DR Police 1[1].5.pdf
-
Upload
jaswinder-singh -
Category
Documents
-
view
219 -
download
0
Transcript of DR Police 1[1].5.pdf
-
7/29/2019 DR Police 1[1].5.pdf
1/70
Detailed Project ReportFor
Department of PoliceGovernment of Kerala
April 30, 2007
-
7/29/2019 DR Police 1[1].5.pdf
2/70
Executive Summary
-
7/29/2019 DR Police 1[1].5.pdf
3/70
1 Executive Summary
Department Mandate
The mandate of the Police department is to act as a facilitator help secure a safe and just society,promote safety and reduce disorders, reduce crime and the fear of crime and contribute todelivery of justice in the State. This includes maintaining the Law and order, community policing,prevention of crimes, investigation of crimes, prosecution of criminals, supporting theprosecution of criminals, collection of intelligence, traffic regulation, railway policing andprotection of V/VIPs and vital installations. For administrative purposes, the state is divided into14 revenue district, three police districts and a Kerala Railway Police district, each one of themheaded by an officer of the rank of Superintendent of Police. The districts are further divided intosub-divisions headed by Deputy Superintendents of Police, and circles headed by CircleInspectors of Police. All of them, in turn, supervise the functioning of the police stations whichare the direct interface of the department with the public.
The department has vital divisions supporting the above functions viz. crime branch, special
branch, narcotic cell, women police cell, control room, alert services (road and rail), crimerecords bureau, armed police battalion, police training college and police academy.
Imperatives for introduction of e-Gov initiatives
The prevalence of law and order is very vital towards the development of any region and it isconsidered as main stay in the growth of the state. Therefore, it is imperative that law and ordershould be extended due preference in every facet of development. Hence IT can help in
o in connecting the service users and extending prompt and timely service to themo in bringing transparency in all the departmental actionso in obtaining necessary information intelligence for effective implementation of law and
order (accuracy, timeliness)
e-Gov Logic Map for the department
There has been attempt in the department to computerization, introduce ICT intervention indissemination of the departments initiatives. But the same is not complete and could not achievethe desired outcome. The department is all willing to attempt the same along with morefunctionalities which would help them to position themselves and contribute to nation building.
The proposed systems can be taken up in twenty four months from the plan horizon. Thedepartments e-gov logic map emphasizes the following:
-
7/29/2019 DR Police 1[1].5.pdf
4/70
o Most of the application architecture suggested are centralized in nature in view variety offactors like integrity of data, shared access, security, reduced data redundancy,
reliability/availability of stored information, consistency of data, maintenance,upgradeability and ease of audit.o The hardware and connectivity up to the door step of the department and departmental
offices will be effectively utilized from Kerala State Wide Area Network (KSWAN) andthe proposed Network Operating Centres (NOCs) will service the departments. Similarly,the common data centre facility proposed by the state will be effectively used for hostingapplications.
o The public connectivity is being increased by the Akshaya set up and Common ServiceCentres and internet kiosks.
o An e-Governance structure to handle department level interventions and co-ordinate withstate wide interventions has also been suggested that duplication of efforts acrossdepartments is avoided in line with the e-governance apex level structure at the state
o A suggested approach for change management and e-training for department officials todeliver responsive services along with the investment in hardware/software assetcreation.
Major e-Gov projects identified for this phase of funding
The major e-Governance projects identified are the following:
o Roll out of district portals in Kerala Police web site (Incl. KRP)o DPO and PS Management Systemo Complaint registration and trackingo Application for CB CID & SB CIDo Application for Photography & Telecommunicationso Application for SCRBo Emergency and Disaster Managemento Battalion windowo Application for FSL and FPBo Application for PTC and KEPA
Critical Success FactorsThe critical success factors which will have a bearing on the initiative are:
o Will of the Governing institutions to bring out transformation in public service deliveryo Employee buy-in/absorption of new ways of transacting serviceso Effectiveness of e training initiatives in re tooling and reskilling if required
-
7/29/2019 DR Police 1[1].5.pdf
5/70
Extend of Funding Requested for
Cost estimation for pilot implementation is expected to be around Rs 5958.40 Lakhs.Cost ofrollout is expected to be Rs.18097.09 lakhs. A sum of Rs. 35366.71 lakhs has to be additionallyprovided for maintenance of hardware, Software and Networking for three Years
-
7/29/2019 DR Police 1[1].5.pdf
6/70
Table of ContentsExecutive Summary......................................................................................21 Executive Summary........................................................................31.1 Department Mandate...................................................................................................... 31.2 Imperatives for introduction of e-Gov initiatives........................................................... 31.3 e-Gov Logic Map for the department............................................................................. 31.4 Major e-Gov projects identified for this phase of funding............................................. 41.5 Critical Success Factors................................................................................................. 41.6 Extend of Funding Requested for .................................................................................. 5
e-Gov - Macro View......................................................................................72 Department e-Gov Priorities..........................................................82.1 Department Mandate and Scope of services.................................................................. 82.2 Commentary on e-readiness of the department............................................................ 142.3 e-Gov Logic Map for the department........................................................................... 202.4 Alignment with state e-Governance priorities............................................................. 242.5 Approach to build consensus on departmental e-governance priorities....................... 242.6 Criterion for prioritizing projects for immediate plan.................................................. 242.7 Major projects identified for the first phase are........................................................... 25
3 Common Info structure for the department ..............................253.1 Solution Architecture................................................................................................... 253.2 Application Architecture.............................................................................................. 263.3 Software....................................................................................................................... 293.4 Hardware...................................................................................................................... 303.5 Network Connectivity.................................................................................................. 323.6 Alignment to state e-Gov info structure....................................................................... 33
4 Substantiation of Technology interventions...............................354.1 Fulfillment of Functional Requirements...................................................................... 354.2 Compliance to open standards..................................................................................... 354.3 Compliance to localization standards........................................................................... 364.4 Security........................................................................................................................ 364.5 Performance................................................................................................................. 394.6 Scalability ....................................................................................................................40
5 e-Governance Structure...............................................................405.1 e-Governance Structure................................................................................................ 40
5.2 Major Entities and expected roles................................................................................ 415.3 Staffing of the cells and task forces............................................................................. 465.4 Suggested Change Management Programme............................................................... 465.5 Policy Support and Process Reengineering.................................................................. 495.6 Awareness amongst service users for better Governance............................................ 495.7 e-Training..................................................................................................................... 515 8 ProgrammeImplementationandMonitoring 53
-
7/29/2019 DR Police 1[1].5.pdf
7/70
e-Gov - Macro View
-
7/29/2019 DR Police 1[1].5.pdf
8/70
2 Department e-Gov Priorities
Department Mandate and Scope of services
2.1.1 The Police DepartmentKerala Police is the law enforcement agency for the state. The motto of the force is Mridhubhave dhrida krithye which means "Soft in Temperament, Firm in Action" in Sanskrit .
Kerala Police is approximately 42,149 strong police force and serves a population of over 31.8million residing in five cities, 53 municipal towns, and 1452 villages spread over an area of38,863 square kilometers with an average population density of 819 per square kilometer. Of this,about 8.2 million people live in urban areas and 23.6 million live in rural areas. They investigateabout 175,000 cases per year.
The Kerala Police has a general executive branch police wing, which mans the police stations invarious towns and cities. There is a Crime Branch wing, which basically deals with sensational
crimes or crimes which span across discricts. The Special Branch wing is the intelligence wing ofthe state police to deal with terrorism and anti-national activities. These two branches do notgenerally have uniform clothing. The Highway Police squads are manned by the generalexecutive branch, with police men being taken on a shift basis from the police stations close tothe highways.
The major functions of the department are:
o help secure a safe and just societyo promote safety and reduce disorderso reduce crime and the fear of crimeo contribute to delivery of justice
2.1.2 Department StructureA Pictorial representation of the organization are furnished in the following pages.
2.1.3 Scope of ServicesPolicing in Kerala, as in other states of India, is organized along districts. For administrativepurposes, the state is divided into 14 revenue and three police districts, each one of them headedby an officer of the rank of Superintendent of Police. The districts are further divided into sub-divisionsheadedbyDeputySuperintendentsofPolice andcirclesheadedbyCircle Inspectorsof
-
7/29/2019 DR Police 1[1].5.pdf
9/70
-
7/29/2019 DR Police 1[1].5.pdf
10/70
-
7/29/2019 DR Police 1[1].5.pdf
11/70
-
7/29/2019 DR Police 1[1].5.pdf
12/70
-
7/29/2019 DR Police 1[1].5.pdf
13/70
The department has vital divisions supporting the above functions viz. crime branch, specialbranch, narcotic cell, women police cell, control room, alert services (road and rail), crimerecords bureau, armed police battalion, police training college and police academy.
