡¸¸™Š¸¸£ ¤¸›¸¸ Š¸¡¸¸— ªúŸ¸÷¸ú ‚¡¡¸£ ˆÅ¸ Ÿ¸í¸¢¨¸Ô¸¸¥¸¡¸ Ÿ¸Ê ‚¸Š¸Ÿ¸›¸ ¢¨¸©¸½«¸ ³Åœ¸ ¬¸½ ``LEADERSHIP ENHANCEMENT AND APPRECIATION PROGRAMME'' - LEAP ˆÅú ¸¸£ ¢™¨¸¬¸ú¡¸ ˆÅ¸¡¸Ä©¸¸¥¸¸ ˆ½Å ¬¸Ÿ¸¸œ¸›¸ œ¸£ œÏ¢÷¸ž¸¸¢Š¸¡¸¸Ê ˆÅ¸½ ¬¸¿¤¸¸½¢š¸÷¸ ˆÅ£›¸½ ˆ½Å ¢¥¸‡ ˜¸¸— ƒ¬¸ ™¸¾£¸›¸ „›í¸Ê›¸½ ¤¸íº÷¸ ¤¸”õú ‡¨¸¿ ‚¬¸¸š¸¸£µ¸ ¤¸”õú ©¸¸‰¸¸‚¸Ê ˆ½Å Ÿ¸º‰¡¸ œÏ¤¸¿š¸ˆÅ¸Ê ‡¨¸¿ ¬¸í¸¡¸ˆÅ Ÿ¸í¸œÏ¤¸¿š¸ˆÅ¸Ê ž¸ú ¬¸¿¤¸¸½¢š¸÷¸ ¢ˆÅ¡¸¸— œÏš¸¸›¸ ˆÅ¸¡¸¸Ä¥¸¡¸ ¬¸½ œ¸š¸¸£½ Ÿ¸º‰¡¸ Ÿ¸í¸œÏ¤¸¿š¸ˆÅ ªú £¸ ¸ú¨¸ ¬¸Æ¬¸½›¸¸ ›¸½ œÏ¢÷¸ž¸¸¢Š¸¡¸¸Ê ˆ½Å ¬¸¸˜¸ … ¸¸Ä¨¸¸›¸ ¬¸¿¤¸¸½š¸›¸ ¬¸½ œÏ¢÷¸ž¸¸¢Š¸¡¸¸Ê ˆÅ¸½ ¬¸ˆÅ¸£¸÷Ÿ¸ˆÅ … ¸¸Ä ¬¸½ ž¸£ ¢™¡¸¸ — LEAP - ˆÅ¸ ¥¸®¡¸ ˜¸¸ - ``‰¸º©¸ £íÊ, ‰¸º¢©¸¡¸¸Â ¬¸¼¢ ¸÷¸ ˆÅ£Ê ‡¨¸¿ ‰¸º©¸ £‰¸Ê''— ‡¬¸’ú‡¬¸ú œÏ¸ ¸¸¡¸Ä ªú ‡ ¸ œ¸ú ¢×¨¸½™ú ›¸½ œÏ¢÷¸ž¸¸¢Š¸¡¸¸Ê ˆ½Å ¢¥¸‡ ƒ¬¸ ``LEAP'' ˆÅ¸½ leap ¡¸¸›¸ú ``¥¸®¡¸ œÏ¸¦œ÷¸ ˆ½Å ¢¥¸‡ ŽÃ¥¸¸¿Š¸'' ˆÅú ¬¸¿±¸¸ ™ú ¢ ¸¬¸ˆÅú ‚š¡¸®¸ ‡¨¸¿ œÏ¤¸¿š¸ ¢›¸™½©¸ˆÅ ›¸½ ¬¸£í¸›¸¸ ˆÅú— ƒ¬¸ú ¨¡¸¬÷¸÷¸¸ Ÿ¸Ê ¬¸Ÿ¸¡¸ ¢›¸ˆÅ¸¥¸ ˆÅ£ ªúŸ¸÷¸ú ‚¡¡¸£ ›¸½ ž¸¸½œ¸¸¥¸ ¦¬˜¸÷¸ ‚¸¿ ¸¢¥¸ˆÅ ˆÅ¸¡¸¸Ä¥¸¡¸ ˆ½Å ¬¸Ÿ¸¬÷¸ ¬’¸ûÅ ‡¨¸¿ ¬˜¸¸›¸ú¡¸ ©¸¸‰¸¸‚¸Ê ˆ½Å ©¸¸‰¸¸ œÏŸ¸º‰¸¸Ê ˆÅ¸½ ž¸ú ¬¸¿¤¸¸½¢š¸÷¸ ¢ˆÅ¡¸¸ — ‚¸¿ ¸¢¥¸ˆÅ ˆÅ¸¡¸¸Ä¥¸¡¸ œ¸¢£¬¸£ ˆ½Å ›¸¨¸ ¢›¸¢Ÿ¸Ä÷¸ Ÿ¸¿¢™£ Ÿ¸Ê ªúŸ¸÷¸ú ‚¡¡¸£ ›¸½ ž¸Š¸¨¸¸›¸ ªú Š¸µ¸½©¸ ˆ½Å ™©¸Ä›¸ ¢ˆÅ‡ ÷¸˜¸¸ Ÿ¸í¸¢¨¸Ô¸¸¥¸¡¸ ¦¬˜¸÷¸ ¨¸¸¢’ˆÅ¸ Ÿ¸Ê ¨¸¼®¸¸£¸½œ¸µ¸ ˆÅ£ ‚œ¸›¸½ ‚¸Š¸Ÿ¸›¸ ˆÅ¸½ ‡½¢÷¸í¸¢¬¸ˆÅ ¤¸›¸¸ ¢™¡¸¸ —

‡¬¸’ú¬¸ú ž¸¸½œ¸¸¥¸ ‚¸Š¸Ÿ¸›¸ œ¸£ œÏ¸ ¸¸¡¸Ä ªú ‡ ¸ ˆ½Å ¢×¨¸½™ú ‚š¡¸®¸ ‡¨¸¿ œÏ¤¸¿š¸ˆÅ ¢›¸™½©¸ˆÅ ªúŸ¸÷¸ú ¨¸ú ‚¸£ ‚¡¡¸£ ˆÅ¸ ¬¨¸¸Š¸÷¸ ˆÅ£÷¸½ íº‡—

‚š¡¸®¸ ‡¨¸¿ œÏ¤¸¿š¸ˆÅ ¢›¸™½©¸ˆÅ ªúŸ¸÷¸ú ¨¸ú ‚¸£ ‚¡¡¸£ ‡¬¸’ú¬¸ú ‡¬¸’ú¬¸ú ž¸¸½œ¸¸¥¸ Ÿ¸Ê ‚¸¡¸¸½¢ ¸÷¸ ¤¸¸¥¸ ¢™¨¸¬¸ ˆ½Å ‚¨¸¬¸£ œ¸£ Ÿ¸»ˆÅ, ¤¸¢š¸£ ¨¸¸¢’ˆÅ¸ Ÿ¸Ê ¨¸¼®¸¸£¸½œ¸µ¸ ˆÅ£÷¸ú íºƒô— ¬¸¸˜¸ Ÿ¸Ê ÷¸÷ˆÅ¸¥¸ú›¸ ‚¸¿.œÏ. ‡¨¸¿ ¢¨¸ˆÅ¥¸¸¿Š¸ ¤¸ ¸¸Ê ˆÅú ¬¸¿¬˜¸¸ `‚¸³¢«¸' ˆ½Å ¤¸ ¸¸Ê ˆÅ¸½ ¬ˆ»Å¥¸ ¤¸¾Š¸ ˆÅ¸ ªú £¸ ¸ú¨¸ Š¸ºœ÷¸¸ ‡¨¸¿ ‚¸¿.œÏ. ƒ¿™¸¾£ ‚¿ ¸¥¸ ªú ‡Ÿ¸ ©¸›Ÿ¸ºŠ¸Ÿ¸— ¢¨¸÷¸£µ¸ ˆÅ£÷¸½ 퇺 œÏ¸ ¸¸¡¸Ä ‡¬¸’ú¬¸ú ªú ‡ ¸ œ¸ú ¢×¨¸½™ú—

‡¬¸’ú¬¸ú ›¸¸½‡”¸ Ÿ¸Ê ”ú‚¸£‚¸½ ˆ½Å ¢¥¸‡ ‚¸¡¸¸½¢ ¸÷¸ œÏ¢©¸®¸µ¸ ˆÅ¸¡¸ÄÇÅŸ¸ Ÿ¸Ê Ÿ¸.œÏ. (Ÿ¸¸.¬¸¿.) ªú ¸£µ¸ ¢¬¸¿í ‡ˆÅ œÏ¢÷¸ž¸¸Š¸ú ”ú‚¸£‚¸½ ˆÅ¸½ œ¸º¬÷¸ˆÅ ž¸Ê’ ˆÅ£÷¸½ íº‡— ¬¸¸˜¸ Ÿ¸Ê, œÏ¸ ¸¸¡¸Ä ªú ‚©¸¸½ˆÅ ¢Ÿ¸ª¸—

‚š¡¸®¸ ‡¨¸¿ œÏ¤¸¿š¸ˆÅ ¢›¸™½©¸ˆÅ ªúŸ¸÷¸ú ¨¸ú ‚¸£ ‚¡¡¸£ ¥¸úœ¸ ˆÅ¸¡¸ÄÇÅŸ¸ ˆ½Å œÏ¢÷¸ž¸¸¢Š¸¡¸¸Ê ˆ½Å ¬¸¸˜¸—

‡¬¸’ú¬¸ú ž¸¸½œ¸¸¥¸ Ÿ¸Ê ”ú‚¸£‚¸½ ˆ½Å ¢¥¸‡ ‚¸¡¸¸½¢ ¸÷¸ œÏ¢©¸®¸µ¸ ˆÅ¸¡¸ÄÇÅŸ¸ Ÿ¸Ê ÷¸÷ˆÅ¸¥¸ú›¸ Ÿ¸.œÏ. ‡¨¸¿ œÏ¸ ¸¸¡¸Ä ‡Ÿ¸”ú‚¸ƒÄ ªú ™½¤¸¸©¸ú«¸ ¸ÇŨ¸÷¸úÄ, œÏ¸ ¸¸¡¸Ä ‡¬¸’ú¬¸ú ªú ‡ ¸ œ¸ú ¢×¨¸½™ú, ¬¸¿ˆÅ¸¡¸ ¬¸™¬¡¸ ‡¨¸¿ œÏ¢÷¸ž¸¸Š¸úŠ¸µ¸—

58

leejebieCe

efomebyej 2014


›¸¨¸ ¸ú¨¸›¸

¬’¸£ ¬¸‰¸ú,

‚¸Š¸£¸

¬’¸£ ¬¸‰¸ú, ‚¸Š¸£¸ ˆÅú ¬˜¸¸œ¸›¸¸ 30 ‚Š¸¬÷¸, 2014 ˆÅ¸½ íºƒÄ— ¬’¸£ ¬¸‰¸ú Ÿ¸Ê 17 ¬¸™¬¡¸ íÿ ¢ ¸›¸ˆÅú ‚š¡¸®¸ ªúŸ¸÷¸ú Ÿ¸Ÿ¸÷¸¸ ¤¸½í½£¸ íÿ— ¢™¬¸¿¤¸£ Ÿ¸¸í Ÿ¸Ê ¬’¸£ ¬¸‰¸ú ›¸½ ¬¸¸¿¬ˆ¼Å¢÷¸ˆÅ ˆÅ¸¡¸ÄÇÅŸ¸ ˆÅ¸ ‚¸¡¸¸½ ¸›¸ ˆÅ£¨¸¸¡¸¸ ¢ ¸¬¸Ÿ¸Ê ©¸í£ ˆÅú ›¸¸Ÿ¸ú í¦¬÷¸¡¸¸Â ¨¸ ퟸ¸£½ ¤¸ÿˆÅ ˆ½Å ”¸¡¸Ÿ¸¿” ‰¸¸÷¸¸ š¸¸£ˆÅ¸Ê ˆÅ¸½ ‚¸Ÿ¸¿¢°¸÷¸ ¢ˆÅ¡¸¸ Š¸¡¸¸— ˆÅ¸¡¸ÄÇÅŸ¸ Ÿ¸Ê ¬¸¸Ÿ¸¸¢ ¸ˆÅ ¬¸¿¬˜¸¸ `‚¸Íº÷¸ ¢ ¸¥”ï½›¸ í¸½Ÿ¸ -

ž¸º¨¸›¸½æ¸£' ˆ½Å ¤¸ ¸¸Ê ˆÅ¸½ ¬’¸£ ¬¸‰¸ú ׸£¸ ‚œ¸›¸ú ˆÅ¥¸¸ ˆÅ¸ íº›¸£ ¢™‰¸¸›¸½ ˆÅ¸ Ÿ¸¸¾ˆÅ¸ ¢™¡¸¸ Š¸¡¸¸— ¡¸í ¤¸ ¸½ ™½©¸-¢¨¸™½©¸ Ÿ¸Ê ¬¸¸¿¬ˆ¼Å¢÷¸ˆÅ ˆÅ¸¡¸ÄÇÅŸ¸ ˆÅú œÏ¬÷¸º¢÷¸ ™½ˆÅ£ ˆÅ¸ûÅú œÏ¢¬¸¢Ö í¸¢¬¸¥¸ ˆÅ£ ¸ºˆ½Å íÿ— í¸¥¸ íú Ÿ¸Ê, ¬’¸£ ¬¸‰¸ú ›¸½ ‚œ¸›¸ú ˆÅ¥¡¸¸µ¸ˆÅ¸£ú Š¸¢÷¸¢¨¸¢š¸ ˆ½Å ‚¿÷¸Š¸Ä÷¸ ¨¸¼Ö¸ªŸ¸, Ÿ¸¸›¸¢¬¸ˆÅ £¸½¢Š¸¡¸¸Ê ˆ½Å ‚¬œ¸÷¸¸¥¸, ˆºÅ«’£¸½¢Š¸¡¸¸Ê ˆ½Å ‚¬œ¸÷¸¸¥¸, ‚›¸¸˜¸¸¥¸¡¸ ‚¸¢™ Ÿ¸Ê ¸¸ˆÅ£ £¸½¢Š¸¡¸¸Ê, ¨¸¼Ö¸‚¸Ê ¨¸ ¤¸ ¸¸Ê ˆÅ¸½ ¬¸í¸¡¸÷¸¸ ¬¸¸Ÿ¸ŠÏú ¢¨¸÷¸£µ¸ ˆÅ£÷¸½ íº‡ Ž¸½’úŽ¸½’ú ‰¸º¢©¸¡¸¸Â ™½›¸½ ˆÅ¸ œÏ¡¸¸¬¸ ¢ˆÅ¡¸¸—

