Use of ICT in Courts is increasing day by day. Courts of today are ready for the IT revolution. It is an open debate as to how to bring them at par with other modern organisations in terms of use of technology. This article is an attempt in this direction.
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
This lecture presentation recognizes the difference between IS and IT, reflection on its role in different disciplines and anticipate careers in IT or IS fields.
— Short Message Service (SMS) is the text communication service component of phone, web or mobile communication systems, using standardized communications protocols that allow the exchange of short text messages between fixed line or mobile phone devices. The usage SMS as data application in the world is enormous, with 2.4 billion active users, or 74% of all mobile phone subscribers. This paper develops an SMS voting system that can be used in conducting a trustworthy and generally acceptable electoral conduct based on the legislation of a particular country. It is base on a level structure and a national SIM card module used for only electoral process. The SIM card can be used for either the Internet voting system or the SMS voting. The method is cheap and fast and guarantees prompt election result.
Design and Development of Secure Electronic Voting System Using Radio Frequen...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Computers in Management BBA 2 Sem
We Also Provide SYNOPSIS AND PROJECT.
Contact www.kimsharma.co.in for best and lowest cost solution or
Email: amitymbaassignment@gmail.com
Call: 9971223030
The aim of this paper is discuss the current limitations of the information systems used in legal processes, it is described the architecture of a control and tracking system of juridical matters that it was integrated with collaborative tools. This application has contributed to implement a more transparent and documented administration process of the juridical matters in the public electric companies in Mexico. This system allows lawyers to register the actions carried out; it generates supervision reports and notifications to review the actions and support to make correct decisions. Finally, we review the desirable characteristics to improve it and those required to exploit the information stored as best practices and learned lessons.
This lecture presentation recognizes the difference between IS and IT, reflection on its role in different disciplines and anticipate careers in IT or IS fields.
— Short Message Service (SMS) is the text communication service component of phone, web or mobile communication systems, using standardized communications protocols that allow the exchange of short text messages between fixed line or mobile phone devices. The usage SMS as data application in the world is enormous, with 2.4 billion active users, or 74% of all mobile phone subscribers. This paper develops an SMS voting system that can be used in conducting a trustworthy and generally acceptable electoral conduct based on the legislation of a particular country. It is base on a level structure and a national SIM card module used for only electoral process. The SIM card can be used for either the Internet voting system or the SMS voting. The method is cheap and fast and guarantees prompt election result.
Design and Development of Secure Electronic Voting System Using Radio Frequen...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Computers in Management BBA 2 Sem
We Also Provide SYNOPSIS AND PROJECT.
Contact www.kimsharma.co.in for best and lowest cost solution or
Email: amitymbaassignment@gmail.com
Call: 9971223030
The aim of this paper is discuss the current limitations of the information systems used in legal processes, it is described the architecture of a control and tracking system of juridical matters that it was integrated with collaborative tools. This application has contributed to implement a more transparent and documented administration process of the juridical matters in the public electric companies in Mexico. This system allows lawyers to register the actions carried out; it generates supervision reports and notifications to review the actions and support to make correct decisions. Finally, we review the desirable characteristics to improve it and those required to exploit the information stored as best practices and learned lessons.
Part 1.pdf
__MACOSX/._Part 1.pdf
Part 2.pdf
__MACOSX/._Part 2.pdf
Part 3.pdf
__MACOSX/._Part 3.pdf
Part 4.pdf
__MACOSX/._Part 4.pdf
Definitions
Term
Definition
Access
A means of approaching, entering, exiting, communicating with, or making use of: used a browser to access a website; accessed her bank account online.
Authentication
To positively verify the identity of a user, device, or other entity in a computer system, often as a prerequisite to allowing access to resources in a system.
Connection
A communications link between two points:
Established a connection to the Internet.
Customer
One that buys goods or services.
Data
Distinct pieces of digital information. Data is usually formatted in a specific way and can exist in a variety of forms, such as numbers, text, etc. When used in the context of transmission media, data refers to information in binary digital format.