The functioning of the district police is supervised at various levels. For supervisory purposes,districts are organized into four ranges headed by Deputy Inspectors General of Police, and theranges into two zones headed by Inspectors General of Police. The DGP exercises finalsupervision over them through the Additional Director General of Police (Operations).
Kerala has 49 police sub-divisions, 190 circles, 433 regular police stations, 9 traffic policestations and 3 all-women police stations. In all, about 35492 persons including 2763 women ofvarious ranks comprise the police force for policing the districts.
The department provides various services to the beneficiaries and some of the key services are:
-
7/29/2019 DR Police 1[1].5.pdf
14/70
Along with the above mandated scope of services the department also has the followingresponsibilities directed towards them;
o passport verificationso awareness creation in the publico maintaining and managing the data base of crimes and criminalso miscellaneous responsibilities viz. coastal police, tourism police, dog squad, mounted
police etc.o traffic assistanceo emergency assistance
Commentary on e-readiness of the department
Readiness to introduce new technology/ e governance applicationsAvailability of technical resources tomanage new projects
60-70% of technical resources can manage newprojects, remaining 30-40% can be madeefficient through capacity building.
Preparedness of functional staff towards
new learning
50% of the existing functional staff are prepared
Leadership to pursue policy imperatives topush modernisation (business processchanges, amendments to accept newprocedures (E.g. e-documents)
Leadership 100% willing, but leadership likelyto change on governments discretion. ( due totransfers, promotions)
Acceptability of responsibility of employeesto participate in new projects
50% of the functional staff can take upresponsibility, remaining 50% can be madethrough training programs
Any examples of citizen participationinitiatives to improve service delivery
Traffic awareness programs Maithri
Role clarity in the department in conductingprocesses
Currently the clarity in conducting processes is30-50%,role clarity can be improved by creatingawareness
Number of officers in each level in the departmentLevel NumberSenior level (up to SP) 1000
Middle level (up to Circle Inspector) 2500Working level (below Sub Inspector andleave out Class IV employees)
36000
Computer literacyExposure to computersL l R ti ( 1t 10 l )
-
7/29/2019 DR Police 1[1].5.pdf
15/70
Type of computer knowledge exposed toLevel DescriptionSenior level (up to SP) Basic level knowledge including internet accessMiddle level (up to Circle Inspector) Basic level knowledge including internet accessWorking level (below Sub Inspector andleave out Class IV employees)
Basic level knowledge including internet access
Hardware and ConnectivityHardware
Type Specification Number Location
Servers IBM server X series 200 PIII, IBM Netfinity PII 3500series server
25 Across 14 Districts
PCs IBM Net vista P III , IBMNet vista P IV, KeltronMake PC P4
2000 Across 14 districtswith a minimum of5 for each district.
Laptops IBM ThinkPad 75 IPS Officers
PrintersHeavy Duty HP Laserjet 20 -Light Duty HP Laserjet 500 Across 14 Districts
and 1 in DICoffice, Trivandrum
Scanners UMAX and HP 300 Across 14 districts& Trivandrum
Current usage of Hardware (Describe to what use the hardware is put to) Printing,Networking, scanning etc:Current usage of hardware is limited to HQ and district offices only. The AMC of the hardwareis a major challenge faced by the department. However, of the working system all of them areput in full possible utilisation.
Over all rating of Hardware (on a scale of 1 to 10): 7
Connectivity
Type Specification Entities connectedLAN Operational 10 Approx in all police districtsWAN Operational NilInternet connectivity Broad Band Available in 17 district officesCurrent usage of Networks (Describe to what use the Network is put to)
-
7/29/2019 DR Police 1[1].5.pdf
16/70
Application software
Title Common Integrated Police ApplicationDeveloped by National Crime Records BureauBrief functionality Undertaking all functionality with respect to crime
and criminal investigation in police right from FIRto charge
Whether pilot or full scaleimplementation
Pilot
Type of application (G2C,G2B,G2G) G2G
Number of users 1000
Title Crime Criminal Investigation SystemDeveloped by National Crimes Record Bureau, New DelhiBrief functionality Installed in 1996 includes functions starting from
FIR to court proceedingsWhether pilot or full scaleimplementation
Part implementation
Type of application (G2C,G2B,G2G) G2GNumber of users 300 in the state
Title Motor Vehicle Theft Co-ordination SystemDeveloped by National Crimes Record Bureau, New DelhiBrief functionality Part of a national data base to track theft vehicles.
Has a database of 80, 000 entriesWhether pilot/full scale implementation Part implementation
Type of application (G2C,G2B,G2G) G2G, G2CNumber of users 500 in the state
Title ThalashDeveloped by National Crimes Record Bureau, New DelhiBrief functionality For tracking missing, kidnapped, distressed. Data
entry started in 2007Whether pilot/full scale implementation Part implementation
Type of application (G2C,G2B,G2G) G2G, G2CNumber of users 1000 in the state
Title Portrait Building ApplicationDeveloped by National Crimes Record Bureau, New DelhiBrief functionality For developing the portrait of people with clues
frompeopleofthecrimescene(2000)
-
7/29/2019 DR Police 1[1].5.pdf
17/70
Title Modus Operandy Criminal Information SystemDeveloped by National Crimes Record Bureau, New DelhiBrief functionality Installed in 1998 includes of data base of modus
operandy criminal and their where abouts.Whether pilot/full scale implementation Part implementation
Type of application (G2C,G2B,G2G) G2GNumber of users 300 in the state
Title Road accident information systemDeveloped by National Crimes Record Bureau, New Delhi
Brief functionality A system which records cases in 14 parameters viz.type of accident, type of vehicle, type of road etc.Generates monthly reports.
Whether pilot/full scale implementation Part implementationType of application (G2C,G2B,G2G) G2GNumber of users 400 in the state
Title GeoKAMS
Developed by IBS, TrivandrumBrief functionality Developed for road safety project (PWD) 2007Whether pilot/full scale implementation Part implementation
Type of application (G2C,G2B,G2G) G2GNumber of users 50 in the state
Title Pay roll systemDeveloped by Police Computer Centre
Brief functionality The software was developed for replacing theformer package on employee pay roll developed inDOS in 1997. Currently being used in SCRSb,CBCID (HQ), Railway and DPOs.
Whether pilot/full scale implementation Full scale implementationType of application (G2C,G2B,G2G) G2GNumber of users 500
Title Personal Information SystemDeveloped by Police Computer CentreBrief functionality A system intended to capture personal details of
officers and men in police stations includingpostings, previous postings, rewards, recognitions,punishment rolls etc.
Whetherpilot/full scaleimplementation Not implemented
-
7/29/2019 DR Police 1[1].5.pdf
18/70
Title Crime Monitoring Cell (CMR) at SCRBDeveloped by Police Computer CentreBrief functionality A system to report grave crimes from different
Police Stations on a daily basis throughCoB/Thapal. Can generate daily/monthly analysisand reports.
Whether pilot/full scale implementation ImplementedType of application (G2C,G2B,G2G) G2GNumber of users 1000
Title Arrested Persons Information System (APIS)Developed by Police Computer CentreBrief functionality The data base of arrested persons in nay part of the
state with date, time name, address, warrant issued,preventive etc details are entered.
Whether pilot/full scale implementation Not implementedType of application (G2C,G2B,G2G) G2GNumber of users Nil
Title Crime Proceeding s soft ware for District SP/CPDeveloped by Police Computer CentreBrief functionality Developed as a tool by SP/CP for preparation of
their monthly crime proceedings at district level.Can be used to generate monthly reports.
Whether pilot/full scale implementation Partly implementedType of application (G2C,G2B,G2G) G2G
Number of users Nil
Title Software for CBCID UnitsDeveloped by Police Computer Centre / Kran SystemsBrief functionality PCC developed a prototype on crime management.
A monitoring and query system. The prototype wasextended to the private company for development.
