Documente Academic
Documente Profesional
Documente Cultură
One day Mr. Indian decides to move from a small village of Nainital, a hill station at the foothill of the Himalayas, to business capital Mumbai in the western region of India.
NAINITAL
e-Governance
e-Governance is no more and no less than governance in an electronic environment. It is both governance of that environment and governance within that environment, using electronic tools (Zussman, 2002).
Goals of e-Governance
The goals of e-Governance are:
better service delivery to citizens Ushering in transparency and accountability
enable money remittance over mobile phones in 2007. The intent was to enable individuals access to the benefits of a full range of financial services regardless of socio economic level or geographical location using the ubiquity and ease of mobile communications.
This programme would enable global Indians to easily
and securely send remittances to their dependents, many of whom didnt have bank accounts.
The project was piloted in a small Himalayan village of
District Pithoragarh in state of Uttarakhand has seen the tremendous results in that unbanked village.
News Headlines
Petrol pumps to go Hi-Tech in country (Mumbai Mirror,
3 September, 06)
Use the mouse to visit under trials: Arthur road jail will
install online system to enable relatives to get appointments (Sunday times of India, Mumbai, September 23, 2006)
State police get net savvy, interrogate accused on
Attaining e-Governance
India is moving towards achieving e-Governance which
Horizontal integration.
Economic
Securities
ISSUES
Political will Power
Social
Infrastructure
Accessibility
Technical Issues
IT infrastructure is the backbone of E-governance.
Interoperability with existing software and hardware
must be considered, as personal data are processed and stored, and financial transitions must be executed.
Privacy Issues
Citizens
concern on privacy of their life and confidentiality of the personal data need to be technically supported.
establishing and maintaining websites.
Privacy and confidentiality has to be highly valued in An ideal Cyber policy and strict appliance of it is the
Securities
The financial transaction demands for transactional
Social Issues
Acceptance and usability by a large variety of people
Infrastructure
Social, geographical and economical disparity issues
through cable or Television should be accessible for all especially to the people in rural areas.
Infrastructure
Comparison of ICT usage between India and developed
countries
Accessibility
Any service should be accessible by anybody from
anywhere at anytime.
Even if Internet population is exponentially growing in
India, still there is a significant portion of the people who may not be able to access services for various reasons like limited access to ICT technologies and devices, low literacy, or phobia for Computer etc. Therefore, universal access is still a mirage.
effective.
A
reconceptualization of government services is mandatory for successful implementation and to get social acceptance.
investment and safeguard of the previous ones. Cost of implementation, operational and evolutionary maintenance must be low enough to guarantee a good cost/benefit ratio.
Legal issues
Strong and effective rules related with IT has to be
formulated and strongly implemented. This presupposes the adoption and use of security measures more particularly empowering and training judiciary and law enforcement manpower with the knowledge and use of cyber forensics and digital evidencing.
Other issues
Underutilization of existing ICT infrastructure.
Attitude of Government Departments and government
officers need a proper counseling. Many officers perceive their department as most important and disregard other departments needs.
Lack of coordination between Govt. Department and
Solution developers.
Resistance to re-engineering of departmental processes is
Database of citizens
It should contain all the personal details i.e. name, address,
citizen Id, etc. and financial information. Every citizen should have a unique Id number and password.
The citizens can access their information and transactions
through this but at the same time the other people wont be able to access their record.
Just by going through his/her file the individual will come
to know about their electricity bill, bank statements, next due LIC premium, phone bill etc. and can transact with all or any of the department at the same time.
Biometrics
The strong database needed for a successful e-governance
is vulnerable to fraud. There are attempts being made to come up with Biometric techniques, which are more secure.
The password can be replaced as an individuals mark of
identity, fingerprints or facial characteristics to verify the identity. Instead of having card readers, there should be devices like fingerprint readers or eye scanners.
It is one of the important evolving technologies, which will
ensure the security and privacy issues as well. But underutilization of these techniques is one of the barriers.
Smart Cards
One smart card with complete detail of the citizens is the
smartest solution. A smart card with citizens name, address, financial information, personal information etc. fully supported and secured by Biometrics may be the key solution.
A fully secured card with easy operability can be used for
all transactions and information. One such project was pilot run at IIT Bombay campus few years back.
Accessibility
to citizen requests for government information. It is an initiative taken by Department of Personnel and Training, Ministry of Personnel, Public Grievances and Pensions to provide a RTI Portal Gateway to the citizens for quick search of information.
The enactment of the RTI Act, 2005 gave a fillip to
transparency in government dealings and concurrently provided some protection against the unwarranted disclosure of confidential information under that law.
IT Act 2000
The IT Act 2000 attempts to change outdated laws and
provides ways to deal with cyber crimes. The Act offers the much-needed legal framework so that information is not denied legal effect, validity or enforceability, solely on the ground that it is in the form of electronic records.
