The document discusses the computerization of District Courts of Delhi. It outlines the challenges faced in implementing ICT systems, as well as the strategies and solutions adopted. Key points include:
1) Over 471,000 cases were pending computerization across civil and criminal matters. All case details were entered manually by court staff without external help.
2) Linux-based systems were implemented as they are cost-effective and allow for free/low-cost upgrades. Hardware including PCs, servers, and UPS systems were installed across three court complexes.
3) Customized software was developed with input from judges and staff to automate processes like cause lists, monthly statements, and case reports. This streamlined
1) Delhi District Courts have rapidly adopted technology over the past decade, transitioning from one typewriter per court to courts now equipped with multiple computers, screens, printers, and other digital tools.
2) The computerization of Delhi District Courts began in 2003 and has expanded significantly since, with over 1,500 computers and 600 printers now installed across courts.
3) The courts have implemented and plan to further implement various digital initiatives like digitizing records, introducing digital signatures, upgrading websites, installing CCTV, implementing biometric attendance tracking, and moving towards e-filing and paperless courts.
Impact Of ICT on Justice Delivery SystemTalwant Singh
1) The document discusses the impact of information and communications technology (ICT) on the justice delivery system in Delhi, India. ICT has been implemented in Delhi courts to streamline processes, increase efficiency, and provide transparency.
2) Key ICT applications implemented include case management systems, digital court records, video conferencing, and public interfaces to access case status, orders, and judgments online.
3) Future plans include expanding ICT to all court complexes, direct connectivity between courts and other agencies, and further digitization of processes like e-filing and biometric identification.
The document discusses the e-courts projects in India, USA, Australia, and UAE. It provides details on the implementation of various online services in their judicial systems like e-filing of cases, online case status tracking, digital case management tools for judges and lawyers, online payment of fees, and video conferencing for court proceedings. The key objectives of these e-courts projects are to improve efficiency of the judicial system, enhance access to justice, and enable monitoring of pending cases. Websites and portals have been developed to provide these online services to citizens, legal practitioners and courts.
ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018Talwant Singh
The document discusses the implementation of information and communication technology (ICT) in the Indian judiciary to modernize the legal system. It outlines several key components of developing "e-judiciary" including case information systems, digitization of records, e-courts, e-filing, and other e-services. The goals are to reduce paperwork, improve efficiency of case processing, enable online access to court documents and services, and address issues like pending backlogs and delays in the current system. While progress has been made in establishing the first paperless e-courts in India, the document acknowledges there is still work remaining to fully realize the vision of modernizing the judiciary through ICT.
This document summarizes key points about electronic evidence in India from a presentation given by Adv. Prashant Mali. It discusses a case where electronic evidence was relied upon to convict someone of a crime. It also outlines the conditions for admissibility of electronic records as evidence under Section 65-B of Indian law. Additionally, it discusses various forensic labs where electronic records can be examined, precedents around email and call records as evidence, and requirements for electronic records from banks to be admitted as evidence.
This document discusses cyber law and cyber crimes in India. It provides definitions of cybercrime in both a narrow sense relating to computer crimes and a broader sense relating to computer-related crimes. It outlines some key sections of the Information Technology Act 2000 relating to penalties for offenses such as unauthorized access to computers, computer contamination, and tampering with computer source documents. It also provides case studies related to each section, such as cases involving fraudulent access to bank accounts and manipulation of cell phone codes.
This document discusses digital and electronic evidence under Indian law. It begins by defining key terms like electronic record, data, and the legal recognition of electronic records under the Information Technology Act. It then discusses topics like the admissibility of electronic records and computer printouts as evidence, retention of electronic records, email as evidence, and important case laws related to call detail records, CDs/DVDs, IP addresses, and the need for certificates under Section 65B of the Indian Evidence Act. It provides guidance on when a certificate is or is not needed and clarifies that original electronic records need not be preserved.
The document discusses amendments made to Sections 59 and 65B of the Indian Evidence Act regarding electronic records and electronic evidence.
Section 65B provides that electronic records, if printed or stored on a device, can be considered documents if certain conditions are met. This includes the computer regularly processing information and the electronic record being an accurate reproduction of the information entered.
The document also discusses court cases related to electronic evidence and the need for a certificate under Section 65B to authenticate electronic records in order to admit them as evidence in court proceedings. Failure to provide such a certificate can result in electronic evidence like audio/video recordings being inadmissible.
1) Delhi District Courts have rapidly adopted technology over the past decade, transitioning from one typewriter per court to courts now equipped with multiple computers, screens, printers, and other digital tools.
2) The computerization of Delhi District Courts began in 2003 and has expanded significantly since, with over 1,500 computers and 600 printers now installed across courts.
3) The courts have implemented and plan to further implement various digital initiatives like digitizing records, introducing digital signatures, upgrading websites, installing CCTV, implementing biometric attendance tracking, and moving towards e-filing and paperless courts.
Impact Of ICT on Justice Delivery SystemTalwant Singh
1) The document discusses the impact of information and communications technology (ICT) on the justice delivery system in Delhi, India. ICT has been implemented in Delhi courts to streamline processes, increase efficiency, and provide transparency.
2) Key ICT applications implemented include case management systems, digital court records, video conferencing, and public interfaces to access case status, orders, and judgments online.
3) Future plans include expanding ICT to all court complexes, direct connectivity between courts and other agencies, and further digitization of processes like e-filing and biometric identification.