Whether pilot/full scale implementation Not implementedType of application (G2C,G2B,G2G) G2GNumber of users Nil
Title Soft ware for vigilance and Anti-corruption BureauDeveloped by Police Computer CentreBrief functionality Software caters to entry details and query about
vigilance enquiry/case surprise checks suspended
-
7/29/2019 DR Police 1[1].5.pdf
19/70
Title Black list and passport verificationDeveloped by Police Computer CentreBrief functionality To verify passport application with black list issued
by Govt. of India and other lists to which passportcannot be issued. Installed in SBCID HQRS,
Trivandrum.Whether pilot/full scale implementation Not implemented
Type of application (G2C,G2B,G2G) G2GNumber of users Nil
Title Vehicle tracking system at SabarimalaDeveloped by Police Computer CentreBrief functionality Software to record and search vehicles parked in
various parking places ai and around 20 Kms inSavbarimala area.
Whether pilot/full scale implementation Not implementedType of application (G2C,G2B,G2G) G2GNumber of users Nil
Title Arrack Check for CBCIDDeveloped by Police Computer CentreBrief functionality Enable to store the details of the accused, vehicle
used by offenders o various cases f arrack checkinin the CBCID wing. Can generate periodic reportsfor easy monitoring by senior officials.
Whether pilot/full scale implementation Not implemented
Type of application (G2C,G2B,G2G) G2GNumber of users Nil
Title Police Station SoftwareDeveloped by Police Computer CentreBrief functionality PS record management software is developed as a
prototype incorporating the works of police stations.Expected to reduce the repetitive and redundantworks. Included crime/Man and Administration
management. It does not integrate with CCIS ofNCRB
Whether pilot/full scale implementation Partially implemented / Currently not usedType of application (G2C,G2B,G2G) G2GNumber of users Nil
-
7/29/2019 DR Police 1[1].5.pdf
20/70
Title Software for CIB wing of SCRBDeveloped by Police Computer CentreBrief functionality Developed to capture statistics on crime reported
under various heads of crime, disposal detail,pendency details, under investigations etc. receivedfro SCRB. Can be used to generate statisticalreports.
Whether pilot/full scale implementation Partially implementedType of application (G2C,G2B,G2G) G2GNumber of users Nil
Title SCH PIV for police station registerDeveloped by Police Computer CentreBrief functionality Developed based on SCH PIV register maintained at
police station. Through this control room isequipped with information of all telephonesubscribers of the city and suburbs, hospital details,criminal particulars, communal organizations etc
Whether pilot/full scale implementation Partially implementedType of application (G2C,G2B,G2G) G2GNumber of users 50
Software platformOperating System Windows 98/XPData base Oracle/ Microsoft AccessApplication software For the Above cited schemes
Architecture (C/S, Web Based) Client ServerWhen installed 2003-2004Current status (Not used, Partially used,Completely used)
Partially used
Satisfaction level (on a scale of 1 to 4) 2Plans for Roll out, Expansion Plans for expansion in networking, security, up
gradation of existing hardware and softwareRemarks on improvement infunctionality, user friendliness,
accessibility
Urgent need on improvements in existingfunctionality, user friendliness, accessibility
e-Gov Logic Map for the department
2.1.4 Department Functions
-
7/29/2019 DR Police 1[1].5.pdf
21/70
PROTECTI
ON
REGUL
ATOR
Y
WEL
FARE
SUPPO
R
Police response toemergencies
Police response toinformation oncognizable crimes;
Prevention of crimesand
investi ationof crime
Collecting advanceintelligenceinformation
Keeping the law and order ofthe region
Police response to public
grievances
Conduct of police to
public with courtesy
Management of PoliceBattalions
Social justice
Integrity andimpartiality
o maintenance of law and order;o police response to public grievances;o conduct of police towards public with courtesy;o prevention of crimes;o police response to information on cognizable crimes;o investigation of crimes and prosecution of crimes;o traffic management;o police response to emergencies, disasters and natural calamities;o collecting advance intelligence on potential law and order incidence including
communal tension.
o providing security to V/VIPs and vital installationsThe functions of the department can be schematically represented as shown below.
-
7/29/2019 DR Police 1[1].5.pdf
22/70
2.1.6 e-Gov interventions PlanningA schematic representation of e-Gov interventions planning is furnished in the following page.
217 E G i t ti li
Info structure (Hard Ware, Connectivity)
Capacity Building
Awareness Creation
(Police District wise) Police Portal in Kerala Police web site
Extension of DPOcomputerisation to
PS level
Complaintregistration and
tracking
Court CaseMonitoring
Institution ManagementInitiatives (Eg. PTC,
KPA)Computerization of
Miscellaneouspromotional
services (trainingprogram, awareness
creation etc)
Application Stack
Applications for caseinvestigation (Artificialintelligence, check lists)
Application forBattalion
PHASE 1 PHASE 2 PHASE 3
Computerization ofAll other related
services(Prisoners, probation
Services)
e-administration ofprivate funds
Applications forFSL / FPB
Peripheral Services -Schools etc under the
battalions etc
-
7/29/2019 DR Police 1[1].5.pdf
23/70
Key Feature Phase 1 Phase 2 Phase 3Time Period First Eighteen Months Second Eighteen
Months
Third Twelve Months
Application Stack As depicted in the above FigureInformation Portal Window to all
applications in applicationstack plus staticinformation on acts,policies, departmentactivities, structure
Window to allapplications inapplication stack,GIS/GPS Linkedservices
Windows to allapplications inapplication stackCommunity portals,knowledge sharing,
Information
Intelligence
Dynamic reporting with
respect to applicationsunder the stack
Dynamic reporting
with respect toapplications under thestack, GIS relatedinformation reporting
Integral information
reporting of alldepartmental activitiesand services
Capacity Building Creation of e-Governancestructure
Training employeesinvolved in functionalapplications
Full scale functioningof e-GovernancestructureCapacity building forall employees
Capacity building for allemployees, alliedstakeholders
Awareness Creation Creation of awareness toall employees and targetbeneficiaries serviced byapplication stack
Creation of awarenessto all employees,secondarystakeholders andtarget beneficiariesserviced byapplication stack
Creation of awareness toall employees,secondary stakeholdersand target beneficiariesserviced by applicationstack
Hardware System availability to alltransaction/view users ofapplications in theapplication stack
System availability toall transaction/viewusers of applicationsin the applicationstack
System availability to alltransaction/view usersof applications in theapplication stack
Connectivity Use of KSWAN up toblocks
Use of KSWN up toPolice stations
Use of KSWAN up toPolice Stations
Stakeholders addressed General public,Department staff
Entire public of thestate
Entire public of the state
Main servicesaddressed
law and order;public grievances;prevention of crimes;police response to ncognizable crimes;investigation andprosecution of crimes;traffic management;emergencies disasters
GIS MappingGPRS communicationDisaster management
All possible newtechnology forpolicing
promotionalprogrammes,community involvement
-
7/29/2019 DR Police 1[1].5.pdf
24/70
Alignment with state e-Governance priorities
In implementing its e-Governance projects, Police department desires to pursue the followingpriorities:
o To provide easy and alternate access to the service users in interacting with thedepartment
o To reduce the response time of the department to the service users by automating itsworkflows for approvals and sanctions
o To empower the service users with required information on various activities of thedepartment and the various assistances available for different categories of beneficiaries
o To provide accurate and reliable status information on all the requests made by thebeneficiaries
o To provide accurate and reliable information on the various schemesApproach to build consensus on departmental e-governancepriorities
The key senior officials of the department who have sufficient knowledge of the domain and thefunctioning of the department were involved in a participative workshop to identify and prioritizethe proposed e governance projects.
In order to take advantage of the rich experience of each of the participants, a consensusmethodology was adopted as the underlying tool in the workshop. This methodology ensured thatall the participants are given an equal opportunity to express their opinions based on theirexperience. After the initial enumeration of the projects by all the participants, each of theseprojects was debated for its relevance and its alignment to departments objective.
In the second phase of the workshop, the participants prioritized the e governance projects whichshall be pursued in the next three years by the department.
This consensus approach ensured:
o Identifying the e governance intervention by thinking through the functions of thedepartment and the citizen touch points with the department
o Providing a holistic debate of the e governance initiative including the infostructureo Enumeration of list of priority projectso Debate on the merits of each of the enumerated projecto Prioritizing based on its alignment to the need and objective of the department
Criterion forprioritizingprojects for immediateplan
-
7/29/2019 DR Police 1[1].5.pdf
25/70
Major projects identified for the first phase are
The major e-Governance projects identified are the following:
o Roll out of district portals in Kerala Police web site (Incl. KRP)o DPO and PS Management Systemo Complaint registration and trackingo Application for CB CID & SB CIDo Application for Photography & Telecommunicationso Application for SCRBo Emergency and Disaster Managemento Battalion windowo Application for FSL and FPBo Application for PTC and KEPA
Each project identified is detailed separately in Annexure 1-10.