In view of the growth in transactions and communications
carried out through electronic records, the Act seeks to empower government departments to accept filing, creating and retention of official documents in the digital format. The Act has also proposed a legal framework for the authentication and origin of electronic records / communications through digital signature.
the Act.
The Act throws open the doors for the entry of corporate
companies in the business of being Certifying Authorities for issuing Digital Signatures Certificates.
The Act now allows Government to issue notification on the web
secure digital signatures that would be required to have been passed through a system of a security procedure, as stipulated by the Government at a later date.
Under the IT Act, 2000, it shall now be possible for
corporates to have a statutory remedy in case if anyone breaks into their computer systems or network and cause losses damages or copies data. The remedy provided by the Act is in the form of monetary damages, not exceeding Rs. 1 crore.
with privacy protection. In 2008, the IT Act was amended to introduce the following:
A new civil provision prescribing damages for an entity that is
negligent in using reasonable security practices and procedures while handling sensitive personal data or information resulting in wrongful loss or wrongful gain to any person.
Criminal punishment for a person if (a) he discloses sensitive
personal information; (b) does so without the consent of the person or in breach of the relevant contract; and (c) with an intention of, or knowing that the disclosure would cause wrongful loss or gain.
Information Technology notified the IT Rules, 2011 under the IT Act, 2000. India now has a privacy law, brought into force with immediate effect with wide ramifications on the way companies will do business in India.
Sensitive Personal Information - The law relates to dealing with
information generally, personal information and sensitive personal data or information. SPD is defined to cover the following: (a) passwords, (b) financial information such as bank account or credit card or debit card details; (c) physical, physiological and mental health condition; (d) sexual orientation; (e) medical records and history; and (f) biometric information.
policy, to be published on its website. The business has to also appoint a Grievance Officer. The privacy policy appears to be required whether or not the business deals with SPD.
The privacy policy must describe what information is collected,
the purpose of use of the information, to whom or how the information might be disclosed and the reasonable security practices followed to safeguard the information.
Rationale
The fraudulent use of credit cards in the electronic
commerce marketplace has prompted the use of secure protocols to address these problems. Secure communication and payment protocols have been devised to address these problems.
Their corresponding use has been effective to prevent
identity theft and unauthorized credit charge charges. The use of digital signatures and encryption has provided more secure means for engaging in web commerce.
SET Protocol
Developed by Visa and MasterCard Designed to protect credit card transactions Confidentiality: all messages encrypted Trust: all parties must have digital certificates
where necessary
SET Transactions
Data Privacy Who am I dealing with? Message integrity Non-repudiation Access Control
Data Confidentiality Who am I dealing with? Message integrity Non-repudiation Access Control
Same Key is used to both encrypt and decrypt data. Examples : DES, 3DES, AES
Each user has 2 keys: what one key encrypts, only the other key in the pair can decrypt. Public key can be sent in the open. Private key is never transmitted or shared. Example : RSA (Rivest, Shamir, and Adleman )
Data Confidentiality Message integrity Non-repudiation Who am I dealing with? Access Control
Digital Signature
A digital signature is not a digitized form of signature
A digital signature will be UNIQUE for every document
signed by an individual
Private key and public key are unique to the subscriber and
Digital Signature
Hash Algorithm
Digest
Encrypted Digest
Signed Document
Verifying Signature
Digest
Hash Algorithm
Digest
Dual Signatures
Links two messages securely but allows only one
MESSAGE 2
CONCATENATE DIGESTS TOGETHER HASH WITH SHA TO CREATE NEW DIGEST NEW DIGEST ENCRYPT NEW DIGEST WITH SIGNERS PRIVATE KEY
DIGEST 1
DIGEST 2
PRIVATE KEY
DUAL SIGNATURE
Data Confidentiality Message integrity Non-repudiation Who am I dealing with? Access Control
Digital Certificate
A digital certificate or Digital ID is a computer-based
Access Control
Certification Authority (CA): This is an authority that is
trusted to provide public key certificates to cardholders, merchants and payment gateways. In fact, CAs are very crucial to the success of SET.
SSL Protocol
The Secure Sockets Layer (SSL) is a commonly-used
method of passing data back and forth between a client and a server program in a network or between program layers in the same computer.
SSL uses the public-and-private key encryption system
SSL Working
When a Web Browser attempts to connect to a website
SSL Working..
3. A Certifying Authority authenticates the identity of the certificate owner before it is issued
SSL Certificate
leads to vulnerabilities in Web Server communication: An illegal website can be created with similar web pages. With Digital Certificates issued to the Web Server, this can be avoided. If the information between the Web Server and the clients is transmitted in clear text, it can be read/altered. This is very critical during financial transactions over the website, wherein the clients provide their credit card details and other payment details to Web Servers.
form and filed, it is mandatory to provide strong authentication to the documents filed.
TCS-CA offers a toolkit that can be integrated with the
seamlessly with the e-Governance application, and can be used to digitally sign the operation of processing/ approving with the data that is being processed/approved.