``¤¸¸¤¸», ¤¸¸¤¸»'' ¤¸¸¤¸¸ ˆ½Å Ÿ¸º¿í ‚¬œ¸«’ ¬¸ú ‚¸¨¸¸ ¸½ ¢›¸ˆÅ¥¸ £íú ˜¸ú— ¨¸¸½ ‚¤¸ š¸ú£½ š¸ú£½ ‚œ¸›¸ú ‚¸Â‰¸½¿ ‰¸¸½¥¸›¸½¿ ˆÅ¸ œÏ¡¸¸¬¸ ˆÅ£ £í½ ˜¸½— ‰¸»›¸ ‚ž¸ú ž¸ú „›¸ˆÅú ˆÅ¥¸¸ƒÄ¡¸¸½¿ Ÿ¸½¿ ¸ õ £í¸ ˜¸¸ ‚¸¾£ Ÿ¸ÿ „›¸ˆ½Å ¢¬¸£í¸›¸½ ¤¸¾“¸ „›¸ˆÅ¸½ ¬¸í¥¸¸ £í¸ ˜¸¸— Ÿ¸º ¸½ ¬¸º¤¸í ˆÅ¸ ‹¸’›¸¸ÇÅŸ¸ ¡¸¸™ ‚¸ Š¸¡¸¸ ¢ ¸¬¸ˆ½Å ¸¥¸÷¸½ „›¸ˆÅ¸½ ¸¸½’ ¥¸Š¸ú ˜¸ú— Ÿ¸ÿ „›¸ˆÅ¸ ¥¸¸”¥¸¸ œ¸¸½÷¸¸ ˜¸¸ ‚¸¾£ Ÿ¸º ¸½ ¨¸¸½ ퟸ½©¸¸ ¤¸¸¤¸» íú ¤¸º¥¸¸÷¸½ ˜¸½— Ÿ¸ÿ ˆÅ¥¸ íú Š¸¸¿¨¸ ‚¸¡¸¸ ˜¸¸ ‚¸¾£ ‚¸ ¸ Ÿ¸º ¸¬¸½ ¢Ÿ¸¥¸›¸½ Š¸¸¿¨¸ ˆ½Å ˆÅƒÄ ¥¸¸½Š¸ ‚¸ Š¸‡— „¬¸ú ¤¸ú ¸ ‡ˆÅ ™¢¥¸÷¸ ¥¸”õˆÅ¸ ‚¸ ˆÅ£ ™£¨¸¸ ¸½ œ¸£ œ¸”õú ‰¸¸’ œ¸£ ¤¸¾“ Š¸¡¸¸— ¤¸¸¤¸¸ ›¸½ ˆÅž¸ú ž¸ú ™¢¥¸÷¸¸½¿ ˆÅ¸½ ¤¸£¸¤¸£ ›¸íì ¬¸Ÿ¸ ¸¸ ˜¸¸, ©¸¸¡¸™ ¡¸í „›¸ˆÅú œ¸ú õú ˆÅú ¬¸¸½ ¸ ˜¸ú— ¸¤¸¢ˆÅ ퟸ ¥¸¸½Š¸ ƒ›¸ ¸ú ¸¸½¿ ˆ½Å ¬¸‰÷¸ ¢¨¸£¸½š¸ú ˜¸½ ‚¸¾£ ¤¸¸¤¸¸ ˆÅ¸½ ¬¸Ÿ¸ ¸¸›¸½ ˆÅú ‚¬¸ûÅ¥¸ ¸½«’¸ ˆÅ£÷¸½ £í÷¸½ ˜¸½— ¤¸¸¤¸¸ ˆÅ¸ ÷¸¸½ Š¸º¬¬¸½ ˆ½Å Ÿ¸¸£½ ¤¸º£¸ í¸¥¸ í¸½ Š¸¡¸¸ ‚¸¾£ „›í¸½¿›¸½ „¬¸½ ™¸¾”õ¸ ¢™¡¸¸— ¢ûÅ£ “¸½ˆÅ£ ¥¸Š¸ú ‚¸¾£ ¨¸¸½ ¤¸½í¸½©¸ í¸½ Š¸‡— ÷¸º£¿÷¸ „›¸ˆÅ¸½ í¬œ¸÷¸¸¥¸ ¥¸½ ¸¸¡¸¸ Š¸¡¸¸ ¨¸›¸¸Ä ˆºÅŽ ž¸ú í¸½ ¬¸ˆÅ÷¸¸ ˜¸¸— „›¸ˆÅú „ŸÏ ž¸ú ˆÅ¸ûÅú í¸½ Š¸¡¸ú ˜¸ú ‚¸¾£ ©¸£ú£ Ÿ¸½¿ £Æ÷¸ ˆÅú ˆÅŸ¸ú ž¸ú ˜¸ú— „›í½¿ ‰¸»›¸ ˆÅú ¬¸‰÷¸ ¸³Å£÷¸ ˜¸ú ‚¸¾£ Ÿ¸¾ ¢¤¸Ÿ¸¸£ú ˆÅú ¨¸ ¸í ¬¸½ ‰¸»›¸ ™½ ›¸íú ¬¸ˆÅ÷¸¸ ˜¸¸ ÷¸ž¸ú Š¸¸¿¨¸ ¬¸½ ‚¸¡¸½ Ÿ¸½£½ ™¢¥¸÷¸ ™¸½¬÷¸ ›¸½ ‚¸Š¸½ ¤¸ ˆÅ£ ‚œ¸›¸¸ ‰¸»›¸ ™½ ¢™¡¸¸. ¤¸¸¤¸¸ ¸¤¸ í¸½©¸ Ÿ¸½¿ ‚¸¡¸½ ÷¸¸½ Ÿ¸¾¿›¸½ „›¸ˆÅ¸½ œ¡¸¸£ ¬¸½ ¤¸÷¸¸¡¸¸ ¢ˆÅ „›¸ˆÅú š¸Ÿ¸¢›¸¡¸¸½¿ Ÿ¸½¿ ÷¸½ ¸ú ¬¸½ ™¸¾”ö £í¸ ‰¸»›¸ „¬¸ú ¨¡¸¦Æ÷¸ ˆÅ¸ í¾ ¢ ¸›¸ˆÅ¸½ „›í¸½¿›¸½ ˆÅž¸ú ž¸ú ¤¸£¸¤¸£ ›¸íú ¬¸Ÿ¸ ¸¸ — ‚¤¸ „›¸ˆ½Å ¸½í£½ œ¸£ ÷¸Ÿ¸¸Ÿ¸ ž¸¸¨¸ ‚¸ ¸¸ £í½ ˜¸½— ©¸¸¡¸™ ¢ ¸¿™Š¸ú ˆ½Å ‚¸¢‰¸£ú œ¸”õ¸¨¸ Ÿ¸½¿ „›¸ˆÅú ¬¸¸½ ¸ ˆÅ¸½ ž¸ú ›¸¡¸¸ ¸ú¨¸›¸ ¢Ÿ¸¥¸ £í¸ ˜¸¸—

Currency note having great antique value at our Rajkot (Main) Branch

¬’¸£ ¬¸‰¸ú, ¥¸‰¸›¸… ¬’¸£ ¬¸‰¸ú, ¥¸‰¸›¸… ׸£¸ ¢™¬¸¿¤¸£ Ÿ¸¸í Ÿ¸Ê Ÿ¸¾¬¸ ¸Ä ƒ¿¢”¡¸¸ œ¸½¦¬’¬¸¸ƒ” ¢¥¸¢Ÿ¸’½” ˆ½Å ¬¸í¡¸¸½Š¸ ¬¸½ ˆÿŬ¸£ œ¸ú¢”õ÷¸¸Ê ˆÅ¸½ ¢›¸À©¸º¥ˆÅ ˆ¿Å¤¸¥¸ ‡¨¸¿ Ÿ¸½¨¸¸ ¢¨¸÷¸£µ¸ ¬¸Ÿ¸¸£¸½í ˆÅ¸ ‚¸¡¸¸½ ¸›¸ ¢ˆÅ¡¸¸ Š¸¡¸¸— ‡ˆÅ Ž¸°¸ ˆÅ¸½ ¬¸Ÿ¸ŠÏú œÏ™¸›¸ ˆÅ£÷¸ú ‚š¡¸®¸ ªúŸ¸÷¸ú £½›¸» Š¸ºœ÷¸¸, œ¸÷›¸ú ªú Ÿ¸¼÷¡¸º¿ ¸¡¸ ˆºÅŸ¸¸£ Š¸ºœ÷¸¸, ‚¸¿ ¸¢¥¸ˆÅ œÏ¤¸¿š¸ˆÅ, ¥¸‰¸›¸… ‚¿ ¸¥¸ ‡¨¸¿ ¬’¸£ ¬¸‰¸ú ¬¸Ÿ¸»í ˆÅú ‚›¡¸ ¬¸™¬¡¸¸‡¿—

This is a photo print of currency note having great antique value. To enlighten readers about the said currency note we wish to inform that the note was issued on 2nd January 1918 and is printed on white handmade molded paper. Perhaps, this is the only note issued in fraction. The note was withdrawn on 01.01.1926. Our Branch is in possession of original note along with a rich collection of other currency notes, which have become obsolete but have a great antique value. Readers can see the collection by visiting the branch.

Taarangan

December 2014

59


¢›¸¤¸¿š¸ œÏ¢÷¸¡¸¸½¢Š¸÷¸¸

œÏ˜¸Ÿ¸

œ¸º£¬ˆÅ¸£

¬¸¸½©¸¥¸ Ÿ¸ú¢”¡¸¸ ˆ½Å Ÿ¸¸š¡¸Ÿ¸ ¬¸½ ¤¸ÿ¢ˆ¿ÅŠ¸ ¥¸¸ž¸ ‚¸¾£ í¸¢›¸¡¸¸¿ ¬¸ºªº÷¸ ¢°¸¨¸½™ú ˆÅ¸½¥í¸œ¸º£ ‚¿ ¸¥¸

¬¸¿ž¸¨¸ í¾— ¬¸» ¸›¸¸ ÇŸ¦›÷¸ ˆÅ¸ ‡ˆÅ ‚¢š¸ˆÅ œÏ¢¬¸Ö ¬¨¸³Åœ¸ ¬¸¸½©¸¥¸ Ÿ¸ú¢”¡¸¸ ˆ½Å ³Åœ¸ Ÿ¸Ê ¢™‰¸¸ƒÄ ™½÷¸¸ í¾— ¬¸¸½©¸¥¸ Ÿ¸ú¢”¡¸¸ Æ¡¸¸ í¾? Š¸¥¸¸ ˆÅ¸’ œÏ¢÷¸¬œ¸Ö¸Ä ˆ½Å ¡¸ºŠ¸ Ÿ¸Ê ¤¸ÿ¢ˆ¿ÅŠ¸ Ÿ¸Ê ƒ¬¸ˆÅ¸ „œ¸¡¸¸½Š¸ ‚¸¾£ ƒ¬¸ˆ½Å œ¸¸æ¸ÄœÏž¸¸¨¸ ‚¨¸¸Ä ¸ú›¸ ˆÅ¸¥¸ Ÿ¸Ê ¨¸¸™-¢¨¸¨¸¸™ ˆ½Å ¬¸Ÿ¸¬¸¸Ÿ¸¢¡¸ˆÅ Ÿ¸ºÓ½ ¤¸›¸½ íº‡ í¾— ¬¸¸½©¸¥¸ Ÿ¸ú¢”¡¸¸ - ¬¸¸½©¸¥¸ Ÿ¸ú¢”¡¸¸ ‡ˆÅ ¨¡¸¸œ¸ˆÅ ‚¨¸š¸¸£µ¸¸ í¾— ¬¸£¥¸ ©¸¤™¸Ê Ÿ¸Ê ˆÅí ¬¸ˆÅ÷¸½ í¾¿ƒ¿’£›¸½’ ‚¸š¸¼÷¸ ¨¸½ ¬¸ž¸ú ¨¸½¤¸¬¸¸ƒ’ì¸ ¸¸½ ¬¸» ¸›¸¸ ™½›¸½ ˆ½Å ¬¸¸˜¸-¬¸¸˜¸ œ¸£¬œ¸£ ‚¿÷¸¢ÇÄÅ¡¸¸ ˆÅ¸ ‚¨¸¬¸£ ž¸ú œÏ™¸›¸ ˆÅ£Ê, ¬¸¸½©¸¥¸ Ÿ¸ú¢”¡¸¸ ˆ½Å ‚¿÷¸Š¸Ä÷¸ ‚¸ ¸¸÷¸ú í¾— ¬¸¸½©¸¥¸ Ÿ¸ú¢”¡¸¸ Ÿ¸Ê ‡ˆÅ ¨¡¸¢Æ÷¸ ‚›¸½ˆÅ ¨¡¸¢Æ÷¸¡¸¸Ê ¬¸½ ‡ˆÅ ¬¸¸˜¸ ¸º”õ ¬¸ˆÅ÷¸¸ í¾— ¨¸í ¬¸Ÿ¸¸ ¸ ˆ½Å ‚›¡¸ ¥¸¸½Š¸¸Ê ˆÅú ¨¡¸¢Æ÷¸Š¸÷¸ ¸¸›¸ˆÅ¸£ú, „›¸ˆ½Å ¢¨¸ ¸¸£, ²¢ ¸¡¸¸Â, ûŸ½’¸½, ¨¸ú¢”¡¸¸½, ¬¸Ÿ¸¬¡¸¸‡Â ‡¨¸¿ „›¸ˆ½Å ¬¸º ¸¸¨¸¸Ê ˆÅ¸½ ÷¨¸¢£÷¸ œÏ¸œ÷¸ ˆÅ£ ¬¸ˆÅ÷¸¸ í¾ — ƒ¿’£›¸½’ ›¸½ ¸í¸¿ ¢¨¸æ¸ ˆÅ¸½ ‡ˆÅ Š¸¸Â¨¸ Ÿ¸Ê ¤¸™¥¸ ¢™¡¸¸ í¾ ÷¸¸½ ¨¸íú¿ ¬¸¸½©¸¥¸ Ÿ¸ú¢”¡¸¸ „¬¸ ¨¸¾¢æ¸ˆÅ Š¸¸Â¨¸ ˆÅú ŠÏ¸Ÿ¸-¬¸ž¸¸ ¤¸›¸ ¸ºˆÅú í¾— ‡½¬¸ú ŠÏ¸Ÿ¸-¬¸ž¸¸ ¸í¸¿ ¨¡¸¢Æ÷¸ ˆ½Å œÏ÷¡¸®¸ í¸½›¸½ ˆÅú „œ¸¸™½¡¸÷¸¸ Š¸¸¾µ¸ í¾—