3Common Info structure for the department
The info structure detailing is arrived at keeping in view the requirements necessary for theproposed applications for a period of 3 to 5 years based on the technical and applicationarchitecture. This will include the following - software, hardware and networking components.Except for costs on last mile connectivity to desk tops of users most of the network connectivitywill be handled by the common info structure.
Solution ArchitectureThe various applications identified for implementation in the Police department has the followingkey features which make it unique for a real time online system. These features are as follows:
o The users are spread across the stateo The information exchanges between various entities are of very dynamic nature that the
database has to be updated online real-timeo The end users have to be provided a window for information exchangeo The accessibility of the beneficiaries to the information portal has been identified through
Common Service Centres (CSC) and AKSHAYA centres
The features mentioned above warrants a solution architecture which should a web based realtime system. Hence the proposed solution architecture is as follows:
Thesolution is proposed to bea web based three-tier architecture Rather than someexceptions
-
7/29/2019 DR Police 1[1].5.pdf
26/70
Akshaya centers or any other citizen touch points. The network will be accessed by all theGovernment entities up to taluk level through the KSWAN.
The basic architecture is pictorially represented above:
The basic components of the architecture are as follows:
Central Servers: Web Server, Application server and database server will be hosted at Datacenter. Web based UI will be provided to the end user and transaction processing will be online.
PC:The public may access the central application through the PCs using the internet (through the
CSC or AKSHAYA). The official users (departmental officers) may access the applicationthrough the PC intranet connectivity though a broadband facility.
This architecture is defined taking into account the States Network and Hardware infrastructure.The Police entities (The PHQ, SP Offices, Police Stations etc.) would be connected to the CentralData Server through a 2 Mbps State Wide Area Network Back bone. It is proposed that theyconnect to the application server through a dial up / leased line for some time till the SWAN isextended to their level. The beneficiaries / public also may view the information portal throughthe dial up / leased line facility or CSC / AKSHAYA centers. This is made possible by providing
an Internet portal.
Data CenterData Center
Police HQ
17 Police
Districts FIREWALL
FIREW
ALL
State
level
Dist.
levelWebPort
IntranetPort
FIREWALL
FIREWALL
KSWAN 2 Mbps
INTRANET VIEW
Public
Police
StationsTaluklevelRemoteUsers
-
7/29/2019 DR Police 1[1].5.pdf
27/70
In line with the proposed solution architecture and to meet the requirements of the Department ofPolice, it is advisable to go in for three-tier web based architecture. This architecture is definedfor the Police department because of the following reasons:
o Separation of presentation from function: It is found that government business rules arevery dynamic. This would result in the up gradation of the functional engine of theapplications. But the end users shall not be affected by these changes being implementedin the software. Therefore the separation of presentation layer from function is alwaysdesirable. Moreover, this provides the flexibility like today the application can beaccessed through any desirable media like PC servers, PDAs, Mobile phones etc.
o Ability to optimize each tier in isolation for scaling and performance: Since thegovernment processes are prone to frequent changes, many of the components of thesoftware may have to be upgraded / changed over a period of time because of thechanging business needs. Therefore, the 3-tier provides for scalability and flexibility forchanging the software components in each tier without affecting the other components ofthe tiers.
o Parallel development: The large scale government applications require lot of man monthefforts for development. The 3-tier architecture helps parallel development possiblethereby reducing the time for the total solution building
o Reuse of functional modules: The 3-tier enables object oriented programming, therebyenhancing the reusability of certain modules for other applications, thereby reducing thecost and time
o Ability to select the appropriate platform for each task: This architecture also helps inselecting suitable and compatible platforms for each tier thereby enhancing the principlesof open and interoperable standards for the application.
o Connectivity between tiers can be dynamically changed depending upon the user'srequest for data and services.
o Logical layers offer easier maintenance and shorter development cycleso
Security is a case where 3-tier can be beneficial. By putting the Data Access layer onto itsown application server tier we isolate all code that interacts with the database onto acentral machine (or server farm). More importantly, only that application server needs tohave the database connection string or the authentication token needed to access thedatabase server.
The basic components of this architecture would be
Data tier: This basically comprises of the database management systems. Large scale businessapplications require the separate database tier (E.g.: SQL Server, Access, Oracle, MySql, plaintext (or binary) files) which helps if faster retrieval of data, scalability etc. The data tier providesdatabase management functionality and is dedicated to data and file services that can beoptimized without using any proprietary database management system languages. This layer isonly intended to deal with the storage and retrieval of information. The data managementcomponentensures that thedata isconsistent throughout thedistributedenvironmentthroughthe
-
7/29/2019 DR Police 1[1].5.pdf
28/70
Middle Logical tier/layers: consisting of web server, and business logic layer would basicallytake into account the business rules and objects. The middle tier provides process managementservices (such as process development, process enactment, process monitoring, and process
resourcing) that are shared by multiple applications. The middle tier server (also referred to as theapplication server) improves performance, flexibility, maintainability, reusability, and scalabilityby centralizing process logic. Centralized process logic makes administration and changemanagement easier by localizing system functionality so that changes must only be written onceand placed on the middle tier server to be available throughout the systems. Normally itcomprises of two tiers/layers viz Data Access Tier and Business Tier.
Data Access Tier: Data Access layer is entirely responsible for all interaction with the
database. This means it opens and closes all database connections.This Data Layer,obviously, contains no data business rules or data manipulation/transformation logic. It ismerely a reusable interface to the database.Business Tier: This is basically where the brains of your application reside; it containsthings like the business rules, data manipulation, etc.
Presentation Tier: This is the layer that provides an interface for the end user into yourapplication. That is, it works with the results/output of the Business Tier to handle thetransformation into something usable and readable by the end user.
-
7/29/2019 DR Police 1[1].5.pdf
29/70
A comparison of the proposed solutions in the proprietary software and FOSS are provided belowfor guiding the government on appropriate solutions:
Criteria Proprietary FOSSTechnology (E.g.) Java/Lotus notes etc LAMPArchitecture Multi tier Scalable to Multi tier
User InterfaceBrowser based/ Proprietaryclient Any browsers
Criteria Proprietary FOSSScalability Low to high Medium
Flexibility Low to High Medium
Investment Outlay
Depends on the type ofproprietary database beingused
Restricted to business applicationdevelopment cost
Recurring cost
Depends on the type ofproprietary database beingused
Restricted to business applicationmaintenance costs
Software
User-friendly, scalable, reliable, maintainable, open and interoperable system software should beselected for the purpose of developing the applications. This section will provide the options forvarious system software components and its comparisons.
Operating System:
Various OS are available, both proprietary and FOSS. Some of them are WINDOWS NT /Server, Unix, Machintosh etc come under the proprietary OS and Linux, BSD etc. come under theFOSS OS. The suitable choice of the OS depends of various parameters like reliability, security,file system management, support for various device drivers, development environments provided,support, hardware dependency and Total cost of ownership.
Data base:
Various database options are available in the market both in proprietary and FOSS platform.
Some of the robust proprietary databases are Oracle, SQL server, DB2 etc. Similar products in theFOSS line are MySQL, Postgre SQL etc. The factors that determine a suitable database are thefollowing: Fundamental features like supporting Acid, Referential Integrity, Transactions,Unicode, tables and views, supporting OS, scalability, reliability etc.
Webservers:
-
7/29/2019 DR Police 1[1].5.pdf
30/70
Parameters LAMP stack J 2EE / Proprietary Data BaseLicensing Open source for the system
software but not for
business applications
Proprietary
Acquisition cost(budget)
Minimal or nil for systemsoftware
Based on user license metric
Level of support The source code isaccessible and the developercan derive the latestdevelopments
Provided the latest updates on paying atechnical support fee
Parameters LAMP stack J 2EE / Proprietary Data Base
Scalability and Lifecycle cost
- do- Provided the latest updates on paying atechnical support fee
User base Any number since nolicense
Number of users limited based onlicense metric used
Development ease Medium Medium to highPortability Medium Requires configuration with respect to
the server configurationSkill base Up coming Established Pool available
A choice of the proper solution architecture is dependent on several other commercial andlicensing factors. These are
o Budgeto Scalability requirementso Functions and featureso Level of support requiredo User base
Hardware
The hardware selection is based on the following:
o Processing capacity of the selected hardware systemo Throughput, i.e. the number of transactions per second that can be processed by the
hardwareo Optimum data traffic networko Scope for future expandability / scalabilityo Number of concurrent user
The up time is assumed to be 99.999%. Based on the above, a Database server and an applicationserver with a back up for both is recommended The features for the proposed server are the
-
7/29/2019 DR Police 1[1].5.pdf
31/70
This is arrived at by consolidating the memory requirements for the following processes: Memoryfor online users, handling multiple processes, OS and related system process, Networkingprocesses and Daemon processes. The recommended memory size is 2 GB expandable 36 GB
Server Disk space:
This is arrived at by consolidating all the space requirements of the database, file managementsystem to be adopted, estimated transactions, data retention period, and expected growth rate ofthe users and data. The recommended size is 292 GB for a period of three years.