Payment Authentication
For this, TCS-CA provides a Digital Certificate-based
solution. The web server and the client are issued SSL certificates and hence are able to communicate over the SSL with highly secure 128 bit encryption, which provides confidentiality for the information that is being transmitted.
Clients are issued Digital Certificates, which enables
integrity of the documents using Digital Certificatebased technology. The solution also facilitates strong access control mechanism for documents.
e-Procurement/ e-Tendering
These IT enabled Services, being highly sensitive, need
Security in the e-Tendering/ e-Procurement scenario using PKI based Digital Signature/ Encryption technologies. TCS-CA also provides legally valid Time Stamping/ Digital Notarization Services, which ensures the Date and Time of bid submission.
Impact of E-Governance
support
efficiency/productivity
created a comprehensive national database with 85 million birth records, 12 million marriage records and 2 million divorce records.
This provided the basis for a national ID number and, hence,
a secure and accurate national ID card. Automation of previously-manual processes has saved considerable sums of money.
The information base and ID numbers have also been an
essential building block in the creation of other public sector planning and service delivery applications.
of process resources.
Case - The Government of Tanzania has recently
launched its integrated HR and Payroll systems covering about 280,000 public servants.
While the capital invested was significant at around US$
6.5 million, the savings already accrued in improved management- reduced ghost workers, improved control, and accuracy-mean that the project has already paid for itself.
Integrated Financial Management System (IFMS) at all ministries in Dar-es-Salaam and Dodoma via a wide area network.
IFMS
has improved control over expenditure management, resulting in more timely and detailed reporting. Internet-enabled versions of both systems will soon be rolled out countrywide.
government functioning in order to create Simple, Moral, Accountable, Responsive and Transparent (SMART) governance.
Specifically, it aims to improve the efficiency of the
state by shrinking it and to enhance its accountability and transparency by making the interface with citizens more inclusive.
Leads to BPR
Comprehensive eGovernance reforms cover the process,
the first step. Technology comes second, only after the processes have been reengineered.
And ultimately, in order to make the reforms sustainable
the people in the concerned departments/ agencies have to internalize the change. This is also one of the reasons why eGovernance projects succeed at the pilot level but when upscaled they become unsustainable.
Encourages Empowerment
It can be done by transferring power, authority and
of processes and decision making and to create more flexible and responsive processes.
Implications of E-Governance
E-Governance has important policy implication for resource mobilization of the State It can significantly reduce the cost of administration on
the one hand and maximize the revenue on the other hand.
At the same time, it can promote accountability and
and
Akshaya
In August 2003, Chamravattom village, a small
backward hamlet in Kerala, South India, earned a unique distinction. It became the first village in India to become 100% information technology (IT) literate. At least one person in each of the 850 families of the village was provided computer training on basic word processing skills and browsing, under the 'Akshaya' project.
The project was launched by the government of Kerala
Akshaya
"My sons are grown-up and often talk about computers.
Before I went to the Akshaya centre, I didn't know what a computer was. But now I understand what my sons are learning and I can also e-mail my husband in the Gulf. We left school much before we knew what learning meant. Though late, this learning has indeed opened our eyes and enhanced our self-esteem. - A 38-year-old housewife, on Kerala Government's Akshaya Project.
Gyandoot
Through Gyandoot, farmers got access to data relating
to market prices of their agricultural produce and land prices as well, enabling them to sell these on their own rather than going through unscrupulous traders.
The project was launched by the government of
Madhya Pradesh to facilitate the farmers. The Gyandoot project was initiated in January 2000 by a committed group of civil servants in consultation with various gram panchayats in the Dhar district of Madhya Pradesh. 35 such centres have been established since January 2000.
eSeva
Andhra
Pradesh is known for its keenness in implementing several e-governance projects, prominent among them being eSeva and CARD.
36 public services offered by the state government at a single counter, and in some cases, even pay their bills online another first of its kind facility in India.
Bhoomi
The Bhoomi project provided farmers instant access to
important land records, which would have otherwise taken them months to obtain. It also protected their land records from manipulation by corrupt government officials.
The project was launched by the government of
projects was the convenience it brought to the citizens who were targeted.
Conclusion
The ability of Central government to understand all
extremely important. The true e-governance should be attained by interface of citizens both with central and local government.
This can shift the paradigm of the E- Governance in to
success.
References
www.tcs-ca.tcs.co.in/pdf/IS_Government.pdf
www.tcs-ca.tcs.co.in/pdf/E-Returns-Government.pdf www.egov.mit.gov.in www.e-governance-imp.html http://ijedict.dec.uwi.edu//viewarticle.php?id=332&layout=html http://www.riseproject.eu/_fileupload/RISE%20Conference/Present
ations/Vinayak%20Godse.pdf jrat.html
www.it.iitb.ac.in/~prathabk/egovernance/egov_success_stories_gu
THANK YOU