¢í

›™ú ˆ½Å ¥¸¤š¸œÏ¢÷¸«“ ¬¸¸¢í÷¡¸ˆÅ¸£ š¸Ÿ¸Ä¨¸ú£ ž¸¸£÷¸ú ˆÅ¸ œÏ‰¡¸¸÷¸ „œ¸›¡¸¸¬¸ í¾- ¬¸»£ ¸ ˆÅ¸ ¬¸¸÷¸¨¸¸Â ‹¸¸½”¸— ¤¸ˆöŸ¾¥¸ ž¸¸£÷¸ú, ¬¸»£ ¸ ˆÅ¸ ¬¸¸÷¸¨¸¸Â ‹¸¸½”¸ ¢¨¸æ¸ ˆÅ¸½ ›¸¨¸-ž¸¢¨¸«¡¸ Ÿ¸Ê œÏ¨¸½©¸ ˆÅ£¸÷¸¸ íº‚¸ ¢™¨¸¸-¬¨¸œ›¸¸Ê ˆÅ¸½ ¬¸¸ˆÅ¸£ ˆÅ£÷¸¸ í¾— ‚Ô¸÷¸›¸ ¡¸ºŠ¸ Ÿ¸Ê ¬¸» ¸›¸¸ œÏ¸¾Ô¸¸½¢Š¸ˆÅú íú `¬¸»£ ¸ ˆÅ¸ ¬¸¸÷¸¨¸¸Â ‹¸¸½”¸' ¤¸›¸ ¬¸¿¬¸¸£ ˆÅ¸½ ¢›¸£¿÷¸£ ‡ˆÅ œÏŸ¸º¢™÷¸ ‚¸¾£ ¸¢ˆÅ÷¸ ˆÅ£›¸½ ¨¸¸¥¸½ ž¸¢¨¸«¡¸ ˆÅú ‚¸½£ ¥¸½ ¸¸ £í¸ í¾ — ¬¸» ¸›¸¸ œÏ¸¾Ô¸¸½¢Š¸ˆÅú ›¸½ ¢œ¸Ž¥¸½ ”½ õ ™©¸ˆÅ¸Ê Ÿ¸Ê ‚¸Ÿ¸»¥¸- ¸»¥¸ „››¸¢÷¸ ˆÅ£ £½÷¸ ˆÅú ÷¸£í í¸˜¸ ¬¸½ ¢ûŬ¸¥¸÷¸½ ¬¸Ÿ¸¡¸ ˆÅ¸½ í¬÷¸¸Ÿ¸¥¸ˆÅ¨¸÷¸ ¬¸º¥¸ž¸ ¤¸›¸¸ ¢™¡¸¸ í¾— ‚¤¸ ‹¸£ ¤¸¾“½-¤¸¾“½ ‰¸£ú™™¸£ú ¬¸½ ¥¸½ˆÅ£, ¢¤¸¥¸ œ¸’¸›¸½ ‚¸¾£ ¤¸ÿ¢ˆ¿ÅŠ¸ ÷¸ˆÅ ˆÅ¸ ˆÅ¸Ÿ¸ œÏˆÅ¸©¸ ˆÅú Š¸¢÷¸ ¬¸½

60

leejebieCe

efomebyej 2014

û½Å¬¸¤¸ºˆÅ, ’è¸ú’£, ‚¸ÁˆºÄÅ’, Š¸»Š¸¥¸ œ¥¸¬¸, ¢¨¸¢ˆÅœ¸½¢”¡¸¸, ¦É¥¸ˆÅ£, ƒ›¬’¸ŠÏ¸Ÿ¸, ¢¥¸¿ˆ½Å”ú›¸, ¬ˆÅ¸ƒœ¸ ˆºÅŽ ‡½¬¸½ ¬¸ºªº÷¸ ›¸¸Ÿ¸ í¾ ¿ ¢ ¸›íÊ ‚¸¤¸¸¥¸-¨¸¼Ö ¬¸ž¸ú ¸¸›¸÷¸½ í¾— ¢¨¸î¸ú¡¸, Ÿ¸½¢”ˆÅ¥¸ ¬¸í¸¡¸÷¸¸ ¬¸½ ¥¸½ˆÅ£ š¸Ÿ¸Ä, ¬¸¿¬ˆ¼Å¢÷¸ ‚¸¢™ ÷¸ˆÅ œ¸£ ¬¸¸½©¸¥¸ ›¸½’¨¸¢ˆôÅŠ¸ ¬¸¸ƒ’ì¸ „œ¸¥¸¤š¸ íÿ— ¢¥¸¢‰¸÷¸ ¤¸¸÷¸ ¬¸½ ¥¸½ˆÅ£, ˆÅ¸¢¥¸¿Š¸ ‡¨¸¿ ¢¨¸¢”¡¸¸½ ˆÅ¸¢¥¸¿Š¸ ÷¸ˆÅ ¬¸¤¸ ¬¸¸½©¸¥¸ Ÿ¸ú¢”¡¸¸ Ÿ¸Ê ¬¸¿ž¸¨¸ í¾— ‚¤¸ ¬¸Ÿ¸¸ ¸ ‚œ¸›¸½ ¬¸º‰¸, ™ºÀ‰¸, „œ¸¥¸¦¤š¸¡¸¸¿, ‚¬¸ûÅ¥¸÷¸¸‚¸Ê ¬¸½ ¥¸½ˆÅ£ í£ Ž¸½’ú-Ÿ¸¸½’ú ¸ú ¸ ¬¸Ÿ¸¸ ¸/ ¬¸Ÿ¸º™¸¡¸ Ÿ¸Ê ¤¸½¢í ¸ˆÅ ‚¢ž¸¨¡¸Æ÷¸ ˆÅ£ ™½÷¸¸ í¾— ¬¸¸½©¸¥¸ Ÿ¸ú¢”¡¸¸ ˆ½Å Ÿ¸¸š¡¸Ÿ¸ ¬¸½ ¤¸ÿ¢ˆ¿ÅŠ¸- ¤¸ÿ¢ˆ¿ÅŠ¸ ˆÅ¸½ ¬¸¸Ÿ¸¸¢ ¸ˆÅ-‚¸¢˜¸ÄˆÅ „››¸¡¸›¸ ˆÅ¸ ¬¸©¸Æ÷¸ Ÿ¸¸š¡¸Ÿ¸ ¤¸›¸¸›¸½ Ÿ¸Ê ¬¸¸½©¸¥¸ Ÿ¸ú¢”¡¸¸ œÏ÷¡¸®¸ ‚¸¾£ œÏ Ž››¸ ™¸½›¸¸Ê ³Åœ¸¸Ê Ÿ¸Ê ž¸»¢Ÿ¸ˆÅ¸ ¢›¸ž¸¸ ¬¸ˆÅ÷¸¸ í¾— ‚¸ƒ¡¸½, ™½‰¸÷¸½ íÿ ˆ¾Å¬¸½ ?

œ¸®¸: 1. ¬¸¨¸ÄœÏ˜¸Ÿ¸ ¤¸ÿˆÅ ׸£¸ ‡ˆÅ ¬¸¸½©¸¥¸ ›¸½’¨¸¢ˆôÅŠ¸ ¬¸¸ƒ’ ˆÅ¸ ¢¨¸ˆÅ¸¬¸ ¢ˆÅ¡¸¸ ¸¸÷¸¸ í¾ ¢ ¸¬¸ˆ½Å ¬¸™¬¡¸ ¤¸ÿˆÅ ˆ½Å ¬¸ž¸ú „œ¸ž¸¸½Æ÷¸¸ ¤¸›¸ ¬¸ˆÅ÷¸½ í¾¿— ¨¸½ ‚œ¸›¸ú œÏ¸½ûöŸƒ¥¸ ¢›¸¢Ÿ¸Ä÷¸ ˆÅ£ „›¸Ÿ¸Ê ‚¸¨¸©¡¸ˆÅ ¸¸›¸ˆÅ¸£ú ¸¾¬¸½ ‚œ¸›¸¸ ¨¡¸¨¸¬¸¸¡¸, ‚¸¡¸ ‚¸¢™ ”¸¥¸ ¬¸ˆÅ÷¸½ í¾¿ ÷¸¸¢ˆÅ ¨¸½ ‚œ¸›¸½ ¬¸Ÿ¸¸›¸ ŠÏ¸íˆÅ¸Ê ˆÅ¸½ ‰¸¸½ ¸ ‡ˆÅ ¬¸Ÿ¸»í ˆÅ¸ ¢›¸Ÿ¸¸Äµ¸ ˆÅ£ ¬¸ˆÊÅ— ‡½¬¸ú ¬¸¸½©¸¥¸ ›¸½’¨¸¢ˆôÅŠ¸ ¬¸¸ƒ’ œ¸£ ŠÏ¸íˆÅ œ¸£¬œ¸£ ¢ˆÅ¬¸ú „÷œ¸¸™ ‚˜¸¨¸¸ ¬¸½¨¸¸ ˆ½Å ¬¸¿¤¸¿š¸ Ÿ¸Ê ‚œ¸›¸¸ ‚¸ˆÅ¥¸›¸, ‚¸ ¸¸£-¢¨¸ ¸¸£,œ¸®¸-¢¨¸œ¸®¸ ‡ˆÅ ™»¬¸£½ ˆ½Å ¬¸Ÿ¸®¸ £‰¸ ¬¸’úˆÅ „÷œ¸¸™ ¸¡¸›¸ ˆÅú ‚œ¸›¸ú ™º¢¨¸š¸¸ ˆÅ¸½ ¬¸Ÿ¸¸œ÷¸ ˆÅ£ ¬¸ˆÅ÷¸½ í¾ Æ¡¸¸Ê¢ˆÅ Ÿ¸›¸º«¡¸ ¬¸¸Ÿ¸¸¢ ¸ˆÅ œÏ¸µ¸ú í¸½›¸½ ˆ½Å ˆÅ¸£µ¸ ¸Ÿ¸÷ˆ¼Å÷¸ ¢¨¸±¸¸œ¸›¸¸Ê ¬¸½ œÏž¸¸¢¨¸÷¸ í¸½›¸½ ˆÅú ¤¸ ¸¸‡ ‚œ¸›¸½ ¬¸¸Ÿ¸¸¢ ¸ˆÅ ¬¸¿Š¸ú-¬¸¸¢˜¸¡¸¸Ê ׸£¸ ¢™¡¸½ Š¸‡ ‚¢ž¸Ÿ¸÷¸¸Ê œ¸£ ‚¢š¸ˆÅ ¢¨¸æ¸¸¬¸ ˆÅ£÷¸¸ í¾— ¸½ˆÅ ¤¸ºˆÅ, œ¸¸¬¸¤¸ºˆÅ, ‡’ú‡Ÿ¸, ‡’ú‡Ÿ¸ ¢œ¸›¸, œ¸÷¸¸ œ¸¢£¨¸÷¸Ä›¸ í½÷¸º ¢›¸¨¸½™›¸ ¸¾¬¸ú ¨¸¾¡¸¢Æ÷¸ˆÅ ¤¸ÿ¢ˆ¿ÅŠ¸ ¬¸½¨¸¸‡Â ž¸ú ƒ¬¸ Ÿ¸¸š¡¸Ÿ¸ ¬¸½ ™ú ¸¸ ¬¸ˆÅ÷¸ú í¾— ¡¸í ŠÏ¸íˆÅ ˆ½Å œ¸®¸ Ÿ¸Ê ¢í÷¸ˆÅ¸£ú œÏ¡¸¸½Š¸ ¢¬¸Ö í¸½Š¸¸— ŠÏ¸íˆÅ¸Ê ˆÅú œÏ¸½ûŸƒ¥¸ ‚›¡¸ ¬¸¸½©¸¥¸ ›¸½’¨¸¢ˆôÅŠ¸ ¬¸¸ƒ’ì¸ ¸¾¬¸½ û½Å¬¸¤¸ºˆÅ ƒ÷¡¸¸¢™ ¬¸½ ¬¸Ÿ¤¸Ö ˆÅ£ ¤¸ÿˆÅ „÷œ¸¸™¸Ê ˆÅ¸ œÏ ¸¸£ ¨¸ ŠÏ¸íˆÅ ¬¸¿‰¡¸¸ Ÿ¸Ê ‚¢ ¸¿÷¡¸ ‚¸ˆÅ«¸ÄˆÅ ¨¸¼¢Ö œÏ¸œ÷¸ ˆÅú ¸¸ ¬¸ˆÅ÷¸ú í¾— 2. û½Å¬¸¤¸ºˆÅ, ’è¸ú’£ ‚¸¢™ œ¸£ ¤¸ÿˆÅ ׸£¸ ‚œ¸›¸¸ ‚¸¢š¸ˆÅ¸¢£ˆÅ œ¸½ ¸ ¢›¸¢Ÿ¸Ä÷¸ ¢ˆÅ¡¸¸ ¸¸ ¬¸ˆÅ÷¸¸ í¾— ¢ ¸¬¸ œ¸£ ŠÏ¸íˆÅ ¢ˆÅ¬¸ú „÷œ¸¸™ ˆ½Å ¬¸¿¤¸¿š¸ Ÿ¸Ê ‚œ¸›¸ú £¸¡¸, ¬¸º ¸¸¨¸, œÏ¢÷¸¢ÇÅ¡¸¸ ‚¸¢™ ™½ ¬¸ˆÅ÷¸½ í¾¿ ¢ ¸¬¸¬¸½ ¢ˆÅ¬¸ú „÷œ¸¸™ ˆÅú Š¸ºµ¸¨¸î¸¸ ˆÅ¸ Ÿ¸»¥¡¸¸¿ˆÅ›¸ ¢ˆÅ¡¸¸ ¸¸ ¬¸ˆÅ÷¸¸ í¾ — 3. ¤¸ÿˆÅ ‚œ¸›¸½ ¢¨¸î¸ú¡¸ ¬¸¥¸¸íˆÅ¸£ ¢›¸¡¸ºÆ÷¸ ˆÅ£ ¬¸¸½©¸¥¸ ›¸½’¨¸¢ˆôÅŠ¸ ¬¸¸ƒ’ì¸ œ¸£ ŠÏ¸íˆÅ¸Ê ˆÅ¸½ „¢ ¸÷¸ „÷œ¸¸™ ¸º›¸›¸½ Ÿ¸Ê Ÿ¸™™ ˆÅ£ ¬¸ˆÅ÷¸½ í¿¾ — ŠÏ¸íˆÅ¸Ê ˆÅú ‚›¸½ˆÅ Ž¸½’ú-Ÿ¸¸½’ú ¬¸Ÿ¸¬¡¸¸‚¸Ê ˆÅ¸ ¬¸¸½©¸¥¸ Ÿ¸ú¢”¡¸¸ ׸£¸ ¢›¸À©¸¿ˆÅ ³Åœ¸ ¬¸½ ÷¨¸¢£÷¸ ¬¸Ÿ¸¸š¸¸›¸ ¢ˆÅ¡¸¸ ¸¸ ¬¸ˆÅ÷¸¸ í¾