Device
A device is a unit of physical hardware or equipment that provides one or more computing functions within a computer system. It can provide input to the computer, accept output or both. A device can be any electronic element with some computing ability that supports the installation of firmware or third-party software.
DSL
Digital Subscriber Line or Digital Subscriber Loop. Refers to the variety of different types of Digital Subscriber Line protocols – high-speed data transmission protocols that are compatible with regular copper telephone wire. DSL is typically used to provide a continuous, high-speed connection directly to an Internet Service Provider
Email
Electronic mail. A service that sends messages on computers via local or global networks.
Home network
A local area network (LAN) that connects the PCs in a home and lets users access the Internet simultaneously, share drives, share files and printers, and play head-to-head multi-player games.
Internet
A network of networks; a group of networks interconnected via routers. The Internet (with a capital I) is the world's largest internet.
Internet Access
Access to the Internet via a dial-up account via telephone circuit or direct connection.
Internet Protocol
(IP). The IP part of TCP/IP; the protocol used to route a data packet from its source to its destination over the Internet.
IP Address
The unique 32 bit number assigned to each computer connected to the Internet and used by the TCP/IP protocol to route packets of data to their destinations. The number is usually written in shorthand "dotted octet" notation in which the 32 bit address is grouped into four sets of 8 bits. Each of those eight-bit sets is converted into a decimal number, and the four resulting decimal numbers are written separated by dots. Most Internet addresses consist of a network portion and a node portion. The address for a host must be unique on the network. When you connect to a web server, for example, you may tell your browser to connect to www.mysite.com, but your computer ultimately has to translate the name to its IP .
A mobile(Android app ) based election app. A website or app that will help in smart election system. It can be used by the government,and in every sector when election is a major issue.
1)IT infrastructure is the shared technology resources that provid.pdfaparnawatchcompany
1)
IT infrastructure is the shared technology resources that provide the platform for the firm’s
specific information system applications. IT infrastructure includes hardware, software, and
services that are shared across the entire firm. Major IT infrastructure components include
computer hardware platforms, operating system platforms, enterprise software platforms,
networking and telecommunications platforms, database management software, Internet
platforms, and consulting services and systems integrators.
2)
The five stages of IT infrastructure evolution are as follows: the mainframe era, the personal
computer era, the client/server era, the enterprise computing era, and the cloud and mobile
computing era. Moore’s Law deals with the exponential increase in processing power and
decline in the cost of computer technology, stating that every 18 months the power of
microprocessors doubles and the price of computing halves. The Law of Mass Digital Storage
deals with the exponential decrease in t he cost of storing data, stating that the number of
kilobytes of data that can be stored on magnetic media for $1 roughly doubles every 15 months.
Metcalfe’s Law shows that a network’s value to participants grows exponentially as the network
takes on more members. Also driving exploding computer use is the rapid decline in costs of
communication and growing agreement in the technology industry to use computing and
communications standards.
3)
Moore\'s Law and Microprocessing Power:
The Law of Mass Digital Storage
Metcalf\'s Law and Network Economics
Declining Communications Costs and the Internet
Standards and Network Effects
4)
Computer hardware platforms
Operating system platforms
Enterprise and other software applications
Data management and storage
Networking and telecommunications platforms
Internet platforms
Consulting and system integration services
5)
current trends in computer hardware platfor
Increasingly, computing is taking place on a mobile digital platform. Grid computing involves
connecting geographically remote computers into a single network to create a computational grid
that combines the computing power of all the computers on the network. Virtualization organizes
computing resources so that their use is not restricted by physical configuration or geographical
location. In cloud computing, firms and individuals obtain computing power and software as
services over a network, including the Internet, rather than purchasing and installing the
hardware and software on their own computers. A multicore processor is a microprocessor to
which two or more processing cores have been attached for enhanced performance. Green
computing includes practices and technologies for producing, using, and disposing of
information technology hardware to minimize the negative impact on the environment. In
autonomic computing, computer systems have capabilities for automatically configuring and
repairing themselves. Power-saving processors dramatically reduce .
Judicial Appreciation of Digital Evidence 2016Talwant Singh
Cyber law is evolving in India. Every now and then we get new judgments from Supreme Court and High Courts. This is an attempt to keep pace with the changes.