A tentative server specification is provided below for this project:
Sl No Item Requirement
1 Processor64-bit architecture dualcore
2 Speed minimum 3 GHz3 No. of processors 2
4 Motherboard and Chip setCompatible and Intelcertified
5 Cache memory
Minimum 2MB L2 cache
per processor
Sl No Item Requirement
6 Controller SAS7 Memory 2 GB expandable to 32 GB8 RAM Type PC2-5300 DDR2 FDDCL49 Hard disk 2*146 GB to 6*146 GB
10 Ethernet Interface10/100/1000 dual portedEthernet
11 Ports
Standard - @ serial, 2USB, I parallel, Wide ultraSCSI port VGA controller
12 Monitor Standard13 Keyboard Standard14 Mouse Standard15 CD Rom DVD R/W16 Cabinet Tower model
17 DAT drive 40 GB external DAT
18 Server Management
Server Managementsoftware, Integrated remotemanagement /monitoringcontroller
19 OS Windows/UNIX/LINUX
-
7/29/2019 DR Police 1[1].5.pdf
32/70
intranet portal over the 2 Mbps KSWAN back bone. The client machines need be only PCs as theapplication can be accessed through a web based browser. The criteria for the selection are asfollows:
Client processor: The client processor should be chosen based on the number of functionsaccessed, the client interfaces and the ability to support high end GUI features of the application.
Client OS: The OS should be proven, support the main applications, and should be cost effectiveas the numbers of machines are huge.
Therefore the minimum requirements for the client machines are as follows:
PCs with Pentium IV or above with 512 MB or above RAM, 40 GB hard disk and any bundledOS ( Windows / Linux) and the standard web browsers.
3.1.3 PeripheralsPrinters: Adequate printing capacity has to be provided at all the offices at the various levels ofpolice department. A high speed laser jet printer configured for LAN has to be installed at alloffices at the state and all district levels. Similarly, Dot matrix and colour jet printers have to beprovided in adequate numbers at all offices till the block level.
UPS: Adequate UPS has to be provided at all offices for the minimum back time of 8 hours withgenerator back up facility.
Scanners: A high end scanner is recommended at the State office and Low end scanners at allother offices.
Network Connectivity
It is proposed that all the servers be located physically at a central location. This will reduce thecost of LAN and also ease of controlling the software and hardware. The application has to beaccessed through a 2 Mbps WAN by all the government entities whereas; the same applicationmay be accessed by the public through an internet portal. It is recommended that all the offices ofthe Police department up-to Police stations may be brought under the 2 Mbps dedicatedconnectivity.
The network architecture at each of the office at the various levels is broadly defined below.
-
7/29/2019 DR Police 1[1].5.pdf
33/70
2 Mbps KSWAN
System 1System n
System 2 System 3 System 4 Scanner Printer
CAT 6
Cable
10/100/1000
n port
switch
CAT 5
cable
2 Mbps KSWAN2 Mbps KSWAN
System 1System n
System 2 System 3 System 4 Scanner Printer
CAT 6
Cable
10/100/1000
n port
switch
CAT 5
cable
It is assumed that a 2Mbps KSWAN would be coming up to the block level with a NetworkOperating Centre (NOC). This NOC would be equipped with all the necessary hardware andsoftware for the network installation. The office at the LAN would be directly connected to theKSWAN using a 10/100/1000 switch.
Alignment to state e-Gov info structure
3.1.4 e-Gov Data Center FacilityThe application will be hosted in the central server compartmentalized for departments in the datacenter facility. This approach in using a common facility
o will reduce the maintenance of the applications and other software.o will give an edge in negotiating user licenses for system software used in building
application architecture.o
will enable suitable provision of physical and logical security to the software applicationso will enhance the uptime of the applications and services.The center will offer the following services in conjunction with information services cell
o will function as the pivot for all centralized architected e-Governance applications fori d t t
-
7/29/2019 DR Police 1[1].5.pdf
34/70
o will co-ordinate with the performance of the common state wide infrastructure such asKSWAN, Akshaya
o will co-ordinate with external service providers of IT services with respect to centralizeddata center applications
o will manage system administration and user accountso will maintain the disaster recovery sites for all IT applications including Data centero will maintain audit trail , user logs of all departmentso will operate on Service Level Agreement (SLAs) with project teams on key performance
parameters like transaction speed, up time, 24 x 7 availability
To this effect, 5000 sq ft State E-Governance Data center has also been set up atThiruvananthapuram consisting of multiple servers, storage and backup facilities in a very highlysecured environment. The data centres in Kochi and Kozhikode not only ensure necessaryredundancy but also caters to the networking needs of various Government departments/agencieslocated across the state. Departments can share/ co-locate servers at the data centre; servers canbe remotely managed from the departments. These facilities help in huge savings in capitalinvestment for individual departments. Wireless link has already been established between the SIIand major Government Offices in Thiruvananthapuram.
The requirements of servers in section 3.1.1 pertain to the requirements of the department needs
to be reflected while sizing the data centre server.
3.1.5 Kerala State Wide Area Network (KSWAN)Government of Kerala has already implemented a State Information Infrastructure (DIAMOND),with support from Government of India. As part of the project, a State Information Backbone hasbeen set up, which links Thiruvananthapuram (Co-bank Towers), Kochi (Infopark) andKozhikode (KINFRA Park). The free bandwidth (2 Mbps each) given by the private bandwidth
providers (Reliance, Bharti and Asianet), in return to the Rights-of-Way given to them has beenaggregated at the network centers.
-
7/29/2019 DR Police 1[1].5.pdf
35/70
3.1.6 Akshaya centres and other citizen touch pointsThe Akshaya centres state expected to be rolled out to 3000 centres (on an average three perPanchayat) will provide access to every needy citizen with in a radius of 5 kms. One of the keygoals of Akshaya is rolling out of Applications and services to the citizens including e-governance services. The Akshaya ICT access points are envisaged to provide various services tocitizens including single window information and dissemination, various e-governance services,e-education, telemedicine etc. The IT department will also introduce the concept of CSC foreasy access. The department is also introducing the services through FRIENDS centres.
3.1.7 Call CentreDepartment will also service queries on this application through the call centre set-up availablewith the Kerala State IT Mission (KSITM). The call centre is expected to function 24X7. The callcenter executives will be trained on the application softwares and they will post queries to thePolice department on citizen queries.
4 Substantiation of Technology interventionsFulfillment of Functional Requirements
The performance of the web based systems is of at most importance as the users are located atremote locations and connecting through a browser window. The speed of refreshing the data,web pages, uploads and download speed etc have to be considered for better performance. Aminimum performance standard has to be decided upon and further tuning of both the hardwareand software has to be undertaken for better performance.
Compliance to open standards
Usage of open standards by a government is very important. In this information age, agovernment will need to use IT solutions to ensure that it has adequate and reliable information toenable it to govern the country effectively. It is vital that these IT implementations are compliantwith standards that are open. In doing so, the government can ensure that its information systemswill not be locked in later by any single technology or product. It is also in the interests ofnational security that open standards are followed to guard against the possibility of over-reliance
on foreign technologies/products. Some of the standards are industry practices while others areopen standards. Therefore, the following minimum standard requirements are prescribed for thisinitiative.
Important open standardsDomain Standards
-
7/29/2019 DR Police 1[1].5.pdf
36/70
GUI Windows X Windows
Office Documents Open Document
Compliance to localization standards
The localization of the contents is very important for the success of the e-governance initiatives.The following points have to be taken care of in localization standards.
Unicode: This is being widely used in for developing multilingual softwares
Key board standards: INSCRIPT keyboard layout has been adopted in India, however Remington,Phonetic (Roman) are also in use, because of the availability of trained manpower on existingtypewriters. Major national and multi-national (Microsoft) vendors are providing INSCRIPT andother keyboard layouts depending on the user requirements.