¢ ¸›íÊ ¬¸º¥¸ ¸¸›¸½ „›íÊ ¤¸¸£¿¤¸¸£ ¤¸ÿˆÅ ‚¸›¸¸- ¸¸›¸¸ œ¸”õ÷¸¸ í¾— ‡ˆÅ œÏ©›¸ ˆÅ¸ „ ‡ˆÅ ¬¸¸˜¸ í ¸¸£¸Ê ŠÏ¸íˆÅ¸Ê ÷¸ˆÅ œ¸íºÂ ¸ ¬¸ˆÅ÷¸¸ í¾— ŠÏ¸íˆÅ¸Ê ‡¨¸¿ ¤¸ÿˆÅ ™¸½›¸¸Ê ˆ½Å š¸›¸ ¨¸ ¬¸Ÿ¸¡¸ ˆÅú ¤¸ ¸÷¸ í¸½Š¸ú— 4. ¤¸ÿˆÅ ׸£¸ ‚œ¸›¸½ „÷œ¸¸™¸Ê ˆÅ¸ ¬¸¨¸½Ä®¸µ¸, ‚›¸º¬¸¿š¸¸›¸ ‡¨¸¿ ¢¨¸œ¸µ¸›¸ (Ÿ¸¸ˆ½ÄÅ¢’¿Š¸) ‚¸¢™ ¬¸¸½©¸¥¸ Ÿ¸ú¢”¡¸¸ œ¸£ ¢¨¸±¸¸œ¸›¸ ‚¸¾£ ¨¸ú¢”¡¸¸½ ˆ½Å Ÿ¸¸š¡¸Ÿ¸ ¬¸½ „¢ ¸÷¸ ‰¸ ¸Ä œ¸£ ¢ˆÅ¡¸¸ ¸¸ ¬¸ˆÅ÷¸¸ í¾— 5. ¤¸ÿˆÅ ‚¢š¸ˆÅ ¬¸½ ‚¢š¸ˆÅ ‚œ¸›¸ú ›¸ú¢÷¸¡¸¸Ê, ¢¬¸Ö¸¿÷¸¸Ê, ¢›¸«“¸-¢›¸ä¸¡¸ ‚¸¾£ œÏ¢÷¸¤¸Ö÷¸¸ ˆÅ¸½ ¬¸¸½©¸¥¸ Ÿ¸ú¢”¡¸¸ Ÿ¸Ê ¨¡¸Æ÷¸ ˆÅ£ ‚œ¸›¸ú œ¸¸£™¢©¸Ä÷¸¸ ¢¬¸Ö ˆÅ£ ¬¸ˆÅ÷¸¸ í¾— ¬¸¸˜¸ íú ŠÏ¸íˆÅ¸Ê ˆÅ¸½ ¤¸ÿ¢ˆ¿ÅŠ¸, „¬¸ˆÅú ˆÅ¸¡¸ÄœÏµ¸¸¥¸ú, „¬¸Ÿ¸Ê ¢ˆÅ‡ ¸¸ £í½ ¤¸™¥¸¸¨¸¸Ê ‡¨¸¿ „¬¸¬¸½ ¸º”õ½ ¬¸º£®¸¸ „œ¸¸¡¸¸Ê ˆÅú Ÿ¸»¥¸ž¸»÷¸ ¢©¸®¸¸ ž¸ú ƒ¬¸ Ÿ¸¸š¡¸Ÿ¸ ¬¸½ œÏ™¸›¸ ˆÅú ¸¸ ¬¸ˆÅ÷¸ú í¾— ‚¸ ¸ ˆÅ¥¸ í¸½ £í½ ¬¸¸ƒ¤¸£ ‚¸¢˜¸ÄˆÅ ‚œ¸£¸š¸¸Ê ˆÅ¸½ £¸½ˆÅ›¸½ Ÿ¸Ê ¡¸í ˆÅ¸£Š¸£ „œ¸¸¡¸ ¬¸¸¢¤¸÷¸ í¸½Š¸¸ — 6. ¡¸í ¤¸¸÷¸ ¬Ÿ¸£µ¸ú¡¸ £í½ ¢ˆÅ ¡¸º¨¸¸ ¨¸Š¸Ä œ¸£ ûŸ½ˆÅ¬¸ ˆÅ£›¸½ ˆ½Å ¢¥¸‡ ¬¸¸½©¸¥¸ Ÿ¸ú¢”¡¸¸ ¬¸½ ¸º”õ›¸¸ ‚œ¸¢£í¸¡¸Ä í¾ — ƒ¬¸ˆ½Å ¢¥¸‡ û½Å¬¸¤¸ºˆÅ ¸¾¬¸ú ¬¸¸ƒ’ì¸ œ¸£ ˆºÅŽ ‡œ¸ ¢¨¸ˆÅ¢¬¸÷¸ ˆÅú ¸¸ ¬¸ˆÅ÷¸ú íÿ ¢ ¸›¸ˆ½Å ׸£¸ ¨¸½ ‚œ¸›¸½ ¢Ÿ¸°¸¸Ê ˆÅ¸½ š¸›¸ ‚¿÷¸¢£÷¸ ˆÅ£ ¬¸ˆÅ÷¸½ í¾¿— ¡¸º¨¸¸ ¨¸Š¸Ä ¤¸ÿˆÅ ˆÅú ¬¸¸½©¸¥¸ Ÿ¸ú¢”¡¸¸ Ÿ¸Ê ¬¸¸‰¸ ¢›¸¢Ÿ¸Ä÷¸ ˆÅ£›¸½ Ÿ¸Ê ž¸ú ¬¸í¸¡¸ˆÅ ¢¬¸Ö í¸½Š¸¸ — 7. ¤¸ÿˆÅ, ¥¸‹¸º Ÿ¸š¡¸Ÿ¸ „Ô¸¢Ÿ¸¡¸¸Ê ˆÅ¸½ ¬¸¸½©¸¥¸ Ÿ¸ú¢”¡¸¸ œ¸£ „÷œ¸¸™ ¤¸½ ¸›¸½ Ÿ¸Ê Ÿ¸™™ ˆÅ£ ¬¸ˆÅ÷¸¸ í¾ ¤¸™¥¸½ Ÿ¸Ê í¸½›¸½ ¨¸¸¥¸½ ¥¸¸ž¸ ¬¸½ ¨¸í ‚œ¸›¸ú ¤¡¸¸ ¸-¢ˆÅ©÷¸Ê ¬¸£¥¸÷¸¸ ¬¸½ œÏ¸œ÷¸ ˆÅ£ ¬¸ˆÅ÷¸¸ í¾— ¬¸¸˜¸ íú, ‡½¬¸½ ŠÏ¸íˆÅ¸Ê ׸£¸ ‚¢š¸ˆÅ ¬¸½ ‚¢š¸ˆÅ ¤¸ÿˆÅ „÷œ¸¸™ ¨¸ ¬¸½¨¸¸‡Â ÇÅ¡¸ ˆÅ£›¸½ ˆÅú ¬¸¿ž¸¸¨¸›¸¸ ¤¸ õ½Š¸ú— ¢¨¸œ¸®¸: ``¬¸¸½©¸¥¸ Ÿ¸ú¢”¡¸¸ ˆ½Å Ÿ¸¸š¡¸Ÿ¸ ¬¸½ ¤¸¾¿¢ˆ¿ÅŠ¸'' ‚ž¸ú ‚œ¸›¸½ œÏ¡¸¸½Š¸ ˆ½Å ©¸¾©¸¨¸-ˆÅ¸¥¸ Ÿ¸Ê íú í¾— ‚÷¸À ƒ¬¸ ¬¸¿¤¸¿š¸ Ÿ¸Ê ˆ½Å¨¸¥¸ ›¸¨¸ú›¸ ¬¸¿ž¸¸¨¸›¸¸‚¸Ê œ¸£ íú ¢¨¸ ¸¸£ ¢ˆÅ¡¸¸ ¸¸ £í¸ í¾— ƒ¬¸¬¸½ ¸º”õú ¸º›¸¸¾¢÷¸¡¸¸Ê ˆÅ¸½ ›¸{¸£ ‚¿™¸{¸ ˆÅ£›¸¸ ‚™»£™¢©¸Ä÷¸¸ í¸½Š¸ú— ƒ¬¸¬¸½ ¸º”õú ¸º›¸¸¾¢÷¸¡¸¸Â /‰¸÷¸£½ ‚š¸¸½¢¥¸¢‰¸÷¸ í¾ À1. ¬¸¸½©¸¥¸ Ÿ¸ú¢”¡¸¸ ˆÅ¸ „œ¸¡¸¸½Š¸ ¢¨¸©¸½«¸÷¸À ž¸¸£÷¸ ˆ½Å ¬¸¿™ž¸Ä, ‡ˆÅ ¬¸ú¢Ÿ¸÷¸ ¢©¸¢®¸÷¸ ¡¸º¨¸¸ ¨¸Š¸Ä íú ˆÅ£÷¸¸ í¾— ¬¸Ÿ¸¸ ¸ ˆ½Å ‚›¡¸ ¨¸Š¸Ä ‚ž¸ú ƒ¬¸¬¸½ ‚Ž»÷¸½ íú í¿¾— 2. ¬¸¸½©¸¥¸ Ÿ¸ú¢”¡¸¸ ˆÅ¸ ¥¸¸½Š¸ Š¸¿ž¸ú£÷¸¸ ¬¸½ œÏ¡¸¸½Š¸ ›¸íú¿ ˆÅ£÷¸½ ‚÷¸À „›¸ˆ½Å ׸£¸ ¢™¡¸½ ¸¸›¸½ ¨¸¸¥¸½ ‚¢ž¸Ÿ¸÷¸, œÏ¢÷¸¢ÇÅ¡¸¸ ‚¸¢™ ¢¨¸æ¸¬¸›¸ú¡¸ íú í¸½, ¡¸í ‚¸¨¸©¡¸ˆÅ ›¸íú¿ í¾— ‚÷¸À ƒ›¸ ‚¸¿ˆÅ”õ¸Ê ˆ½Å ‚¸š¸¸£ œ¸£ ¤¸ÿˆÅ ‚œ¸›¸ú ¬¸½¨¸¸‡Â ¨¸ „÷œ¸¸™ ˆ¾Å¬¸½ ¢›¸¢ä¸÷¸ ˆÅ£ ¬¸ˆÅ÷¸¸ í¾? 3. ¢¨¸î¸ú¡¸ ¬¸½¨¸¸‡Â ¸¸½¢‰¸Ÿ¸ ž¸£¸ ®¸½°¸ í¾— ¢ˆÅ¬¸ú ˆÅú ¨¡¸¢Æ÷¸Š¸÷¸ ¸¸›¸ˆÅ¸£ú ¬¸¸¨¸Ä ¸¢›¸ˆÅ ˆÅ£›¸¸ „¬¸ˆÅú ¢›¸ ¸÷¸¸ ˆÅ¸½ ž¸¿Š¸ ˆÅ£›¸¸ í¾— 4. ‡½¬¸½ ‰¸º¥¸½ Ÿ¸¿ ¸ œ¸£ ¸í¸¿ ¥¸¸½Š¸¸Ê ˆ½Å Ÿ¸š¡¸ Ÿ¸ºÆ÷¸ ¬¸¿¨¸¸™ í¸½ £í¸ í¸½, ‚¸¢˜¸ÄˆÅ Ž¥¸-ˆÅœ¸’ ‚¸¾£ ûÅ£½¤¸ ˆÅú ¬¸¿ž¸¸¨¸›¸¸ ¤¸ õ ¸¸÷¸ú í¾— ¬¸£¥¸ ¤¸º¢Ö ŠÏ¸íˆÅ ‚œ¸›¸ú Š¸ºœ÷¸ ¸¸›¸ˆÅ¸¢£¡¸¸Â ™»¬¸£¸Ê ˆ½Å ¤¸íˆÅ¸¨¸½ Ÿ¸Ê ‚¸ „¬¸½ ¤¸¸Â’ ¬¸ˆÅ÷¸½ í¿¾— 5. û½ÅˆÅ œÏ¸½ûŸƒ¥¬¸ ˆ½Å ׸£¸ ™»¬¸£¸Ê ˆ½Å ‰¸¸÷¸½ í½ˆÅ í¸½›¸½ ˆÅ¸ ž¸ú ‰¸÷¸£¸ í¾— ¢›¸«ˆÅ«¸Ä: ¬œ¸«’ í¾ ¢ˆÅ ƒ¬¸Ÿ¸Ê ˆÅ¸½ƒÄ ¬¸¿©¸¡¸ ›¸íú¿ ¢ˆÅ ¬¸¸½©¸¥¸ Ÿ¸ú¢”¡¸¸ ˆ½Å ׸£¸ ¤¸ÿˆÅ ˆÅú ‚œ¸›¸½ ŠÏ¸íˆÅ¸Ê ˆ½Å œÏ¢÷¸ ``ƒ¿œ¸¾˜¸ú'' ¤¸ õ½Š¸ú— ¬¸¸½©¸¥¸ Ÿ¸ú¢”¡¸¸ ˆÅú ¬¸º¢¨¸š¸¸‚¸Ê ˆ½Å ¬¸¸˜¸-¬¸¸˜¸ ¬¸» ¸›¸¸-¬¸º£®¸¸ ˆÅú „÷¸›¸ú íú ¤¸”õú ¸º›¸¸¾¢÷¸¡¸¸ ž¸ú ¬¸¸Ÿ¸›¸½ í¾— ™¸½›¸¸Ê Ÿ¸Ê ¬¸¿÷¸º¥¸›¸ ¬˜¸¸¢œ¸÷¸ ˆÅ£ ‡¨¸¿ ¬¸¸½©¸¥¸ Ÿ¸ú¢”¡¸¸ ³Åœ¸ú ¬¸¿¬¸¸š¸›¸ ˆÅ¸ ‚¢š¸ˆÅ÷¸Ÿ¸ ™¸½í›¸ ˆÅ£ ¤¸ÿ¢ˆ¿ÅŠ¸ ˆ½Å ®¸½°¸ Ÿ¸Ê ›¸¨¸-¬¸¸Ÿ¸¸¢ ¸ˆÅ ÇŸ¿¢÷¸ ¥¸¸ƒÄ ¸¸ ¬¸ˆÅ÷¸ú í¾—