Role of Training and Development in CourtsTalwant Singh
Training is a continuous exercise in every department of an organisation. Judiciary is not an exception to it. To serve the litigants, it is necessary that adequate and timely training is provided to all stakeholders in the Judicial System.
Change Management is essential for any organisation. Judiciaries all over the world are realising its importance and taking steps to implement the same..
Appreciation of Digital Evidence in Sri Lankan LawTalwant Singh
With the changing times, the mode of producing evidence before Court has also changed. Most of the evidence presented before Courts is going to be Digital Evidence, so it is necessary to understand nature and methods to capture such evidence and present the same before Court.
Use of Information technology in Human Resource Management is increasing day by day. The Judiciary has to adopt appropriate ICT for its HRM related needs.
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITYTalwant Singh
Cyber is a real threat and we can not keep our eyes shut to the same. Most of the countries surrounding us are involved in cyberwar covertly and we need to take steps to counter the same at the earliest.
CYBERWAR IS NOT A CONVENTIONAL WAR. NATIONS ARE YET TO ENTER INTO ANY INTERNATIONAL TREATY IN THE FIELD OF CYBERWAR. RULES ARE REQUIRED TO BE FRAMED IN THIS FIELD KEEPING IN VIEW THE POTENTIAL OF DAMAGE WHICH CAN BE CAUSED IN THE EVENT OF CYBERWAR.
Electronic Evidence is found in all computer and multimedia as well as communication devices. Increasingly most of the business transactions are done in paperless mode but when the disputes arise, then where to look for evidence? This presentation will help you in this field.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
2. 2
E-Justice: The Road Map
1. Introduction
An independent, effective, just and efficient judicial system that fosters respect for the rule of
law is indispensable in a truly democratic system. Modernization, streamlining and improved
efficiency of the court systems are paramount in order to ensure a high degree of protection
of individual rights and therefore increase citizens’ faith and confidence in the State. In order
to bring about reforms in judiciary to remove the archaic procedures and outmoded
administrative and management system, technological, communication and management
related changes are to be brought about. Computerization of judiciary is one of the important
ingredients of judicial reforms. Technological Developments in the field of information and
introduction of computers have made a turning point in the history of human civilization. It
has brought about a sea change in all fields of human activity. It has resulted in enhanced
efficiency, productivity and quality of output in every walk of life. The information
technology is advocated in the western countries for the last two or three decades, but hardly
any worthwhile effort has been made till recently, particularly, in judicial administration of
courts in developing countries. There is an immediate need for exposing legal profession,
judicial fraternity and court management to the updated computerized technology so as to
render speedy justice with better legal outputs.
Extensive use of Information Technology by diverse organizations the world over has
resulted in enhanced efficiency, effectiveness and optimal use of resources. Computers as
well as electronic communication devices such as facsimile machines, electronic mail, video
conferencing, provide the ability to process large volumes of data with speed and accuracy,
exchange of useful information between different locations and support higher quality of
decision making. These capabilities have contributed to more efficient and responsive
systems not only in business organizations, but also in legal, governmental and other public
systems. While the Information Revolution arrived in Africa some years ago, automation has
not transformed all facets of life in equal measure. It has not permeated to the judiciary in
particular, resulting in old work methods based on manual systems being continued even
now. The enormous problems being faced by the judiciary due to arrears, backlog and delays
can be partly resolved by the introduction of automation in courts.
We have to keep in mind that we can not follow the developed countries blindly without
realizing the ground realities. We do not have sufficient funds to go for large-scale
computerization of courts. Therefore, we have to be realistic and proceed in a phased manner.
Optimal utilization of funds is required in this field as the justice delivery system is
answerable to the public at large.
The main components of computerization consist of procurement of hardware, choice of
operating system and development of software. All of them are highly capital intensive and
care has to be taken while making well informed choices.