Security
A secure Web application relies upon a secure infrastructure. Network consists of routers,
firewalls, and switches; host consists of operating system, operating system's runtime services,runtime components, virtual machine; and application consists of web server, container, scriptingengine and application binary.
Securing n/w components is responsibility of infrastructure management team, securing host andweb server is responsibility of web server admin and securing application is responsibility ofprogrammer.
4.1.1 Measures for security of web based applicationsThe following are some of the measures recommended for the security of the web basedapplications:
Authentication: Authentication mechanism devices a process of "introducing" and validating theuser to a web application and hence forms the first layer of defense for the web application. Therobustness of the authentication mechanism must be ensured for building a secure webapplication.
Authorization: If the restrictions on what authenticated users are allowed to do are not properlyenforced, attackers can exploit the flaws to access other user's accounts, view sensitive files, oruse unauthorized functions. Therefore, the authorization of user access must be clearly definedand built in the application
-
7/29/2019 DR Police 1[1].5.pdf
37/70
part of the request to cause the application to misbehave. Just having very strong input validationscan easily prevent many types of attacks.
Session Handling: Attackers that can compromise session cookies and other session relatedinformation can defeat authentication restrictions and assume other user's identities. Thereforeproper session handling mechanism should be in place
Encryption and Cryptography: Web applications frequently use cryptographic functions toprotect information and credentials. These functions and the code to integrate them are difficult todesign, and may result in a weak implementation.
Physical security: The computer running the web server should be kept physically secured in alocked area. Any backup storage media (tapes, removable disks, etc.) should be similarlyprotected.
4.1.2 Key Components of Security4.1.2.1 Application Security
o Each application will be categorized by the following set of attributeso Type of work (Application Development & Maintenance / Production support)o Availability commitments; i.e. how mission-critical is this application, which in turn will
drive the followingo Distribution of responsibilities between data center and implementation site teamso Dependence on communication facilitieso Disaster Recovery Strategy for application data (as applicable)
4.1.2.2 Affiliation and Standards
The keys to sound security are often considered to be: deployment of a sensible security riskanalysis approach, compliance with a recognized standard such as ISO27001, development ofcomprehensive information security policies and deployment of a detailed security audit program.
Introduction of industry best practices from ISO 27001 (Security Management) and ISO 20000(Service Management) in addition to ISO 9001:2000, CMMI and P-CMM in keeping with focuson infrastructure services management as one of the key contributors for the future will help to
maintain security standards. Integration of ISO 20000 will assure customers of consistent highmaturity practices across the enterprise in the field of maintenance, support and infrastructureservices management.
4.1.2.3 Security Audit / Review Environment and Application
-
7/29/2019 DR Police 1[1].5.pdf
38/70
should be conducted once in a quarter and the results of the audit should be shared with the usersand department.
4.1.2.4 Virus Protection
Two tiered approach towards protection from Virus is recommended
o Usage of two different anti-virus products ensures that in case any virus escapes any oneAntivirus, the other product will take care of that
o Dedicated Infrastructure Development team managing the Anti-virus definition serverso Daily update of antivirus definitionso
Desktop Antivirus clients and Server configured in classical push pull technologyo Daily Scheduled Scanso Patch management Process is very clearly defined and strictly followed and reviewedo Use of enterprise security manager softwares to check policy complianceo Use of patch management softwareso Separate testing environment before deploying patcheso Dedicated Infrastructure Team to test, Install and Review the patch management status
4.1.2.5 Business Continuity
An actionable Crisis Management Plan should be available and tested to address all businesscontinuity needs. It should be integrated with the Quality Management System ensuresdeployment across the organization. BS7799 guidelines address business continuity and disasterrecovery needs of applications with minimal downtime and complete disaster recovery withinagreed time frames through:
o Providing a sense of securityo Minimizing risk of delayso Guaranteeing the reliability of standby systemso Providing a standard for testing the plan.o Minimizing decision-making during a disaster
Introduction of a Business Continuity Framework (BCP) considering the crises in terms of threedimensions - nature of potential loss, impact of loss and the outage.
o Thenature of the losscould be Infrastructure, People and/or Network.o Theimpact of the losscould be High, Partial or Marginalo Theoutagecould be thesite, the city
4.1.2.6 Business Continuity Management
-
7/29/2019 DR Police 1[1].5.pdf
39/70
Conduct of a Business Impact Analysis to assess the risk assessment. From this analysis, a riskassessment profile is developed, which, combined with scenario planning, leads to the generationof the Business Continuity Plan.
o Approach to Business Continuity and Disaster Recoveryo Asset Identification & classificationo Risk Analysis and Managemento Identification of Emergency Response Mechanism & Recovery strategieso Design of Tests and Simulations
ImplementationFollowing a well defined organizational structure, required to ensure clear lines of authority,control and communication and also to create organizational conditions for effectiveimplementation.
Operational ManagementThis stage involves handling of any crisis situation based on its sound preparation, accuratecontact lists and a robust plan. For example, preparation of Hot sites - operationally-ready datacenters with the necessary hardware platforms for immediate availability upon notification of adisaster event. The hot site facilities parallel the facilities provided at the primary site. Also
identification of Cold sites in advance (in collaboration with the client) for mission criticalapplications may be considered. These are configured to serve as alternate sites in case of disasterfor business continuity purposes.
4.1.2.7 Redundancy and DR Sites
Redundancies are ensured through the following means: Alternate Sites may be identified withinthe city as the Disaster Recovery Site for the Main Site with the same Infrastructure of the mainsite so that, this site can be made operational within a period of 2 hours in case of Site Outage due
to reasons like Fire, Earth Quake, Floods are any other reason by which business continuity isaffected at the Main Site.
o Alternate Sites are also designated at other cities so that the DR Site can be madeoperational within a period of 24 hours.
o Communication Links from Alternate Service Providers are used as a proposition fornetwork redundancy
o Various available options are used for Data Communication like IPLC links, FrameRelay Links, ISDN, VPN etc so that we can fall back on any one when the other fails.
o The Electrical Power from the Electrical Board is supplemented by Diesel Generator Sets(DG) of equal capacity to take over in case of Power Outage from the Main Source.
o Uninterrupted Power Supply (UPS) is maintained for all the PCs, Servers and other ITInfrastructure Equipments so that there is no abnormal shutdown in case of changeover toDG Supply or in case of Power Outage of both Main Electrical Supply and the DG Sets.
o Useof MultipleAC Units tosupplementeachother incaseof failureof anyAC unit
-
7/29/2019 DR Police 1[1].5.pdf
40/70
minimum performance standard has to be decided upon and further tuning of both the hardwareand software has to be undertaken for better performance.
ScalabilitySince the government business is very dynamic, the scalability issues have to be given dueimportance. The system architecture defined for DIC (3-tier architecture) helps in scaling of thesystem horizontally, vertically and diagonally. Horizontal scaling is characterized by rapidapplication development, but simplified change management. Horizontal scaling can helporganisations achieve the right level of resilience. With vertical scaling, services are scaled withinthe system resources such as CPUs, memory, and storage can be incrementally added to theserver over time to increase scalability. Vertical scaling is characterized by slowly changing
applications and is often necessary for data-intensive services such as databases, video servers,mail stores, and directories.Diagonal scaling is a combination of horizontal and vertical scaling.
Each server in the group of horizontally scaled servers can be grown within the system, providingincreased flexibility.