Ÿ¸¸½¤¸¸ƒ¥¸ ¤¸ÿ¢ˆ¿ÅŠ¸

ˆÅ£Ê 1. ‚œ¸›¸½ Ÿ¸¸½¤¸¸ƒ¥¸ ûŸ½›¸ œ¸£ í¾µ”¬¸½’ Ÿ¸½›¡¸» ˆÅ¸½ ‡Æ¬¸½¬¸ ˆÅ£›¸½ ˆ½Å ¢¥¸‡ Ÿ¸ ¸¤¸»÷¸ ¢œ¸›¸/œ¸¸¬¸¨¸”Ä ¤¸›¸¸‡¿— 2. ¬¸Ÿ¸¡¸-¬¸Ÿ¸¡¸ œ¸£ Ÿ¸¸½¤¸¸ƒ¥¸ ¤¸ÿ¢ˆ¿ÅŠ¸ ¢œ¸›¸/œ¸¸¬¸¨¸”Ä ˆÅ¸½ ¤¸™¥¸÷¸½ £íÊ— 3. ‚œ¸›¸½ ¤¸ÿ¢ˆ¿ÅŠ¸ ¬¸¿¨¡¸¨¸í¸£¸Ê ˆÅ¸½ ’ネŠˆÅ£›¸½ í½÷¸º ‡¬¸‡Ÿ¸‡¬¸ ‚¥¸’Ä ˆ½Å ¢¥¸‡ £¢ ¸¬’£ ˆÅ£Ê— 4. ‚œ¸›¸½ ¬Ÿ¸¸’Ä ûŸ½›¸ œ¸£ œÏž¸¸¨¸ú Ÿ¸¸½¤¸¸ƒ¥¸ ‡›’ú Ÿ¸¾¥¸¨¸½¡¸£/‡›’ú ¨¸¸¡¸£¬¸ ¬¸¸ÁÉ’¨¸½¡¸£ ƒ›¬’¸Á¥¸ ˆÅ£Ê ‚¸¾£ ƒ¬¸½ ‚Ô¸¢÷¸÷¸ £‰¸Ê— 5. ‚œ¸›¸½ Ÿ¸¸½¤¸¸ƒ¥¸ ˆ½Å ¤Ï¸„¬¸£ ¬¸¢í÷¸ ‚¸Áœ¸£½¢’¿Š¸ ¢¬¸¬’Ÿ¸ ‚¸¾£ ‡œ¥¸úˆ½Å©¸›¸ ˆÅ¸½ ›¸¨¸ú›¸÷¸Ÿ¸ ¢¬¸Æ¡¸»£’ú œ¸¾ ¬¸ ‚¸¾£ ‚œ¸ŠÏ½” ¬¸½ ‚Ô¸¢÷¸÷¸ £‰¸Ê— 6. ‚œ¸›¸½ Ÿ¸¸½¤¸¸ƒ¥¸ ˆÅ¸½ Ÿ¸£ŸŸ¸÷¸/£‰¸£‰¸¸¨¸ í½÷¸º ž¸½ ¸÷¸½ ¬¸Ÿ¸¡¸ Ÿ¸½Ÿ¸£ú Ÿ¸Ê ¬’¸½£ ˆÅú Š¸ƒÄ ’½Ÿœ¸££ú ûŸƒ¥¸¸Ê ˆÅ¸½ í’¸ ™Ê Æ¡¸¸Ê¢ˆÅ ƒ¬¸Ÿ¸Ê ¬¸¿¨¸½™›¸©¸ú¥¸ ¸¸›¸ˆÅ¸£ú í¸½ ¬¸ˆÅ÷¸ú í¾— 7. ‚œ¸›¸½ œ¸º£¸›¸½ ûŸ½›¸ ‚˜¸¨¸¸ ’¾¤¸¥¸½’ ¬¸½ ”¸’¸ ˆÅ¸½ ‚¨¸©¡¸ ¨¸¸ƒœ¸ ˆÅ£Ê— 8. ¸¤¸ œÏ¡¸¸½Š¸ ›¸ í¸½ £í¸ í¸½ ÷¸¤¸ ¨¸¸¡¸£¥¸¾¬¸ ¢”¨¸¸ƒ¬¸ ¬¸½¨¸¸‚¸Ê ¸¾¬¸½ ¨¸¸ƒÄ-ûŸƒÄ ‚¸¾£ ¤¥¡¸»’»˜¸ ˆÅ¸½ ¤¸¿™ ˆÅ£ ™Ê— 9. ¬¸¿¨¡¸¨¸í¸£ œ¸»£¸ ˆÅ£›¸½ ˆ½Å ¬¸¸˜¸ íú ‚¸Á›¸¥¸¸ƒ›¸ Ÿ¸¸½¤¸¸ƒ¥¸ ¤¸ÿ¢ˆ¿ÅŠ¸ ‚˜¸¨¸¸ ‡œ¥¸úˆ½Å©¸›¸ ¬¸½ ¥¸¸ÁŠ¸ ‚¸„’ ˆÅ£Ê— „¬¸ ¢¨¸›”¸½ ˆÅ¸½ ¤¸¿™ ˆÅ£›¸¸ ž¸ú ¬¸º¢›¸¢ä¸÷¸ ˆÅ£Ê— 10. Ÿ¸¸½¤¸¸ƒ¥¸ Š¸ºŸ¸/ ¸¸½£ú í¸½ ¸¸›¸½ œ¸£ Ÿ¸¸½¤¸¸ƒ¥¸ ¤¸ÿ¢ˆ¿ÅŠ¸ ¬¸½¨¸¸‚¸Ê ˆÅ¸½ ¤¥¸¸ÁˆÅ ˆÅ£›¸½ ˆ½Å ¢¥¸‡ ¤¸ÿˆÅ ¬¸½ ¬¸¿œ¸ˆÄÅ ˆÅ£Ê— Ÿ¸¸½¤¸¸ƒ¥¸ ¤¸ÿ¢ˆ¿ÅŠ¸

›¸ ˆÅ£Ê 1. ¬¸ž¸ú ‡¬¸‡Ÿ¸‡¬¸/‡Ÿ¸‡Ÿ¸‡¬¸ ‰¸¸¬¸ˆÅ£ ‚¿ ¸¸›¸ 踸½÷¸¸Ê ¬¸½ œÏ¸œ÷¸, ˆÅ¸½ ›¸ ‰¸¸½¥¸Ê— 2. Ÿ¸¸½¤¸¸ƒ¥¸ ûŸ½›¸ œ¸£ Š¸¸½œ¸›¸ú¡¸ ¸¸›¸ˆÅ¸¢£¡¸¸Á¿ ¸¾¬¸½ ‚œ¸›¸¸ ”½¢¤¸’/ ǽŢ”’ ˆÅ¸”Ä ›¸¿¤¸£, CVV ›¸¿¤¸£ ‚˜¸¨¸¸ ¢œ¸›¸ ›¸¿¤¸£ ¬¸½¨¸ ›¸ ˆÅ£Ê— 3. ‚¿ ¸¸›¸ 踸½÷¸¸Ê ¬¸½ ˆÅž¸ú ˆÅ¸Á¥¸£ ’ḻ›¸ ‚˜¸¨¸¸ ”¸¡¸¥¸£ ’ḻ›¸ ¸¾¬¸½ ‚¸ÁûÅ£ ¬¨¸úˆÅ¸£ ›¸ ˆÅ£Ê— 4. ¤Ï¸„¬¸ ¢ˆÅ‡ ¸¸›¸½ ¨¸¸¥¸½ ¨¸½¤¸¬¸¸ƒ’¸Ê ˆÅ¸ š¡¸¸›¸ £‰¸Ê— ¡¸¢™ ¢¨¸æ¸¬¸›¸ú¡¸ ›¸ ¥¸Š¸½ ÷¸¸½ „¬¸¬¸½ ˆºÅŽ ž¸ú ”¸„›¸¥¸¸½” ›¸ ˆÅ£Ê— 5. ‡¡¸£œ¸¸½’Ä ƒ÷¡¸¸¢™ œ¸¦¤¥¸ˆÅ ¸Š¸í¸Ê Ÿ¸Ê „œ¸¥¸¤š¸ ‚¬¸º£¢®¸÷¸ ¨¸¸ƒÄ-ûŸƒÄ ˆÅ›¸½Æ©¸›¸ ˆ½Å ¸¢£‡ ‚œ¸›¸½ Ÿ¸¸½¤¸ƒ¥¸ ûŸ½›¸ ˆÅ¸½ ˆÅ›¸½Æ’ ›¸ ˆÅ£Ê—

Taarangan

December 2014

61


ƒÄŸ¸¸›¸™¸£ú, ¬’¸ûÅ ˆÅú „œ¸¥¸¦¤š¸¡¸¸Â, ¨¸¸í ¤¸ ¸¸¿½ / Imandari, Staff Acheivement, Wah Bachho

Shri Arun Kisan Holkar ªú ¢¨¸«µ¸º™¸¬¸ ¤¸¸“½ ªú ¬¸¿÷¸¸½«¸ ¢¬¸¿í Pashan Road Branch ™É÷¸£ú œÏš¸¸›¸ £¸½ˆÅ¢”õ¡¸¸-II Pune Zone ˆ½Å ”ú ‡›¸ £¸½” ‚¸Š¸£¸ ‡¬¸‡Ÿ¸ƒÄ ©¸¸‰¸¸ Ÿ¸º ¿ ¤ ¸ƒÄ ™¢®¸µ¸ ‚¿ ¸¥¸ ‚¸Š¸£¸ ‚¿ ¸¥¸ „œ¸¡¸ºÄÆ÷¸ ¬’¸ûÅ-¬¸™¬¡¸¸½¿ ›¸½ ¬¸¸½›¸½/ ¸¸¿™ú ˆ½Å ‚¸ž¸»«¸µ¸ ÷¸˜¸¸ ›¸ˆÅ™ú/‚›¡¸ Ÿ¸»¥¡¸¨¸¸›¸ ¬¸¸Ÿ¸ŠÏú ©¸¸‰¸¸ œ¸¢£¬¸£ Ÿ¸½¿ œ¸”õ½ íº‡/‚¢÷¸¢£Æ÷¸ œ¸¸‡ ‚¸¾£ ƒ›¸ Ÿ¸»¥¡¸¨¸¸›¸ ¨¸¬÷¸º‚¸½¿ ˆÅ¸½ ŠÏ¸íˆÅ¸½¿ ˆÅ¸½ ¥¸¸¾’¸ˆÅ£ ‚œ¸›¸ú ƒÄŸ¸¸›¸™¸£ú ˆÅ¸ œ¸¢£ ¸¡¸ ¢™¡¸¸. - ¬¸¿œ¸¸™ˆÅ Md. Siddique Award Staff (Driver-cum-Sepoy) Ranchi Zonal Office

ªú ‚¿ˆºÅ©¸ ¸¨í¸µ¸ ˆ¿Å¤¸¸¥¸¸ ¢í¥¸ £¸½” Ÿ¸º¿¤¸ƒÄ ™¢®¸µ¸ ‚¿ ¸¥¸

¤¸š¸¸ƒÄ / Congratulations

Shri Sandeep Adsul Shrigonda Branch, Pune Zone Dip. in Home Loans Financing (IIBF)

Shri Tapan Verma Chief Manager Compliance Department, HO MBA (Finance) Mahatma Gandhi University

ˆºÅ. ¬¸¢¨¸÷¸¸ Ÿ¸¸¥¸¨¸ú¡¸ ‚¢š¸ˆÅ¸£ú ƒ¿™¸¾£ ‚¿ ¸¥¸, œ¸ú‡ ¸”ú

(Various products of Maruti Udyog Ltd. and customer satisfaction with special reference to Indore district.)

¤¸¸½£ú¨¸¥¸ú œ¸¢ä¸Ÿ¸ ©¸¸‰¸¸, Ÿ¸º¿¤¸ƒÄ „ ‚¿ ¸¥¸ ¢©¸¿œ¸¸½¥¸ú ˆ½Å ¬¸Ÿ¸ŠÏ ¢¨¸¬÷¸¸£ Ÿ¸Ê ¤¸ÿˆÅ ˆÅú ¡¸í ©¸¸‰¸¸ ‚œ¸›¸ú ©¸ú‹Ï ¬¸½¨¸¸ ‡¨¸¿ ¢¨¸›¸¡¸ú ‚¸¾£ ¬¸£¥¸ ¬¨¸¸ž¸¸¨¸ ˆ½Å ˆÅ¸£µ¸ ‚¸Ÿ¸ ¸›¸÷¸¸ ˆ½Å ¤¸ú ¸ ¤¸íº÷¸ ¢œÏ¡¸ í¸½ Š¸ƒÄ í¾— ‚¢š¸›¸¬˜¸ ˆÅŸ¸Ä ¸¸£ú ¬¸½ ¥¸½ˆÅ£ ‚¢š¸ˆÅ¸£ú ªúŸ¸÷¸ú œÏ¢÷¸ž¸¸ œÏž¸º ÷¸ˆÅ ¬¸Ÿ¸¬÷¸ ¬’¸ûÅ ŠÏ¸íˆÅ ¬¸½¨¸¸ ‚¸¾£ ¬¸º¢¨¸š¸¸ ˆ½Å ¢¥¸‡ ‚œ¸›¸½ ¸½í£½ œ¸£ ¦¬Ÿ¸÷¸ ¥¸½ˆÅ£ ¬¸™¾¨¸ ÷¸÷œ¸£ £í÷¸½ í¾¿, ¡¸í ¤¸¸÷¸ ‚›¡¸ ¤¸ÿˆÅ¸Ê ˆ½Å ¢¥¸‡ œÏ½£µ¸¸™¸¡¸ú í¾— ‚¸ ¸ ¥¸¸½Š¸¸Ê ˆ½Å œ¸¸¬¸ ¬¸Ÿ¸¡¸ ˆÅú ¤¸”ú ˆÅŸ¸ú í¾— í£ ˆÅ¸½ƒÄ ‚œ¸›¸¸ ¤¸ÿˆÅ ˆÅ¸ ˆÅ¸Ÿ¸ ¸¥™ ¬¸½ ¸¥™ ‰¸÷Ÿ¸ ˆÅ£ ž¸¸Š¸›¸½ ˆ½Å Ÿ¸»” Ÿ¸Ê í¸½÷¸¸ í¾— ƒ¬¸ ¢¨¸«¸¡¸ Ÿ¸Ê ¢©¸¿œ¸¸½¥¸ú ’½¢¥¸ûŸ½›¸ ‡Æ¬¸ ¸Ê ¸ ˆ½Å ¬¸¸Ÿ¸›¸½ ¦¬˜¸÷¸ ªúŸ¸÷¸ú œÏ¢÷¸ž¸¸ œÏž¸º ¤¸ÿˆÅ ˆÅú ¡¸í ©¸¸‰¸¸ ¤¸½¢Ÿ¸¬¸¸¥¸ í¾— ˆÅ Ž-¬¸î¸¸ ™¾¢›¸ˆÅ ˆ½Å œÏ¢÷¸¢›¸¢š¸ ›¸½ ¬¨¸¡¸¿ ‚›¸ºž¸¨¸ ¢ˆÅ¡¸¸ í¾ ¢ˆÅ, ¬¸ ¸ Ÿ¸Ê, ƒ¬¸ „œ¸¥¸¦¤š¸ ˆ½Å ¢¥¸‡ ‚¢š¸ˆÅ¸£ú ªúŸ¸÷¸ú œÏ¢÷¸ž¸¸ œÏž¸º ‚¸¾£ ¬¸Ÿ¸¬÷¸ ¬’¸ûÅ ‚¢ž¸›¸¿™›¸ ˆ½Å œ¸¸°¸ íÿ— ƒ¬¸ ©¸¸‰¸¸ ›¸½ ¤¸ÿˆÅ ‚¸ÁûöÅ ƒ¿¢”¡¸¸ ˆ½Å ›¸¸Ÿ¸ ˆÅ¸½ „ ¸¸Š¸£ ˆÅ£÷¸½ íº‡ ©¸ú‹Ï ŠÏ¸íˆÅ ¬¸½¨¸¸ ˆÅ¸½ íú ‚œ¸›¸¸ Ÿ¸»¥¸Ÿ¸¿°¸ ¤¸›¸¸¡¸¸ í¾ ‚¸¾£ ‚¸Ÿ¸ ¸›¸÷¸¸ ׸£¸ ƒ÷¸›¸¸ ¬¸ŸŸ¸¸›¸ œÏ¸œ÷¸ ˆÅ£›¸¸ íú ƒ¬¸ ©¸¸‰¸¸ ˆÅ¸ ¬¸¨¸¸½Ä ¸ œ¸º£¬ˆÅ¸£ í¾— ªú ¢ˆÅ©¸¸½£ ¬¸¿œ¸’, Ÿ¸¸›¸™ ¬¸¿œ¸¸™ˆÅ ˆÅ Ž-¬¸î¸¸ ™¾¢›¸ˆÅ

¨¸¸í ¤¸ ¸¸¿½ / Wah Bachho

Subir S/o Shri Praveen Ramachandran Retd. Officer Kolkata Main Branch (Certified FRM)

62

leejebieCe

Lavanya D/o Shri Harish V. CM, CDR HO First Prize (Group II) Maharashtra State Level Spell Bee competition By: Spell Bee International.

efomebyej 2014

Naman S/o of Shri Sunil Lakra Senior Manager, Kantatoli Branch. Civil Services (IAS) Exam 2014

Pooja D/o Shri Ganesh S Iyer Manager, Vigilance Dept., HO Passed CA

Sumukha S/o Shri K V Raghavendra Chairman Narmada Jhabua Gramin Bank, Indore 8th State Rank & 22nd International Rank in National Science Olympiad.