3. 3
2. Hardware
2.1 Computers: There are three choices for type of computers which can be used for
computerization of Courts:
Personal Computers
Dumb Terminals
Thin Clients
Stand alone Personal Computer Systems [PCs] are the best choice for Courts instead of
Dumb Terminals [A terminal that doesn’t contain an internal micro processor. It responds to
simple control codes and usually displays only characters and numericals] or Thin Clients-
linked to main server [A computer system that provides information to other computers on a
network] through the network. The rationale of opting for PC system is to allow system to
perform the required task that is capability of storing sufficient amount of data and retrieval
of the same should be quick and instantly available as and when required for efficient
functioning of the Court.
Moreover, the Judges are hesitant to allow transfer of half-baked information to the servers
like judgments or orders, which have not been finalized. Similarly the data for daily use is
required to be kept in the computers of the individual Courts.
2.2 Local Area Network [LAN]: All the computer systems in a Court Complex are to be
linked to the servers by LAN [Local Area Network]. Optical Fiber Cable is best for fast
transfer of data.
2.3 Printers: Only one Printer can be provided on the table of the Stenographers for one
Court. The Record Clerk is required to take printout of the reports, cause list and other
documents at the Steno's end as all the computers are networked with each other.
2.4 Servers: The Server Room is the nerve centre of all activity as far as the computerization
is concerned. All the application softwares are loaded in the Servers. Two servers are
required for running a Computer System in a Court Complex:
◦ Application Server
◦ Data Server
Parallel servers are required for back-up purpose, so that in case of any disaster, Computer
System may be run from parallel servers.
2.5 UPS: Centralized UPS [Uninterrupted Power Supply] System can be used to power the
computer systems in case of electricity failure. One UPS of 10 KVA serves about 30
computer systems. These UPS are to be installed in secured ventilated rooms with proper
power supply and from those UPS rooms, power cables are to be laid to the user's ends in
respective Courtrooms.
2.6 Dedicated Leased Lines: The Court Complexes are to be connected to Headquarters by
using 2 MBPS leased lines. Enhanced speed as well as online connectivity is required for
4. 4
integration of the computerization process of all Courts into one centralized system from the
users’ point of view.
3. Operating System
Operating system is the software that determines how a computer operates, including such
things as file structure, input and output devices, printer routines and screen manipulations.
When the question regarding selection of the - operating system comes up, then we have two
choices:
Proprietary based Operating Systems like Windows, Mac etc.
Free Open Source Operating Systems like Linux, Ubuntu etc.
After considering the pros and cons of both types of operating systems, it can be safely said
that LINUX based operating system is best suited for courts computerization. The main
reason for selecting this operating system is that it is cost effective and is open platform
software. As and when future upgrades are required, the same are available either free of cost
on the Internet or at a negligible cost. The other reason to go for LINUX based system is that
it is almost virus free.
4. Customized Software
The heart of computerization of Court is the customized software which can be developed
under the guidance and supervision of a Software Development Committee of the Court. The
Judges and the Court Staff can give their valuable inputs to software developers to make
them aware of the work flow type of registers/ forms/ data/ summons/warrants etc. being
maintained and the reports being generated in the Courts. Requirements can be analyzed and
in accordance with the said requirements specific Softwares can be developed.
After a test run and approval of the Software Development Committee, the software modules
are to be integrated in the main Case Information Management System (CIMS).
The Courts are governed under the Court Rules, Acts and a number of other legislations,
customary laws and rules passed from time to time. Entire working is quite complex to
understand by a layman who may be a programmer but without having any legal background.
Software programmers are to be taught step by step the complex processes before they may
venture into the development of the appropriate customized software modules. These
software modules are to be standardized and authorization is to be given to integrate them in
the master software known as CIMS.
5. Application of ICT
The main Court processes, which can be computerized and put into practice, are categorized
as under:
(i) Creation of database of all the pending cases – In every Court, there is huge back log of
cases. Every year thousands of cases are filed and disposed of. It is a mammoth task to enter
5. 5
the details of all the pending cases into the computer system. It is possible by dividing the
data entry into three stages.
At that initial stage, the staff is required to enter only the case name, type of the case and
other minor details so that unique ID (Identity Number) of the case is created and a slot is
reserved for the case in the CMIS. In the second stage, complete names, addresses and other
particulars of the parties to the cases are to be entered. In the third stage, the list of witnesses
and all other remaining fields will be entered.