5e-Governance Structuree-Governance Structure
A logical diagram of the e-Governance structure is presented below
-
7/29/2019 DR Police 1[1].5.pdf
41/70
Major Entities and expected rolesEntity Major Roles
State e-Gov Council o Steers the entire e-Governance programme of the state at thetop most political level
State ApexCommittee
o will review and plan for state wide e-Gov initiativeso will pursue the policy and process changes required for
success of e-Gov initiativeso will review departmental services rendered through e
StateA ex Committe
TechnicalSupportCell
Policy andProcessSu ort Cell
People SupportCell
ProgrammeImplementationMonitoring &Evaluation Cell
Information
TechnologyPlannin cell
InformationInfrastructureMana ement cell
InformationSecurityMana ement Cell
InformationQuality & TestingCell
Policy Support
Cell (PS)
Process Re-engineeringsupport Cell(PRS)
e-Training
Cell (eT)
ChangeManagementCell (CM)
e-GovData Center
Akshaya/CSC centre
Call Centre InfrastructureAll ied services cell
AwarenessCreationCell (AC)
Department LevelIT Committee
PeMT CounterPart Co-
ordination
PS PRSeTCM
AC
StateE-GovCouncil
SeMT
-
7/29/2019 DR Police 1[1].5.pdf
42/70
o will advise on change management issues to orientemployees and staff to new working methods, skill buildingamongst staff etc.
o will review the info-structure performance, provide policydirections on information security issueso will review the manpower constitution in each of the sub-
ordinate teamsSeMT o A dedicated capacity at the state to provide an overall
technological direction, standardization and consistencythrough programme management of e-Governanceinitiatives. It will comprise of smaller cells for variouspurposes
Technical SupportCell - Informationtechnology Planningcell
o will assess the need for technology upgrades, changesrequired
o will advise the departments and project teams on suitabletechnology options for functional applications
o will provide an overall e-Governance technology planningtaking into account the total departmental requirements
o will maintain e-library of all documentation relating tohardware, software, networking (a copy may be shared with
respective departments but master copy has to bemaintained at e-library)
o will issue procurement guidelines for IT applications,infrastructure
o will consolidate and procure every IT service requirementfrom various departments from process re-engineering toturn-key implementations
o will maintain the custody of intellectual property rights withrespect to Government
o will maintain the commercialagreements/documents/contracts with respect to serviceproviders
Technical SupportCell - InformationSecurity Cell
o will assess the security requirements for new applicationso will issue guidelines on handling security threatso will ensure proper deployment of security measures for
using applicationso will conduct periodical security auditso will provide inputs to e-training cell on training of users on
security issueso will provide guidelines on internet policy and downloads
etc.Technical SupportCell Information
o will establish quality standards for software, hardware andnetworkinginfrastructureonparwithindustrystandards
-
7/29/2019 DR Police 1[1].5.pdf
43/70
o will co-ordinate with the concerned department and thesoftware developers for undertaking acceptance testing
o will be responsible for the sign-off as a co-signatory to thedepartment
People Support Cell - ChangeManagement cell
o will co-ordinate with all project teams to understand theresistance to change
o will undertake suitable change management programmes foreffective e-Governance
o will identify change agents in departments to propel changeo will co-ordinate with eminent citizens/citizen forums to
create a demand for better service deliveryo will facilitate change management programmeso will project needs for policy changes for effective change
management programmeso will plan, measure effectiveness of change
People Support Cell - AwarenessCreation Cell
o will co-ordinate with departments to know the e-Governance functional applications for awareness creation
o will co-ordinate with Public Relations Department to createIEC material and to participate in melas , seminars etc tocreate awareness
o will co-ordinate with Non-Governmental Organizations,Kudumbasree and like minded organizations to createawareness
o will create awareness amongst the employees and serviceproviders of service delivery and importance of e-services
o will review the effectiveness of the awareness creationinitiatives
o will advise on policy matters on awareness creation on e-services
People Support Cell - e-Training cell
o will advise on the training road map for the employees andother service providers
o may provide inputs on the positional requirements withrespect to e-Governance resources
o will plan, implement, monitor and review the effectivenessof training programmes
o will plan for the training infrastructureo will chart a e-training calendar for pursuing capacity
building programmeso will assess e-training requirements based on co-ordination
from departmental task forceso will identify resource pool from the sub project service
teams, info-structure service teams and outside serviceproviders
-
7/29/2019 DR Police 1[1].5.pdf
44/70
o will undertake all activities pertaining to a large data centreoperations
o will operate on Service Level Agreement (SLAs) withserviced departmental sub project teams on key performanceparameters like transaction speed, up time, 24 x 7availability
Akshaya / CSC Cell o will plan and roll out Akshaya initiativeo will review the effectiveness of akshaya initiativeo will project the capacity building needs of akshaya operators
to the capacity building teamo will project the problems of akshaya operators for policy
level decisionsCall Center Cell o will plan and roll out call centres
o will review the effectiveness of call centerso will project the capacity building needs of call center
executives to the capacity building teamo will project the problems of interface with the department
level sub project teams on various e-service applicationsInfra structureservices cell
o will plan and monitor the execution of new infra-structurerequirements
o will be the custodian of all hardware/networking assets ofthe stateo will address the immediate needs of the infrastructure
problems of the departmentso will be the custodian of all IT infrastructure to be managed
in the stateo will advise on policy related matters on info structure viz.
hard ware, networking and connectivityo will review the performance of the common state wide
infrastructure such as KSWAN, Akshaya, Data Centreso will provide technical inputs on infra-structureo will co-ordinate with external service providers of IT
serviceso will manage system administration and user accountso will maintain the disaster recovery sites for all IT
applications including Data centero will maintain audit trail , user logs of all departments
Policy Support Cell o will pursue the policy changes with the Governmentdepartments on priority to support new IT applications andquick service delivery
o will maintain logs of policy changes and relevantGovernment orders
o will share thedocumentationwithe library
-
7/29/2019 DR Police 1[1].5.pdf
45/70
o will solicit all process change requirements for introductionof e-Governance based applications
o will share the documentation with e-libraryo will intimate to all concerned departments on processdocumentation
ProgrammeImplementationMonitoring andEvaluation Cell
o will co-ordinate all e-Governance programmes at the statelevel amongst departments
DepartmentDepartment level I.Tcommittees
o one-point contact for departmental e-Gov initiativeso will review department wide e-Gov initiativeso will review the service levels of sub project service teamso will co-ordinate sub project teamso will advise on department level change management,
awareness creation, capacity building initiatives andrepresent the department interests in higher forum
o will carry out the policy and procedural changes required forpursuing e-Gov initiatives
o will seek technical help of info-structure task force oncritical issues on infra-structure
Departmental levelPeMTs
o one-point contact for sub project related activitieso will plan, implement, monitor, evaluate the sub projectso will service the functional requests from common citizen
touch points such as FRIENDS, call centres, Akshaya postimplementation
o will project policy and procedural changes needed for e-Governance initiatives implementation
o will project the capacity building requirements of employeeso will project the awareness creation requirements for service
users and service providerso will project the info-structure requirements for effective
implementation and maintenance of e-serviceso will be the custodian of all documentation related to the
functional applications, user manualso will operate on Service Level Agreement basis with the
citizen touch point service providers on resolving citizen
querieso will also have constituent members of counter part co-
ordination teams to have orientation on the following issuesCounter Part Co-ordination Teams
o will consist of counter part teams at the department level forthe following functions
PolicySupport o will coordinate policy change request proposals from the
-
7/29/2019 DR Police 1[1].5.pdf
46/70
ProcessReengineering
o will co-ordinate process re-engineering request proposalsfrom the departmental project teams
o will project process re-engineering required at thedepartmental e-Governance initiatives
o will propose process re-engineering proposals through thedepartmental taskforce
o will follow up with the state level cell on the progress of theproposals
e-Training o will co-ordinate the training programmes with the state cello will co-ordinate training modules proposed for functional
applications with in the department and intra-departmento will co-ordinate department activities of e-training with
external service userso will be responsible for consolidation of training
documentation for the departmental functional applicationsof the project teams
Change management o will co-ordinate the activities of the change managementprogrammes
o will co-ordinate requests from the project teams for changemanagement
o will provide feedback of the department on the effectivenessof the programmesAwareness creation o Co-ordinate with departmental project teams to identify the
awareness creation needs on the e-Governance applicationsamongst the service users
o will co-ordinate requests from the project teams for changemanagement
o will provide feedback of the department on the effectivenessof the programmes
Staffing of the cells and task forces
The staffing and positioning of the cells and committees will be purely functional. The memberscould be from the Government, industry, eminent citizenry depending on the needs. TheGovernment and departments may choose to deploy own staff, outsource to service providers,hire staff for key positions.
The department level project teams will have key staff connected to the functional applicationsbut may have co-opted members from other departments provided the functions and processes areinter connected.
The department level counter part teams will represent the interest of the department in the
-
7/29/2019 DR Police 1[1].5.pdf
47/70
The change management programme is an important component in the success of the e-Governance initiatives. The change management programme will propel the fire in the publicservants who want to change and see a change.