¸¾÷¸›¡¸ ¬¸ºœ¸º°¸ ªú ‚£¢¨¸¿™ ˆºÅŸ¸¸£ „œ¸ ‚¸¿.œÏ., £¸¡¸œ¸º£ ‚¿ ¸¥¸ ¬¨¸µ¸Ä œ¸™ˆÅ, „÷ˆ¼Å«’ ©¸¾®¸¢µ¸ˆÅ ¢£ˆÅ¸”Ä ¨¸«¸Ä 2008-2014


¥¸¸½ˆÅ œÏ½Ÿ¸ ˆÅ¸ œ¸¨¸Ä À Ž“ œ¸» ¸¸

¢¨¸

¬¸º£®¸¸ ¸¸›¸ˆÅ¸£ú Ÿ¸¸÷¸¸ ¢œ¸÷¸¸ ˆ½Å ¢¥¸‡

æ¸ ˆÅú ¢¨¸¢ž¸››¸ ¬¸ž¡¸÷¸¸‚¸Ê ˆÅ¸ ¢ž¸››¸-¢ž¸››¸ ƒ¢÷¸í¸¬¸ í¾— Ÿ¸¸›¸¨¸ -¬¸Ÿ¸»í ‚œ¸›¸ú ¸ú¨¸›¸ -©¸¾¥¸ú ‡¨¸¿ ÷¡¸¸½í¸£ „÷¬¸¨¸¸Ê ˆ½Å Ÿ¸¸š¡¸Ÿ¸ ¬¸½ ‚œ¸›¸ú ¬¸ž¡¸÷¸¸ -¬¸¿¬ˆ¼Å¢÷¸ ˆÅ¸ œÏ™©¸Ä›¸ ˆÅ£÷¸½ íÿ— ퟸ¸£½ ‚¢š¸ˆÅ÷¸£ ÷¡¸¸½í¸£ œ¸¸¾£¸¢µ¸ˆÅ, ‡½¢÷¸í¸¢¬¸ˆÅ ‡¨¸¿ ¬¸¸¿¬ˆ¼Å¢÷¸ˆÅ í¾ ‚¸¾£ ˆºÅŽ ÷¡¸¸½í¸£ œÏ¸ˆ¼Å¢÷¸ˆÅ ž¸ú í¾— Ÿ¸›¸º«¡¸ œÏˆ¼Å¢÷¸ ˆÅú ¬¸¨¸Äª½«“ £ ¸›¸¸ í¾, ƒ¬¸¢¥¸‡ ¨¸í œÏˆ¼Å¢÷¸ ˆ½Å ¢¨¸¢ž¸››¸ ‚¨¸¡¸¨¸¸Ê ˆÅ¸½ ƒÄ渣ú¡¸ œÏ¢÷¸³Åœ¸ Ÿ¸¸›¸÷¸½ íº‡ œ¸» ¸¸ ž¸ú ˆÅ£÷¸¸ í¾— ž¸¸£÷¸ú¡¸ ¬¸ž¡¸÷¸¸ -¬¸¿¬ˆ¼Å¢÷¸ Ÿ¸Ê œÏˆ¼Å¢÷¸ ˆ½Å ‚¨¸¡¸¨¸ ¡¸˜¸¸ ¬¸»¡¸Ä, ¸›Í, ¨¸¸¡¸º, ›¸™ú, œ¸í¸”õ ‚¦Š›¸, ¨¸¼®¸ ƒ÷¡¸¸¢™ ˆÅú œ¸» ¸¸ œÏ¸ ¸ú›¸ ˆÅ¸¥¸ ¬¸½ íú í¸½ £íú í¾ — ퟸ¸£½ ™½©¸ Ÿ¸Ê ¢¨¸¢ž¸››¸ ¸¸¢÷¸ ¬¸¿œÏ™¸¡¸ ˆ½Å ¥¸¸½Š¸ £í÷¸½ í¾, ‚÷¸À „›¸ˆ½Å ÷¡¸¸½í¸£¸Ê Ÿ¸Ê ž¸ú ¢ž¸››¸÷¸¸ œ¸¸ƒÄ ¸¸÷¸ú í¾, œ¸£›÷¸º œÏˆ¼Å¢÷¸ ¬¸½ ¬¸¿¤¸¿¢š¸÷¸ œ¸¨¸Ä -÷¡¸¸½í¸£ ¸¸¢÷¸ ¬¸½ œ¸£½ ‚¸¾£ ˆºÅŽ ¬¸¿œÏ™¸¡¸ ¬¸½ œ¸£½ ž¸ú Ÿ¸›¸¸‡ ¸¸÷¸½ íÿ— ¬¸¿œÏ™¸¡¸ ¬¸½ œ¸£½ ˆ½Å œ¸¨¸¸½ô Ÿ¸Ê Ž“-œ¸¨¸Ä ‡ˆÅ Ÿ¸í÷¨¸œ¸»µ¸Ä œ¸¨¸Ä í¾— ƒ¬¸½ ¥¸¸½ˆÅ œ¸¨¸Ä ˆÅú ¬¸¿±¸¸ ™ú Š¸ƒÄ í¾ — ¡¸í Ÿ¸º‰¡¸ ³Åœ¸ ¬¸½ ¢¤¸í¸£ ¨¸ „ œÏ™½©¸ ˆ½Å œ¸¨¸Ä ˆ½Å ³Åœ¸ Ÿ¸Ê œÏ ¸¢¥¸÷¸ í¾ œ¸£›÷¸º ¨¸÷¸ÄŸ¸¸›¸ Ÿ¸Ê ƒ¬¸ˆÅ¸ ³Åœ¸ £¸«’ïú¡¸ í¸½›¸½ ¥¸Š¸¸ í¾ — ¡¸í œ¸¨¸Ä œÏ¸ˆ¼Å¢÷¸ˆÅ œ¸¨¸Ä ˆ½Å ³Åœ¸ Ÿ¸Ê Ÿ¸º‰¡¸ ³Åœ¸ ¬¸½ ¸¸›¸¸ ¸¸÷¸¸ í¾, Æ¡¸¸Ê¢ˆÅ ƒ¬¸ œ¸¨¸Ä Ÿ¸Ê ¢ˆÅ¬¸ú ™½¨¸÷¸¸ ¢¨¸©¸½«¸ ›¸íú¿ ¤¸¦¥ˆÅ œÏˆ¼Å¢÷¸ ˆ½Å Ÿ¸º‰¡¸ ‚¨¸¡¸¨¸ ‚¸¾£ … ¸¸Ä - 踸½÷¸ ¬¸»¡¸Ä ˆÅú œ¸» ¸¸ í¸½÷¸ú íÿ— ˆÅ¸¢÷¸ÄˆÅ Ÿ¸íú›¸½ ˆ½Å ©¸ºÆ¥¸ œ¸®¸ ˆÅú «¸«“ú ¢÷¸¢˜¸ ˆÅ¸½ ‚¬÷¸¸ ¸¥¸Š¸¸Ÿ¸ú ¬¸»¡¸Ä ‡¨¸¿ ¬¸œ÷¸Ÿ¸ú ¢÷¸¢˜¸ ˆÅ¸½ „™¡¸¸ ¸¥¸Š¸¸Ÿ¸ú ¬¸»¡¸Ä ˆÅ¸½ ¸¥¸- ‚‹¡¸Ä ¢™¡¸¸ ¸¸÷¸¸ íÿ— Ž“ ¨Ï÷¸ú ¢¨¸©¸½«¸ ˆÅ£ Ÿ¸¢í¥¸¸‡¿ Žî¸ú¬¸ ‹¸¿’½ ˆÅ¸ ¢›¸ ¸Ä¥¸¸ „œ¸¨¸¸¬¸ £‰¸ˆÅ£ ¤¸¸¿¬¸ ¬¸½ ¤¸›¸½ ¬¸»œ¸ ”¢¥¸¡¸¸ ¬¸½ ¬¸Ÿ¸¬÷¸ †÷¸º-ûÅ¥¸ ‡¨¸¿ œ¸ˆÅ¨¸¸›¸ ˆ½Å ¬¸¸˜¸ ž¸Š¸¨¸¸›¸ ¬¸»¡¸Ä ˆÅ¸½ ¬¸Ÿ¸¢œ¸Ä÷¸ ˆÅ£÷¸ú í¾ ‚¸¾£ ‚œ¸›¸½ ¬¸Ÿ¸¬÷¸ œ¸¢£¨¸¸£ ˆ½Å ¬¨¸¸¬˜¡¸ -Ÿ¸¿Š¸¥¸ ˆÅú ˆÅ¸Ÿ¸›¸¸ ˆÅ£÷¸ú íÿ— ‚¸ ¸ ˆ½Å ¬¸¸¿œÏ™¸¢¡¸ˆÅ ‡¨¸¿ ¨¸¾Ÿ¸›¸¬¡¸ ž¸£½ ¡¸ºŠ¸ Ÿ¸Ê ‡ˆÅ Ÿ¸¸°¸ œÏˆ¼Å¢÷¸ -œÏ½Ÿ¸ œÏ™©¸ÄˆÅ œ¸¨¸Ä Ž“ íú í¾, ¸¸½ ¬¸¸¿œÏ™¸¢¡¸ˆÅ ‡¨¸¿ ¨¸¾Ÿ¸›¸¬¡¸÷¸¸ ¬¸½ œ¸£½ ¸¸÷¸ú¡¸ ‡¨¸¿ ¬¸¸¿œÏ™¸¢¡¸ˆÅ ¬¸¸¾í¸™Ä û¾Å¥¸¸ˆÅ£ ¥¸¸½Š¸¸Ê ˆÅ¸½ ‡ˆÅ- ¸º’ í¸½ˆÅ£ ¬¸í¡¸¸½Š¸ ˆÅ£›¸½ ˆÅú œÏ½£µ¸¸ ™½÷¸¸ íÿ— ¡¸í œ¸¨¸Ä íŸ¸Ê œ¸Š¸-œ¸Š¸ œ¸£ œÏˆ¼Å¢÷¸ ¬¸í¡¸¸½Š¸ ‡¨¸¿ ¬¸¿£®¸µ¸ ˆÅú œÏ½£µ¸¸ ™½÷¸¸ í¾— ‚÷¸À ¥¸¸½ˆÅœ¸¨¸Ä Ž“ ¨¸¸¬÷¸¨¸ Ÿ¸Ê ¥¸¸½ˆÅœÏ½Ÿ¸ ‡¨¸¿ œÏˆ¼Å¢÷¸ -œÏ½Ÿ¸ ˆÅ¸ ‡ˆÅ Ÿ¸¸°¸ œÏ¢÷¸¢›¸¢š¸ œ¸¨¸Ä í¾—

‚¿ ¸›¸ú ˆºÅŸ¸¸£ ˆ½Å©¸¨¸ ž¸¸Š¸¥¸œ¸º£ ‚¿ ¸¥¸

‚¸

œ¸ˆ½Å ¤¸ ¸¸Ê ˆÅ¸½ œ¸ú¬¸ú ‚¸¾£ ƒ¿’£›¸½’ ¥¸Š¸ž¸Š¸ í£ ¸Š¸í „œ¸¥¸¤š¸ íÿ ¸í¸Â ¨¸½ ¸¸÷¸½ í¾¿ - ¬ˆ»Å¥¸, œ¸º¬÷¸ˆÅ¸¥¸¡¸, ™¸½¬÷¸ ˆ½Å ‹¸£ Ÿ¸Ê ‚¸¾£ ©¸í£ Ÿ¸Ê û¾Å¥¸½ ˆÅƒÄ ƒ¿’£›¸½’ ˆ¾Åû½Å Ÿ¸Ê ž¸ú—