(ii) Automatic generation of Cause Lists After computerization, the database is upgraded
on daily basis by the Record Keepers so, as and when required, Cause List for any working
day can be generated at the press of the button. It saves time, efforts and energy on the part of
Record Keepers who will become more efficient after introduction of the automatic
generation of Cause List. The said Cause Lists are also available on the Internet in advance,
so that lawyers and litigants can plan and schedule their visits to the Courts accordingly.
(iii) Automatic generation of Monthly Statements - As mentioned earlier, the entire
database is available on computers; the Monthly Statement is generated only on the press of a
button, resulting in saving of time and energy. The response time is reduced to the bare
minimum.
The said statements can be generated for a week, fortnight or on monthly basis, which helps
in planning by the Judges to maximize the disposal.
(iv) Generation of reports in response to Legislature questions- Sometimes
House of Legislature questions are received regarding number of cases of a particular type
pending in the Courts, the age of the cases or the Courts in which the said cases are pending.
All these details can be sorted out on the basis of the inquiry and reports can be generated
and dispatched in the least possible time only because of availability of the entire data on the
Servers.
(v) Centralized Filing - Prior to computerization, the filing is scattered in different Courts
causing great inconvenience to the Lawyers and the public at large. Nobody is sure about the
place where he had to do the filing. After computerization, special Counters known as
“Facilitation Centers” can be set up in all Court Complexes where the entire filing for the
Courts can be done.
As soon as a matter is filed, it is given a unique number. The said number will remain
permanent for the life of the case irrespective of the fact that the case is transferred from one
Court to the other. Even after final disposal, the case file can be easily traced from the
Record Room on the basis of this number.
With the introduction of permanent case numbers, one can easily trace his case by making
query on the internet or by visiting the Information Counters where Public Relation Officers
can be appointed to assist the general public and the Lawyers for answering their specific
queries regarding the allocation, transfer and pendency of cases and their present status.
6. 6
(vi) Automatic allocation of cases – After filing of cases at the Central Registry, computer
sorts them on the basis of set norms like jurisdiction of a particular Police Station, pendency
status in the respective Courts, specific allocation of cases to designated Courts and other
per-determined parameters and the cases are automatically allocated to the Courts. The
lawyers/litigants are informed in the least possible time about the allocation of the cases filed
by them. This system operates without any intervention by the officials manning the Filing
Counters, so the chances of manipulation in allocation of cases are ruled out.
(vii) Transfer of the physical case file and the data to the Allocated Court - After
allocation, data captured in the Central Registry is transferred to the alloacated Court through
Central Server. Once the case reaches the concerned court, the Record Keepers makes the
second and third stage entries, i.e., he completes names and addresses of the parties and
witnesses in the computer system along-with the next date of hearing as fixed by the learned
Judge. So by the end of the day, the entire details of the cases filed during the course of the
day reach the Central Server and the said data can be used for any pre-defined purpose.
(viii) Grouping of cases – The grouping of similar types of cases can be done within few
minutes because the entire data regarding the nature of cases, their respective age, special
characteristics, nature of offences, age of the accused, place of residence of the parties and
other unique identities are available in the data bank.
(ix) Automation of the Process Serving Agency – A major bottleneck in speedy disposal of
cases is the long time taken by process serving agency in serving the summons of the case.
The Process Serving Agency follows the practices adopted about one century ago, which
needs to be updated. The summonses are to be entered in the Computerized Registers on
receipt from respective Courts. The said Program automatically allocates the summons to the
next Process Server in line and the summonses are accordingly distributed area-wise to the
Process Servers by the computer. After such distribution, the progress regarding service of
summons is noted on day-to-day basis in the form of Daily Reports to be submitted by the
said Process Servers.
The Record Keepers of the Courts can have the facility to check at the end of the day as to
how many summons issued by their respective Courts can be served and how many of them
are still pending.