The programmes will be cascading in nature so that change agents identified at the state levelserve as a catalyst for bringing change in the environment. The change management will bebrought out through series of cascading programmes. The programme will also derive it strengthfrom the other components like
o awareness creationo policy supporto process re-engineeringo e-training
The key factors which will determine the success of such a programme are:
o top management support and belief to bring in effective e-Governanceo awareness amongst service users for demand for changeo Agents of change and right programme designo concomitant policy support to favor new initiativeso accompanied process re-engineering to address the current prioritieso equipping people within to cope up with changeo introducing good feedback and grievance redress mechanism
Some of the key factors are described below:
5.1.1Top governance team support and belief to bring in effective e-GovernanceThe Government is keen on improving e-Governance their by improving the service levelsamongst the service users. The commitment will be shown in the following measures:
o Will be displayed through the awareness creation component by way ofsuitable Information, Education and Communication to the internalemployees/external service users/service partners
o Will also commit certain level of service levels to the service users by way ofcitizen charters, performance standards in processes to the internal and externalclients.
o Will also attempt to position the right people for the right job with rightleadership
o Will also establish a Programme Implementation Monitoring and Evaluation cellto see the programmes through the logical end
o Will also establish an e-Governance structure as depicted in section appreciatingth i i iti lit f th G t d i iti ti l di t
-
7/29/2019 DR Police 1[1].5.pdf
48/70
o Will also measure the effectiveness of the e-Governance initiatives through theProgramme Implementation Monitoring and Evaluation cell to make suitablecourse corrections
5.1.2 Agents of ChangeAt state level, there will be an initiative to invite willing nominees for change management team.
These nominees will invited through a participatory process, across levels and will be briefed onthe e-Governance programmes and challenges associated with them.
These agents will be the ambassadors of change:
They will in principle disseminate and initiate activities for change in commensurate with thecitizen service delivery and better governance. They will also serve as catalysts to propagate theneed for better citizen orientation, sensitize the civil servants to be empathetical to citizen needs.
They will also project the key resisting factors towards change to the top change managementteam so that the corrective steps can be taken. They will exhibit and fight the cause for change bytheir own behavior and in wooing immediate circle of people.
Simultaneous awareness creation initiatives to empower the citizens to demand will increase thepressure to change
Concomitant support through policy and process reengineering support and IT services supportwill create a positive atmosphere to change.
TechnicalSupport
e-TrainingSupport
PolicySupport
ProcessRe-enggSu ort
ProgrammeImplementation
Su ort
Chan eA ent
Chan eRi les
-
7/29/2019 DR Police 1[1].5.pdf
49/70
5.1.3 Equipping the people to cope with changeThe departments will be strengthened with change management programmes to address the
psychological and logistical needs of employees specifically to unearth anxieties at operatinglevel staff and addressing them squarely
The departments will also address the changes in people roles and responsibilities on introductionof e-interventions and coin programmes to re-tool and re-skill people if required and also imparte-training hands-on and hands-off. There will be scope for continuous e-training through webinstances and internal training infrastructure.
The departments will also build consensus amongst the employees and try to position right peopleat the right slots.
5.1.4 Introduction of good feedback and grievance redress mechanismThis initiative is very important and will be implemented by the change management cell in orderto assuage the apprehensions of staff. The mechanism will be receptive to feedbacks and
grievances irrespective of the levels and hierarchy.
The mechanism will be empathetical towards problems faced by the staff in practical situationsand will make genuine efforts to address the needs. These issues will also be brought during thee-Governance programme reviews and earnestly addressed. If they can be solved at departmentlevel they may be solved at that level and if the problems are severe and merit attention ofmanagement committee the same will be brought to the notice of top governance team.
Policy Support and Process ReengineeringThe other two key factors which impede the normal e-governance programmes are:
o Policy support in right measure at right time.o Process reengineering
The individual project teams will project the need for policy changes/process redesign forsmooth implementation of e-governance application. The requests thus placed through the policysupport/process reengineering cell will be taken up for discussions by the programme monitoringand implementation cell and approved by the management committee.
Awareness amongst service users for better Governance
The departments will be encouraged to pursue awareness initiatives The awareness creation
At G t l l th G t ill h li ti i iti ti d t t
-
7/29/2019 DR Police 1[1].5.pdf
50/70
At Government level, the Government will pursue an holistic initiative across departments,services in propelling the e-Governance initiatives. This more will be to do with theGovernments keen commitment towards improving service delivery through e-Governance.
This will also highlight common initiatives taken by the Government to improve service delivery:
o Citizen touch points like Friends, Akshaya, Jana sevana kendrams, kiosks at civilstations
o Common IT networks provided by the Government like KSWANo Facilitation services provided at places like Akshayao Ease of reach aimed at through local language interfaces like Malayalamo Call centre facility providedo E-payment interface tie-ups with other service providers like payment gateways
for effective service delivery
At department level, the awareness creation amongst the service users will be on the followingelements:
o Services and service levels in the improved environmento Alternate vehicles of service delivery, service access, citizen touch pointso
Rights and responsibilities of service users: E.g. Document proofso Duties an obligations of service providerso Facilitation and assistance available to service users at service delivery pointso Interaction points for citizenso Payment interfaces for key financial applicationso Familiarization to the e-Governance initiative
The Government will also encourage setting up of social audit cells for measuring effectivenessof service delivery, grievance redress etc. in line with the service delivery policy of the
Government which reiterates equity, transparency, fairness.
The Government will also constitute an eminent citizen committee which will serve as a watchdog and advise the programme monitoring and evaluation cell on the effectiveness of theinitiatives.
In addition, the Akshaya centres will be the hub or the last mile service delivery point of e-governance services. But the population who want to reap the benefits of technology, first should
be aware of the services they would be able to get out the technology enabling, the massive e-literacy campaign which is the unique component of the project is designed for addressing thisspecific purpose. A centre with all facilities like Internet telephony, e-governance delivery, e-payment and e-commerce facilities sometimes fails to attract the large number of commonpeople, because of the lack of awareness about the potential of the technology or because of themental barrier to use technology. The e-literacy component would enable the end-user to
T i i
-
7/29/2019 DR Police 1[1].5.pdf
51/70
e-Training
5.1.5Training ProgrammesThe training programmes for the employees and related service providers (private andGovernment) serving at Citizen Touch points are given below:
The training programmes will address multiple audiences, vary in types and imparted at differentlevels. Some of the envisaged training programmes are presented below:
Training Programme Type of training
programme
Target Audience Level at which
impartedSensitization on e-Governance servicedelivery
General All types of serviceproviders
State
IT Awareness General All types of serviceproviders
State
Information Security Basic
Technical All Transactionusers of e-
Governanceapplications
State
Information Security Advanced
Technical All Informationservice providers(E.g. : data centre,IT allied services,KSWAN)
State
Informationinfrastructure
management (alltechnical)
Technical All Informationservice providers
State
Information AssetManagement
Technical IT services cell State
Government Processes Functional All transaction andfunctional users
Department/Statelevel depending on thescope of the functionalapplication
Information QualityStandards andManagement
Technical All technicaldevelopers offunctionalapplications
Department/Statelevel depending on thescope of the functionalapplication
Requirement Analysisfor functional
Technical All technicaldevelopers of
Department/Statelevel depending onthe
developers of level depending onthe
-
7/29/2019 DR Police 1[1].5.pdf
52/70
developers offunctionalapplications
level depending on thescope of the functionalapplication
User Trainings Functional All transaction andfunctional users,service providers atcitizen touch points
Department/Statelevel depending on thescope of the functionalapplication
Information Intelligenceand usage
Functional All top Governanceusers
Department/Statelevel depending on thescope of the functionalapplication
Programme Management Functional All top Governance
users
Department/State
level depending on thescope of the functionalapplication
5.1.6Training infrastructureThe training will be imparted either through the centralized training infrastructure, or using theinfrastructure of Government training institutions (like Institute of Management in Government,
C-DAC, C-DIT, KELTRON) or at departmental facilities.
Training infrastructure may be a part of services rendered by the outsourced service providers.The training instances of governance applications may be posted on the web for free trial forfunctional users. The training could be on-site at the citizen touch points.
-
7/29/2019 DR Police 1[1].5.pdf
53/70
5.1.7Training programme designThe training programmes will be tuned towards the application requirement, and user comfortlevels. The programmes will be mostly designed to give a hands-on exposure and will be highlyinteractive with quizzes and games etc.
5.1.8Training Resource PoolThe resource pool will be determined based on the training programme design and service
providers.
Programme Implementation and Monitoring
The programme implementation, monitoring and evaluation cell will be responsible for thefollowing critical functions
o will co-ordinate all e-Governance programmes at the state level amongstdepartments
o will solicit programme plan documentation from departments based on the inputsfrom information technology planning cell and track the progress of theprogrammes
o will also look after the staffing of the project implementation teamso will look after the funding of the programmes based on inputs from information
technology planning cello will carry out periodical assessment of effectiveness of e-governance
programmes
The cell w