ƒ¿’£›¸½’ ˆÅ¸ „œ¸¡¸¸½Š¸ ¨¸½ Æ¡¸¸Ê ˆÅ£÷¸½ í¾¿ ƒ¬¸ˆ½Å ‚¤¸ ˆÅƒÄ ˆÅ¸£µ¸ íÿ— ¬¸¤¸¬¸½ œ¸í¥¸½, ‚œ¸›¸½ œ¸¸“©¸¸¥¸¸ ˆ½Å œÏˆÅ¥œ¸ ‚¸¾£ ‹¸£ œ¸£ ˆÅ£›¸½ ˆ½Å ¢¥¸‡ ¢™‡ ‚ž¡¸¸¬¸ ˆÅ¸¡¸Ä ˆ½Å ¢¥¸‡ „›íÊ ‚›¸º¬¸¿š¸¸›¸ ‚¸¾£ ¸¸›¸ˆÅ¸£ú œÏ¸œ÷¸ ˆÅ£›¸½ ˆ½Å ¢¥¸‡ ƒ¿’£›¸½’ ˆÅú ‚¸¨¸©¡¸ˆÅ÷¸¸ í¾— ™¸½¬÷¸¸Ê ˆ½Å ¬¸¸˜¸ ¬¸¿œ¸ˆÄÅ £‰¸›¸½ ˆ½Å ¬¸¸˜¸ íú, ¬¸¿Š¸ú÷¸, ¢¬¸›¸½Ÿ¸¸, ¢£¿Š¸’¸½›¸ ”¸„›¸¥¸¸½”, ‚¸¾£ ¬¸ž¸ú ˆ½Å œ¸¬¸¿™ú™¸ ‚¸Á›¸¥¸¸ƒ›¸ ‰¸½¥¸ Ÿ¸Ê ©¸¸¢Ÿ¸¥¸ í¸½›¸¸ ¸¾¬¸½ ¤¸íº÷¸ ¬¸½ ‚›¡¸ ˆÅ¸£µ¸ íÿ— ˆ¿Åœ¡¸»’£ œÏŠ¸÷¸ í¸½›¸¸ „›íÊ ¬¸¸¢˜¸¡¸¸Ê ˆÅú ¬¨¸úˆ¼Å¢÷¸ ‚¸¾£ œÏ©¸¿¬¸¸ œÏ¸œ÷¸ ˆÅ£›¸½ Ÿ¸Ê Ÿ¸™™ ˆÅ£÷¸¸ í¾— ‚¸œ¸ˆ½Å ¢¥¸‡, ‚¢ž¸ž¸¸¨¸ˆÅ¸Ê ˆ½Å ¢¥¸‡, ÷¸˜¸¸¢œ¸ ¡¸í ‡ˆÅ ¬¸¿žÏŸ¸ ˆÅú ¦¬˜¸¢÷¸ í¾À ™º«’ ‡¨¸¿ ‰¸÷¸£›¸¸ˆÅ ¬¸¸ƒ’¸Ê ‚¸¾£ ¸¾’ ³Åœ¸ ˆ½Å ‰¸÷¸£½ ˆÅ¸ûÅú íÿ, ¥¸½¢ˆÅ›¸ ‚¸Á›¸¥¸¸ƒ›¸ „œ¸¡¸¸½Š¸ ¬¸½ ¨¸¿¢ ¸÷¸ £‰¸›¸½ ˆ½Å ¢¥¸‡ œ¸¡¸¸Äœ÷¸ ›¸íú¿ í¾— ˆ¿Åœ¡¸»’£ ˆ½Å „œ¸¡¸¸½Š¸ ˆÅ£›¸½ ¬¸½ ¤¸ ¸¸Ê ˆÅ¸½ Ÿ¸›¸¸ ˆÅ£›¸¸ ž¸ú ‡ˆÅ ‚¸™©¸Ä ¬¸Ÿ¸¸š¸¸›¸ ›¸íú¿ í¾! ƒ¬¸¢¥¸‡, Ÿ¸¸÷¸¸ ¢œ¸÷¸¸ ¡¸¸ ‚¢ž¸ž¸¸¨¸ˆÅ ˆ½Å ³Åœ¸ Ÿ¸Ê, ‚¸œ¸ˆÅ¸½ ¡¸í ¬¸Ÿ¸ ¸›¸½ ˆÅú ‚¸¨¸©¡¸ˆÅ÷¸¸ íÿ ¢ˆÅ ¨¸½¤¸ œ¸£ ¥¸¸ÁŠ¸ ƒ›¸ ˆÅ£›¸½ œ¸£ ‚¸œ¸ ‚œ¸›¸½ ¤¸ ¸¸Ê ˆÅú ¸¸½¢‰¸Ÿ¸ ˆÅ¸½ ˆ¾Å¬¸½ ˆÅŸ¸ ˆÅ£ ¬¸ˆÅ÷¸½ íÿ— ¡¸í ‡ˆÅ ‚ Ž¸ ¢¨¸ ¸¸£ í¾ ˆÅú ‚¸œ¸ ‚œ¸›¸½ ¤¸ ¸¸Ê ˆ½Å ¬¸¸˜¸ ¬¸¿¨¸¸™ œ¸£ ž¸£¸½¬¸¸ £‰¸÷¸½ íº‡, ‚¸Á›¸¥¸¸ƒ›¸ ¢©¸«’¸ ¸¸£ ˆ½Å ¢¨¸«¸¡¸ Ÿ¸Ê Æ¡¸¸ ˆÅ£Ê ‡¨¸¿ Æ¡¸¸ ›¸¸ ˆÅ£Ê ˆÅú ‡ˆÅ ¬¸‰÷¸ ¬¸» ¸ú ¤¸›¸¸‡¿— ‚¸œ¸ ˆ½Å ¢¥¸‡ ‡ˆÅ ¸¸¿ ¸ ¬¸» ¸úÀ v ‚¸œ¸ˆ½Å ¤¸ ¸¸Ê ׸£¸ ¬¸ ¸Ä ˆÅú íºƒÄ ¨¸½¤¸¬¸¸ƒ’¸Ê Ÿ¸Ê Š¸í£ú ²Å¢ ¸ ¢¥¸¢ ¸¡¸½— v ‚¸Á›¸¥¸¸ƒ›¸ ¨¡¸¨¸í¸£ ˆ½Å ¢¥¸‡ ˆºÅŽ ¢›¸¡¸Ÿ¸ ¤¸›¸¸¡¸½¿ ‚¸¾£ „›íÊ ¥¸¸Š¸» ˆÅ£¿½— v ƒ¿’£›¸½’ ¬¸¢ûôÅŠ¸ ˆ½Å ¨¸Æ÷¸ ¬¸¸˜¸ Ÿ¸½¿ ¬¸Ÿ¸¡¸ ¨¡¸÷¸ú÷¸ ¢ˆÅ¢ ¸¡¸½— v ƒ¿’£›¸½’ ˆ½Å ¢¥¸‡ ÷¸¾¡¸¸£ ˆ¿Åœ¡¸»’£ ퟸ½©¸¸ œ¸¢£¨¸¸£ ˆ½Å ˆÅŸ¸£½ Ÿ¸Ê £‰¸½¿ ›¸¸ ˆÅú ‚œ¸›¸½ ¤¸ ¸¸Ê ˆ½Å ˆÅŸ¸£½ Ÿ¸Ê— v ¸¸½¢‰¸Ÿ¸¸Ê ¬¸½ ‚¨¸Š¸÷¸ £íÊ ‚¸¾£ ‚œ¸›¸½ ¤¸ ¸¸Ê ˆ½Å ¬¸¸˜¸ ¸ ¸¸Ä ˆÅ£½¿—

Taarangan

December 2014

63


Phishing Phishing is a way of attempting to acquire information such as usernames, passwords, PIN, bank account, credit card details by masquerading as a trustworthy entity details through electronic communication means like e-mail. How does a phishing email message look like?  Spelling and bad grammar.  Links might also lead you to .exe files. These kinds of file are known to spread malicious software.  Spoofing popular websites or companies.  Cybercriminals also use web addresses that resemble the names of well-known companies but are slightly altered.  Cybercriminals might call you on the phone and offer to help solve your computer problems or sell you a software license.

 DO’s  Be cautious about opening any attachments or downloading files you receives regardless of who sent them.  Use antivirus, antispyware and firewall software (update them regularly too).  Always update your web browser and enable phishing filter.  If you receive any suspicious e-mail do call a company to confirm if it is legitimate or not.  Do use a separate email accounts for things like shopping online, personal etc.  Routinely review your bank and credit card statements for unexplained charges or inquiries that you didn’t initiate.

Internet Banking (DO’s and Don’ts)  DO’s • Always keep your Internet banking password and transaction password secret. • Always keep a unique password and keep changing it regularly. • Always set password that is easy to remember but difficult to guess. • Ensure that no one is watching you when you are entering password. • Always use Virtual keyboard for typing user id and password. • Always check website address of your bank before login. • Always click the padlock on the status bar and ensure that it has valid certificate pertaining to your bank. • Check your account statement regularly. •. Refrain from accessing your bank account at public places like cyber café. •. Always update your web browser and enable phishing filter. • Always ensure that your computer has Antivirus and Anti Spyware installed and it is updated. • Log off completely from your on-line banking website, close the browser and log off your PC, when not in use.

 DON’Ts

 DON’Ts

 Don’t reply to an e-mail or pop-up message that asks for personal or financial information.  Don’t e-mail personal or financial information i.e credit card or other sensitive information via e-mail.  Don’t click on any email or social media messages you don’t expect or need.  Don’t open e-mail that you have any suspicion may not be legitimate.  Don’t open attachments that you were not expecting, especially ZIP files and NEVER run .exe files.  Don’t use your company e-mail address for personal things.  Don’t open any spam e-mail  Don’t open suspicious videos or images in social networking sites since social networking are prime target of phishing.  Never respond to phone calls asking for bank details. It might be vishing (voice phishing).  Beware of phishing phone calls.

•. Never disclose Internet banking username, password, on

64

leejebieCe

efomebyej 2014

phone call or email. • Never leave the PC unattended while using Internet banking. • Don’t open multiple tabs in your browser windows and keep them inactive for long time. • Don’t reply to an email or pop-up message that asks for personal information like password, login to Internet Banking or PIN. • Never download/install/run programs/files from untrusted sources. • Don’t click on any link which has come through unknown sources. • Don’t access the Internet Banking website through a link from another website or a link in an e-mail. • In case you smell anything fishy, call and confirm from our Bank before you act as requested.

Note: Some content in this edition have been prepared from publicly available sources for education and awareness of internal staff members and readers.


‚¸œ¸ ˆÅí÷¸½ íÿ...

You said it...

÷¸¸£¸¿Š¸µ¸ ˆÅ¸ ¢¬¸÷¸¿¤¸£ 2014 ˆÅ¸ ¬¨¸¢µ¸ÄŸ¸ ‚¿ˆÅ œÏ¸œ÷¸ íº‚¸ — `¬¨¸¢µ¸ÄŸ¸' ƒ¬¸¢¥¸‡ Æ¡¸¸Ê¢ˆÅ ¨¸«¸Ä 1964 ¬¸½ 2014 ÷¸ˆÅ ˆ½Å Š¸¸¾£¨¸©¸¸¥¸ú ¬¸ûÅ£ ˆÅ¸½ ÷¸¡¸ ˆÅ£÷¸¸ íº‚¸ ÷¸¸£¸¿Š¸µ¸ ˆÅ¸ ¡¸í ‚¿ˆÅ ‚œ¸›¸½ ¬¨¸¢µ¸ÄŸ¸ ¬¨¸³Åœ¸ Ÿ¸Ê œ¸íº¿ ¸ Š¸¡¸¸ í¾— ¢ ¸¬¸ œÏˆÅ¸£ ¬¨¸µ¸Ä ‚œ¸›¸ú ©¸º¢ ¸÷¸¸, ¸Ÿ¸ˆÅ ‚¸¾£ ‚œ¸›¸½ Š¸ºµ¸¸Ê ˆ½Å ˆÅ¸£µ¸ ¬¸Ÿ¸¬÷¸ š¸¸÷¸º‚¸Ê Ÿ¸Ê ¬¸¨¸Äª½«“ Ÿ¸¸›¸ú ¸¸÷¸ú í¾ „¬¸ú œÏˆÅ¸£ ÷¸¸£¸¿Š¸µ¸ œ¸¢°¸ˆÅ¸ ¬¸¨¸Äª½«“ œ¸¢°¸ˆÅ¸ ˆ½Å ¬¸¸£½ œ¸¾Ÿ¸¸›¸½ ‚¸¾£ Ÿ¸¸œ¸™¿”¸Ê Ÿ¸Ê ‰¸£ú „÷¸£ú í¾— ˆÅ¬¸¸¾’ú œ¸÷˜¸£ ˆÅú ž¸»¢Ÿ¸ˆÅ¸ ¢›¸ž¸¸÷¸½ íº‡ ÷¸¸£¸¿Š¸µ¸ ˆÅ¸½ `¬¨¸¢µ¸ÄŸ¸ ¸Ÿ¸ˆÅ' œÏ™¸›¸ ˆÅ£›¸½ í½÷¸º ¬¸¿œ¸»µ¸Ä ¬¸¿œ¸¸™ˆÅ Ÿ¸¿”¥¸ ˆÅ¸½ ¬¸¸š¸º¨¸¸™ — ¨¸¬÷¸º÷¸À ÷¸¸£¸¿Š¸µ¸ œ¸¢°¸ˆÅ¸ ˆÅ¸ œÏ÷¡¸½ˆÅ ‚¿ˆÅ ‚œ¸›¸½ ‚¸œ¸ Ÿ¸Ê ¤¸½ ¸¸½” í¸½÷¸¸ í¾ ¢ˆÅ›÷¸º ¨¸÷¸ÄŸ¸¸›¸ ‚¿ˆÅ ˆÅ¸ í£½ˆÅ ©¸¤™, íûÄÅ, ©¸¤™ ¬¸¿¡¸¸½ ¸›¸, £¿Š¸¸Ê ˆÅ¸ ¬¸¿¡¸¸½ ¸›¸, ¢Ÿ¸°¸¸Ê ˆÅ¸ ¬¸¿¡¸¸½ ¸›¸, ¢¨¸«¸¡¸ ¨¸¬÷¸º ˆÅ¸ ¸¡¸›¸ ‚œ¸›¸½ ‚¸œ¸ Ÿ¸Ê ¤¸½ ¸¸½” í¸½ Š¸¡¸¸ í¾ — œ¸¢°¸ˆÅ¸ ˆÅ¸ œÏ÷¡¸½ˆÅ ˆÅ¸½›¸¸ ¬¨¸¢µ¸ÄŸ¸ ‚¸ž¸¸ ¢¥¸‡ íº‡ í¾ ‚¸¾£ œ¸¢°¸ˆÅ¸ ˆÅ¸½ ¢Ÿ¸¥¸½ íº‡ œ¸º£¬ˆÅ¸£ ¬¸¸½›¸½ œ¸½ ¬¸ºí¸Š¸¸ ˆÅ¸ ˆÅ¸¡¸Ä ˆÅ£ £í½ íÿ — ¢¨¸æ¸ ¢®¸¢÷¸ ¸ œ¸£ ¡¸í œ¸¢°¸ˆÅ¸ ‚œ¸›¸¸ œ¸£ ¸Ÿ¸ ¥¸í£¸‡ ‚¸¾£ ‚œ¸›¸ú Š¸¸¾£¨¸©¸¸¥¸ú œ¸£¿œ¸£¸ ˆÅ¸½ ¢¨¸æ¸ Ÿ¸¿ ¸ œ¸£ ¡¸»¿ íú œÏ™¢©¸Ä÷¸ ˆÅ£÷¸½ £í½ — ƒ›íú¿ Ÿ¸¿Š¸¥¸ ˆÅ¸Ÿ¸›¸¸‚¸Ê ˆ½Å ¬¸¸˜¸— £ ¸›¸ú©¸ ˆºÅŸ¸¸£ ¡¸¸™¨¸ œÏ¤¸¿š¸ˆÅ (£¸) ¬’½’ ¤¸ÿˆÅ ‚¸ÁûÅ ¤¸úˆÅ¸›¸½£ ‡¿” ¸¡¸œ¸º£ ˆÅ¸½’¸ ‚¿ ¸¥¸ ˆÅ¸½’¸ Received the Golden Jubilee issue of Taarangan. I take many rounds to see, watch, read and reread and enjoy in totality. For me it became Swarangan (Mehfil) and I enjoyed symphony again and again. The cover, articles, layouts, colorful printing etc. are of the international standards. The current historic issue of September 2014 is even beyond this. It was a sweet surprise for me to see the nicely located and arranged article on my lamps collection and the records. It was an emotional moment and my mother appreciated me and my work. Thanks a lotMakarand Karandikar Retd. Staff

The Journey of 50 years in Journalism is an important landmark-in that- it helps to evaluate how the journal has graduated over the years. I dare say that your bankö's journal occupies a premier position in the field of House Journals in the country. I enjoyed reading every page particularly the contributions from past employees. You have been able to produce a fine house magazine in that the printing, getup, designs, photographs as well as design are excellent. It is a house magazine PAR EXCELLENCEProf. N Ramachandran GM (Retd.) Bangalore

I must congratulate you and your Editorial Team for the excellent presentation of Taarangan's Golden Jubilee issue. I do recall having seen `Teller' issues during my PR sessions as visiting faculty. I used to show specimen of House magazine of different banks, including Teller. I am happy that Taarangan has won Awards abroad, apart from many in India.S N Surkund AGM (Rt.), Union Bank of India, Mumbai.