(x) Implementation of the Financial Accounting Package - The Accounts and Cash
Branch can be fully automated. Payment of Salaries to the Judges and the Staff is taken care
of by the System. The fines collected in the Courts, fees collected in the Copying Agency and
other Branches can be monitored by the Accounts and Cash Branch on real time basis and
remedial actions are taken as and when required. It will minimize the risk of financial
irregularities because the details are available online and any deliberate deviations can be
pin-pointed well within time.
(xi) Automated Attendance Marking System - The Courts can opt for modern
Automated Attendance Marking System based upon Advanced Smart Card Technology. A
Micro Chip of 1 KB capacity is embedded in every Smart Card, which contains all the details
7. 7
regarding a particular employee along-with his photograph and designation etc. The
attendance can be marked on the Automatic Contactless Terminals provided at the entry
points of Court Complexes. To mark the attendance, the Card is to be swiped before the
Machine and a finger print is taken within seconds. The problem regarding late coming and
leaving the Court early stands resolved by installing this system.
The Attendance software is duly integrated with the Salary Preparation System and it takes
care of leaves availed by the said employees. Different reports based upon the information
captured through the system can be generated. The entire information collected from the
Court Complexes regarding attendance is combined in one database, which can be accessed
even from the web browser.
(xii) Digitization of Disposed Records - The disposed files take a lot of space to store, so
the same can be digitized instead of maintaining them in physical form for decades together.
A lot of space can be made available for other important purposes after digitization of the
records and there is no danger of any fire, termites or other natural calamities, which may
destroy the record. Proper backups are being kept at different places so that the data is not
lost in case of any disaster.
(xiii) Computerization of Judges’ Libraries - The Judges’ Libraries in the Court
Complexes have hundreds of thousands of books, which can be affixed with Bar Code Tags.
On the intra-net, the judgments of the Higher Courts are provided so that Judges may access
them from their computers installed in the chambers. The said judgments can also be
accessed from terminals installed in Courts so that the Judges have the ease of looking for a
particular law point and use the same as and when required. E-law Journals with huge
databases can be provided in Computers installed in Judges' Libraries and CDs can be given
to Judges for law reference and research purposes.
(xiv) Provision of two TFT LCD Screens on the Dias – Two TFT/LCD 15'' Screens can
be provided on the Dias which are connected to the computers of the Stenos. One TFT
Screen is facing the Lawyers and Litigants and they can read the evidence being typed by the
Steno on the dictation of the Judge. The Judges are also able to keep a watch on the evidence
being recorded by Stenos under their dictation and they are further able to go through the
transcripts of the judgments typed out by the Stenos. Necessary corrections can be made
there and then so that the judgments are announced on time, without any delay and mistakes.
(xv) Provision of Computers in the Chambers of the Judges – Judges can be provided
with computer systems in their chambers so that they are able to use them as and when they
are free. He/She can transfer the files from his Court Room to his residential Computer
Systems by using the secured E-mail facility. Judges may make necessary corrections in the
judgments in the comfort of their homes and thereafter the said judgments can be transmitted
to Courts by using the secured E-mail.
(xvi) Computerization of Copying Agency - Since all the orders and judgments will be
available on the intra-net, so there will be no need for typing or photocopying the orders in
8. 8
the Copying Agency. The required orders can be downloaded and printed in the Copying
Agency, properly authenticated and delivered to the applicants in the minimum possible time.
(xvii) Secured E-Mail Facility - E-Mail facility can be provided to all the Judges and Courts
with the commissioning of dedicated E-Mail Server for district judiciary. The Judges are able
to transfer the drafts of the judgments/orders from Courts to their residences by using the
secured e-mail facility and vice-versa. All the circulars are also e-mailed to the Judges.
Courts can be able to cut cost of paper printing and labor by use of e-mail facility.
(xviii) Automatic Personnel Information System - Prior to computerization, it is very
difficult to keep track of the postings of the staff members. A Personnel Information System
(PIS) can be put in place. All the details and particulars of the employees along-with their
postings can be entered into the system and the said software generates the reports on the set
parameters and indicates the names of the Court Officials who are due for their transfers after
serving for a particular number of years in their present postings. The said PIS System also
takes care of the Annual Confidential Reports, Provident Fund Entries and Service Book
Entries. It signals well in time the steps to be taken in respect of the Court Officials who are
going to retire in near future. It helps in proper management of the staff, which is a valuable
asset for the Courts.