¬¸¨¸ÄœÏ˜¸Ÿ¸ ‚¸œ¸ˆ½Å ¤¸ÿˆÅ ˆÅú Š¸¼íœ¸¢°¸ˆÅ¸ `÷¸¸£¸¿Š¸µ¸' ˆÅú ¬¨¸µ¸Ä ¸¡¸¿÷¸ú ¨¸«¸Ä œ¸£ ‚¸œ¸ˆÅ¸½ í¸¢™ÄˆÅ ¤¸š¸¸ƒÄ— œ¸¢°¸ˆÅ¸ ˆÅ¸ ˆÅ¨¸£ œ¸¼«“ ›¸ ˆ½Å¨¸¥¸ ‚¸ˆÅ«¸ÄˆÅ ‡¨¸¿ ¬¸º¿™£ í¾ ‚¢œ¸÷¸º œ¸¢°¸ˆÅ¸ ˆ½Å ›¸¸Ÿ¸ ˆÅ¸½ ¬¸¸ˆÅ¸£ ˆÅ£ ¢¨¸¢©¸«’÷¸¸ ˆÅ¸½ ž¸ú ™©¸¸Ä÷¸¸ í¾— Š¸¼íœ¸¢°¸ˆÅ¸ £¸«’ïú¡¸ ‡¨¸¿ ‚¿÷¸££¸«’ïú¡¸ ÷¸˜¸¸ ¢¨¸¢¨¸š¸ ‡¨¸¿ ›¸»÷¸›¸ ¸¸›¸ˆÅ¸£ú ¢¥¸‡ íº‡ í¾— œ¸¢°¸ˆÅ¸ Ÿ¸Ê œÏˆÅ¸¢©¸÷¸ ¬¸ž¸ú ¢¨¸«¸¡¸ ±¸¸›¸¨¸ÖĈŠ‡¨¸¿ £¸½ ¸ˆÅ íÿ— ¬¸¿œ¸»µ¸Ä œ¸¢°¸ˆÅ¸ Ÿ¸Ê ‚¸¥¸½‰¸ ±¸¸›¸¤¸ÖĈŠ‡¨¸¿ ¢ ¸°¸¸¿ˆÅ›¸ ¢¨¸«¸¡¸ ˆ½Å ‚›¸º³œ¸ ‡¨¸¿ Ÿ¸›¸Ÿ¸¸½íˆÅ í¾— œ¸¢°¸ˆÅ¸ ˆ½Å ¬¸º¿™£ ¬¸¿œ¸¸™›¸ ‡¨¸¿ œÏˆÅ¸©¸›¸ í½÷¸º ¬¸¿œ¸¸™ˆÅ Ÿ¸¿”¥¸ ˆÅ¸½ í¸¢™ÄˆÅ ¤¸š¸¸ƒÄ— Ÿ¸í¸œÏ¤¸¿š¸ˆÅ (£¸.), œ¸¿ ¸¸¤¸ ‡¨¸¿ ¢¬¸¿š¸ ¤¸ÿˆÅ, ›¸ƒÄ ¢™¥¥¸ú ÷¸¸£¸¿Š¸µ¸ œ¸¢°¸ˆÅ¸ ˆÅ¸ ›¸¨¸ú›¸÷¸Ÿ¸ ‚¿ˆÅ œÏ¸œ÷¸ íº‚¸— œ¸¢°¸ˆÅ¸ ˆ½Å ¬¨¸µ¸Ä ¸¡¸¿÷¸ú ¨¸«¸Ä ˆ½Å œÏˆÅ¸©¸›¸ œ¸£ ‚›¸½ˆÅ¸›¸½ˆÅ ©¸ºž¸ˆÅ¸Ÿ¸›¸¸‡¿— œ¸¢°¸ˆÅ¸ ¢›¸÷¸ ›¸‡ ˆÅ¥¸½¨¸£ ˆ½Å ¬¸¸˜¸ ‚œ¸›¸ú Ž’¸ ¢¤¸‰¸½£ £íú í¾— ¤¸¾¢ˆ¿ÅŠ¸ ®¸½°¸ Ÿ¸Ê ÷¸¸£¸¿Š¸µ¸ ›¸½ ›¸‡ ‚¸¡¸¸Ÿ¸¸Ê ˆÅ¸½ Žº‚¸ í¾ ÷¸˜¸¸ £¸ ¸ž¸¸«¸¸ œÏ¬¸¸£- œÏ ¸¸£ Ÿ¸Ê ¸¸½ ¡¸¸½Š¸™¸›¸ ™½ £íú í¾ „¬¸ í½÷¸º Ÿ¸¿Š¸¥¸ ˆÅ¸Ÿ¸›¸¸‡¿ — ‚›¡¸ ¤¸ÿˆÅ¸Ê ˆ½Å ¢¥¸‡ ž¸ú ¡¸í ‡ˆÅ œÏ½£µ¸¸è¸¸½÷¸ í¾ — ‚¸œ¸›¸½ ž¸ú ¸¸½ œÏ¡¸¸¬¸ ¢ˆÅ‡ íÿ ÷¸˜¸¸ ¸¸½ œ¸º£¬ˆÅ¸£ œÏ¸œ÷¸ ¢ˆÅ‡ íÿ „›¸ˆ½Å ¬¸¤¸ˆ½Å œÏ¢÷¸ ퟸ¸£ú ‚¸½£ ¬¸½ ¤¸íº÷¸-¤¸íº÷¸ ¤¸š¸¸ƒÄ— ”¸Á¿.™½¨¸½›Í ¢÷¸¨¸¸£ú ¬¸.œÏ.(£¸.) ‡›¸‡ ¸œ¸ú¬¸ú ¢¥¸., ûÅ£ú™¸¤¸¸™

`÷¸¸£¸¿Š¸µ¸' ˆ½Å œÏˆÅ¸©¸›¸ ˆ½Å 50¨¸Ê ¨¸«¸Ä Ÿ¸Ê œÏ¨¸½©¸ ˆÅ£›¸½ œ¸£ ¬¸¿œ¸¸™ˆÅ ˆÅ¸½ í¸¢™ÄˆÅ ¤¸š¸¸ƒÄ— 49 ¨¸«¸¸½ô ÷¸ˆÅ ¢¤¸›¸¸ ¢ˆÅ¬¸ú š¸››¸¸¬¸½“ ¡¸¸ ¢¨¸±¸¸œ¸›¸ ˆÅú Ÿ¸™™ ˆ½Å ¢¤¸›¸¸ ‡ˆÅ ¢¨¸ ¸¸£ œÏš¸¸›¸ œ¸¢°¸ˆÅ¸ ˆÅ¸½ ¢›¸£¿÷¸£ ¢›¸ˆÅ¸¥¸÷¸½ £í›¸¸ Ÿ¸¸Ÿ¸»¥¸ú ¤¸¸÷¸ ›¸íú¿ í¾— Ÿ¸ÿ ƒ¬¸ œ¸¢°¸ˆÅ¸ ˆÅ¸ ˆÅƒÄ ¨¸«¸¸½ô ¬¸½ œ¸¸“ˆÅ £í¸ í»Â ƒ¬¸¢¥¸‡ ƒ¬¸ ‡½¢÷¸í¸¢¬¸ˆÅ ‹¸”õú Ÿ¸Ê ˆºÅŽ ˆÅ훸½ ˆÅ¸ ¥¸¸½ž¸ Ž¸½”õ ›¸íú¿ œ¸¸ £í¸ í»Â— `÷¸¸£¸¿Š¸µ¸' ˆÅú ƒ¬¸ ¥¸Ÿ¤¸ú ¡¸¸°¸¸ ˆÅ¸½ œ¸»£¸ ˆÅ£›¸¸ íú ‡ˆÅ „œ¸¥¸¦¤š¸ í¾— `÷¸¸£¸¿Š¸µ¸' ›¸½ œÏŠ¸¢÷¸©¸ú¥¸ ¢¨¸Ÿ¸©¸Ä ˆ½Å ¢¥¸‡ ‡ˆÅ Ÿ¸¿ ¸ œÏ™¸›¸ ¢ˆÅ¡¸¸ í¾— ƒ›¸ ¨¸«¸¸½ô Ÿ¸Ê ‡½¬¸½ ‚›¸½ˆÅ ¥¸½‰¸ ‚¸¾£ £ ¸›¸¸‡¿ ƒ¬¸Ÿ¸Ê œ¸ õ›¸½ ˆÅ¸½ ¢Ÿ¸¥¸ú¿, ¸¸½ ¬¸¿ž¸¨¸÷¸À ‚›¡¸ œ¸°¸-œ¸¢°¸ˆÅ¸ Ÿ¸Ê „œ¸¥¸¤š¸ ›¸íú¿ í¸½÷¸ú— ÷¸¸£¸¿Š¸µ¸ ˆÅ¸½ ¢Ÿ¸¥¸½ œ¸º£¬ˆÅ¸£¸Ê ¬¸½ ¸º”õ½ ¬¸Ÿ¸¸ ¸¸£ ¬¸º›¸ˆÅ£ Ÿ¸º ¸½ ‚÷¡¸¿÷¸ œÏ¬¸››¸÷¸¸ í¸½÷¸ú í¾— ÷¸¸£¸¿Š¸µ¸ ‚¸¾£ ¬¸¿œ¸¸™ˆÅú¡¸ ’úŸ¸ ˆÅú ™ú‹¸¸Ä¡¸º ˆÅú ˆÅ¸Ÿ¸›¸¸ ¬¸¢í÷¸. ªú œÏ™úœ¸ ¤¸ú ©¸Ÿ¸¸Ä „œ¸ ‚¸¿.œÏ. ‚¸Š¸£¸ ‚¿ ¸¥¸

÷¸¸£¸¿Š¸µ¸ ¢¬¸÷¸¿¤¸£-14 ‚¿ˆÅ œÏ¸œ÷¸ íº‚¸— ‚¸¨¸£µ¸ œ¸¼«“ ˆÅú ¬¸º›¸í£ú Ž’¸ ™½‰¸÷¸½ íú ‚¸ž¸¸¬¸ íº‚¸ ¢ˆÅ Š¸¼íœ¸¢°¸ˆÅ¸ ÷¸¸£¸¿Š¸µ¸ `¬¨¸µ¸Ä ¸¡¸¿÷¸ú ¨¸«¸Ä' Ÿ¸›¸¸ £íú í¾— ¢œ¸Ž¥¸ú ¬¨¸¢µ¸ÄŸ¸ ¡¸¸™Ê ž¸ú Ÿ¸º‰¡¸ œ¸¼«“ œ¸£ ‚¿¢ˆÅ÷¸ íÿ ¸¸½ ™©¸¸Ä÷¸ú í¾ ¢ˆÅ œ¸¢°¸ˆÅ¸ ˆÅ¸ Š¸¸¾£¨¸©¸¸¥¸ú ƒ¢÷¸í¸¬¸ £í¸ í¾— ¬¸¿œ¸¸™ˆÅú¡¸ Ÿ¸µ”¥¸ ˆ½Å ‚š¡¸®¸ ‡¨¸¿ Ÿ¸í¸œÏ¤¸¿š¸ˆÅ (Ÿ¸¸›¸¨¸ ¬¸¿¬¸¸š¸›¸) ªú ¸£µ¸ ¢¬¸¿í ¸ú ˆÅ¸ ¢¨¸©¸½«¸ ¬¸¸®¸¸÷ˆÅ¸£, ‚¿÷¸£¸«’ïú¡¸ Š¸¢÷¸¢¨¸¢š¸¡¸¸¿, œÏ¢÷¸ž¸¸¨¸¸›¸ ¬’¸ûÅ-¬¸™¬¡¸¸Ê ˆÅ¸½ ¬˜¸¸œ¸›¸¸ ¢™¨¸¬¸ œ¸£ ¬¸ŸŸ¸¸¢›¸÷¸ ˆÅ£›¸¸ ¤¸íº÷¸ íú ¬¸ŸŸ¸¸›¸ ¸›¸ˆÅ í¾— ›¸¸£ú ˆ½Å ‚¿÷¸Ÿ¸Ä›¸ ˆÅ¸½ œÏˆÅ’ ˆÅ£÷¸ú ˆÅƒÄ ˆÅ¢¨¸÷¸¸‡¿ Ÿ¸š¸º£ ¤¸›¸ œ¸”õú íÿ— ¢›¸÷¸ ›¸‡ ‚¸¡¸¸Ÿ¸ Ž»÷¸ú ÷¸¸£¸¿Š¸µ¸ œ¸¢°¸ˆÅ¸ ¢›¸¢ä¸÷¸ ³Åœ¸ ¬¸½ ‡ˆÅ ¬¸Ÿœ¸»µ¸Ä œ¸¢°¸ˆÅ¸ í¾ ¢ ¸¬¸ œ¸£ ¤¸ÿˆÅ ‚¸ÁûÅ ƒ¿¢”¡¸¸ œ¸¢£¨¸¸£ ˆÅ¸½ Š¸¨¸Ä í¾— ªúŸ¸÷¸ú ¢¨¸Ô¸¸ £¸›¸ú, œÏ¤¸¿š¸ˆÅ (£¸ ¸ž¸¸«¸¸) £¸ ¸¬˜¸¸›¸ ‚¿ ¸¥¸



Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.