(xix) Stores Management - Every year, the Courts purchase huge quantity of durables and
consumables. A proper Stores Management System can be put in place with computerization
of the Courts. It indicates well in time the store items, which need replenishment,
monthly/weekly consumption pattern of different types of stores and the budgeted and actual
expense on a particular store item. It helps in planning the future budget for purchase of the
store items and proper inventories are maintained.
(xx) Automatic Generation of Summons and Warrants etc.- After the introduction of
computerization, the summons to the witnesses and Notices to the parties, Production
Warrants, Bailable and Non Bailable Warrants, Release Warrants and custody warrants etc.
can be generated by using the Computer System. The Record Keepers selects the serial
number of witness to be summoned on the screen of the monitor and thereafter, the summons
is automatically generated showing the next date of hearing, time of appearance and the
purpose for which the summons/warrant can be issued. It saves a lot of time for the Record
Keepers and the summonses are generated in a legible format, which can be duly acted upon
by the concerned authorities.
(xxi) Introduction of Digital Signatures - Digital signatures can be provided to the Judges
and the Court officials. After pronouncing the judgments, the same can be digitally signed
and transmitted in a secured environment to the intended recipients. The benefit of digitally
signing a document is that a third party will not be able to make alteration in the contents of
the document and the intended receiver on receipt can verify whether the transmitted
document can be in its original format or not. Successful experiments can be made to
transmit the bail orders to the jail complexes from Courts by using the digital signatures.
9. 9
(xxii) Video Conferencing – There is an urgent need to establish Video conferencing
Studios in all the Court Complexes to enable Video Conferencing between Courts and Jails
as well as between Courts and Witnesses, who are living at far flung places and are unable to
come to Court to attend the hearings. The cases can be expeditiously heard by use of video
conferencing facility.
(xxiii) Direct Connectivity with Police, Hospitals and Jails - Direct connectivity with
different Police Stations is to be established so that copies of FIR can be sent using E-mail
and other electronic facilities to the concerned Judges. The summons of police witnesses can
be also issued using electronic communication. This way, the wastage of Court time in
summoning the police officials can be minimized and disposal rate will certainly increase.
Similarly, direct access to the data banks of different hospitals is needed as the Medico Legal
Cases requiring opinion in respect of nature of injuries, the availability of the doctors to
depose in Courts and opinion of the experts take a long time to reach the Court.
Courts need direct access to the Computer Systems of the Jail Authorities to ascertain the
status of under-trials as on number of occasions, the under trials are not produced due to one
reason or the other. The bail orders can also be transmitted electronically to Jail by e-mail in
secured environment using digital signatures.
(xxiv) Interactive Voice Response System - In developing countries, the penetration of
computers is very low. Although most of the lawyers now have computers and Internet
facility but most of the litigants do not have these facilities available to them. To provide
instant information to them, the District Court can introduce Interactive Voice Response
System by providing dedicated telephone numbers for inquiry. The litigants can dial these
numbers and a machine voice will guide them to make appropriate choices regarding Court
Complexes, type and number of Court, details of the case and then the present status of the
case will be intimated to him. The details provided are the next date of hearing and the
purpose for which the case is listed.
(xxv) SMS Inquiry Facility for Lawyers/Litigants – The lawyers, who register for e-filing,
will also be provided facility of automatic SMS intimating them the next date of hearing and
purpose for which their cases can be adjourned. The litigants and other lawyers can send in
their queries at a given number by SMS and the latest details of their cases will be sent back
to them by SMS. It will save frequent visits to Courts by the lawyers, their staff and litigants
to know the present status of their cases.
(xxvi) E-filing - The next big step is E-filing. Infrastructure to allow the Lawyers to file civil
cases in electronic form can be put in place. The availability of the electronic copies of
arguments and pleading in the system improves the efficiency of the Case Information
Management System (CIMS), as there will not be any need to type in the details mentioned
in the said cases and the summonses can be generated and dispatched to the parties by E-
mail and fax by enclosing the copies of the petition and documents available in electronic
form.
10. 10
(xxvii) Courts Website - The Court Website can be a very useful step to facilitate justice
system. It can provide the Judges, Lawyers, litigants and the general public a lot of facilities.
Some of the proposed facilities can be:
(a) Introduction - The brief background of the Court complexes can be given. Specific
Courts housed in the said Court complexes can be detailed and direct links can be
provided to the said Courts. Introduction of the sitting Judges can be provided.
(b) Jurisdiction - The jurisdiction of different types of Courts situated in Courts can be
given. The Court numbers, names of the Judges, their respective jurisdictions, specific
room numbers and their place of sitting can be listed.
(c) General Information - General information regarding types of cases, place of filing,
requisite documents to be filed along-with specific types of petitions, necessary Court
Fees to be affixed etc. can be provided in the General Information Section.
(d) Important Links - Links can be provided to important legal Websites available on
the internet.
(e) Tender/Bids - All the tenders and bids issued by the Courts can be uploaded on the
internet so that interested vendors may submit their competitive quotations and the
purchases can be made in an open and fair manner.
(f) Daily Cause List - Cause Lists of the Court can be uploaded a day in advance on the
inter-net. Lawyers and litigants can plan their visit to the respective Court Rooms on the
basis of the information provided in the Cause Lists and it helps in reducing the rush in
the Court in the morning hours.
(g) Bare Acts - Bare Acts, which are necessary for running the Courts on day to day basis
can be provided with direct links so that as and when required, a particular bare Act may
be accessed and relevant section may be extracted, copied, saved or printed.
(h) Pleading Forms - Most of the pleading forms used for filing in the Courts can be
listed and their specimen formats can be provided on the Website so that Lawyers and
litigants are able to use the said forms for drafting pleadings.
(i) Daily Orders- All the day-to-day orders passed by the Courts can be uploaded in
secured PDF format on the same day so that lawyers/litigants are able to access them by
the evening. The orders can be searched by name of the Judge and specific date of the
said order.
(j) Courts Judgments - Judgments pronounced by Courts can be uploaded on the
Internet in secured PDF format so that the lawyers and litigants are able to access the said
judgments and there is no need to come to Court for their copies as prints can be directly
taken from the Website. It reduces the work load of the Copying Agency and the visits of
11. 11
the public and the lawyers to the Court complexes. Care is to be taken not to upload the
judgments matters of sensitive nature.
(k) Case Status - Any litigant can check the case status on the Internet by entering the
name of any of the party/case number/Court Number/Name of Judge. Free text search can
be also available. One can check the case status even by entering the type of case if he is
not sure of any of the above parameters. It reduces the crowds in Court Rooms where
litigants/lawyers and their clerks visit only for enquiring the purpose for which the case is
fixed on the next date of hearing.
(l) Certified Copy Status - The certified copy status of the applications filed in the Court
Complexes is available on the internet. If the copy is ready, the party can visit the
Copying Agency and collect the same. If the copy is not ready then the probable date
when the copy will be ready is automatically displayed and there is no need to visit
Copying Agency only for the purpose of noting down the next date when the copy will be
ready.
(m) On Line Inquiry Facility - To reduce the rush in the Courts, an on-line enquiry
facility can be provided on the Website. Litigants/lawyers can submit their queries, which
are answered on-line in least possible time. The inquiries can be related to any matter
concerning their cases pending in Courts.
(n) Statistics- The periodical pendency statements in respect of all types of cases are also
published on the Website, which are quite helpful to understand the trend of disposal of
cases.
(o) Minute to minute progress of Cause List on Internet - Minute to minute progress
of the Cause Lists of the Courts can be provided, so that the lawyers and litigants can
know whether their cases can be adjourned or their matters are still pending and they can
attend the same.
6. Conclusion: These are some of the areas where ICT applications can be successfully tried
in Courts. E-Courts are a reality and sooner we realize their utility, it is better for the society
and the country. E-Court Systems are a bit costly but the benefits offset the costs in the
longer run.