The document discusses the e-courts projects in India, USA, Australia, and UAE. It provides details on the implementation of various online services in their judicial systems like e-filing of cases, online case status tracking, digital case management tools for judges and lawyers, online payment of fees, and video conferencing for court proceedings. The key objectives of these e-courts projects are to improve efficiency of the judicial system, enhance access to justice, and enable monitoring of pending cases. Websites and portals have been developed to provide these online services to citizens, legal practitioners and courts.
ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018Talwant Singh
The document discusses the implementation of information and communication technology (ICT) in the Indian judiciary to modernize the legal system. It outlines several key components of developing "e-judiciary" including case information systems, digitization of records, e-courts, e-filing, and other e-services. The goals are to reduce paperwork, improve efficiency of case processing, enable online access to court documents and services, and address issues like pending backlogs and delays in the current system. While progress has been made in establishing the first paperless e-courts in India, the document acknowledges there is still work remaining to fully realize the vision of modernizing the judiciary through ICT.
This document summarizes key points about electronic evidence in India from a presentation given by Adv. Prashant Mali. It discusses a case where electronic evidence was relied upon to convict someone of a crime. It also outlines the conditions for admissibility of electronic records as evidence under Section 65-B of Indian law. Additionally, it discusses various forensic labs where electronic records can be examined, precedents around email and call records as evidence, and requirements for electronic records from banks to be admitted as evidence.
This document discusses cyber law and cyber crimes in India. It provides definitions of cybercrime in both a narrow sense relating to computer crimes and a broader sense relating to computer-related crimes. It outlines some key sections of the Information Technology Act 2000 relating to penalties for offenses such as unauthorized access to computers, computer contamination, and tampering with computer source documents. It also provides case studies related to each section, such as cases involving fraudulent access to bank accounts and manipulation of cell phone codes.
This document discusses digital and electronic evidence under Indian law. It begins by defining key terms like electronic record, data, and the legal recognition of electronic records under the Information Technology Act. It then discusses topics like the admissibility of electronic records and computer printouts as evidence, retention of electronic records, email as evidence, and important case laws related to call detail records, CDs/DVDs, IP addresses, and the need for certificates under Section 65B of the Indian Evidence Act. It provides guidance on when a certificate is or is not needed and clarifies that original electronic records need not be preserved.
The document discusses amendments made to Sections 59 and 65B of the Indian Evidence Act regarding electronic records and electronic evidence.
Section 65B provides that electronic records, if printed or stored on a device, can be considered documents if certain conditions are met. This includes the computer regularly processing information and the electronic record being an accurate reproduction of the information entered.
The document also discusses court cases related to electronic evidence and the need for a certificate under Section 65B to authenticate electronic records in order to admit them as evidence in court proceedings. Failure to provide such a certificate can result in electronic evidence like audio/video recordings being inadmissible.
This document provides an overview of cyber security laws and guidelines in India under the Information Technology Act 2000. It discusses the motivation for having cyber security legislation, common cyber crimes, and ensures technology is used legally and ethically. The key learning objective is for participants to understand the adequate laws in place in India to deal with cyber security offenses. It covers various cyber crimes and offenses defined under the IT Act, including hacking, data theft, computer tampering. Sections 43, 65, and 66 which deal with penalties for computer damage, tampering with source code, and computer related offenses are explained in detail through case studies. The size and future of cyber crimes in India is also highlighted.
This document summarizes key sections of the Information Technology Act 2000 of India related to cyber crimes and offenses. It provides:
1) An overview of cyber crimes and how they are defined in a narrow and broader sense under the IT Act.
2) Summaries of specific sections of the IT Act that outline penalties for offenses such as unauthorized access to computers, computer contamination, tampering with computer source documents, and transmitting offensive content.
3) Descriptions of relevant case studies that demonstrate how various sections of the IT Act have been applied and interpreted in court rulings related to cyber crimes.
IRJET- E-Voting System for Election using Fingerprint and Aadhar NumberIRJET Journal
This document proposes an online voting system for Indian elections that uses fingerprint and Aadhar number for authentication. It aims to increase security and voting percentages while reducing costs. The system would allow voters to verify their votes were cast correctly. It discusses issues with existing paper and EVM systems like tampering and a lack of verification. The proposed system has modules for voter registration using biometrics, authentication at voting time, casting and recording votes, and counting votes. It aims to provide a secure, practical online solution to address current problems with Indian election processes.
The document outlines 9 things that are prohibited under Indian cyber law. It discusses laws around unauthorized copying of files, downloading copyrighted content, copying website information for financial gain, improperly forwarding work emails, impersonating others online to commit fraud, intentionally spreading viruses, damaging computers or networks, deleting or modifying files without permission, and stealing source code or proprietary software. Violations can result in fines and imprisonment of up to 3 years under Sections 43 and 66 of the Indian Penal Code.
The document outlines major types of cyber crimes such as data diddling, Trojan horse attacks, and computer viruses. It then discusses methods to minimize cyber crimes like using strong passwords and security software. The document mainly focuses on India's Information Technology Act of 2000 which aims to provide legal recognition for electronic transactions. The key aspects of the Act include digital signatures, duties of certifying authorities, penalties for cyber crimes, and establishment of organizations to regulate the cyber space.
The document outlines major types of cyber crimes such as data diddling, Trojan horse attacks, and computer viruses. It then discusses methods to minimize cyber crimes like using strong passwords and scanning for viruses. The document primarily focuses on India's Information Technology Act of 2000 which aims to provide legal recognition for electronic transactions. The key aspects of the Act include provisions around digital signatures, certifying authorities, digital signature certificates, and penalties for cyber crimes. Adjudicating officers and the Cyber Appellate Tribunal are established to investigate offenses and hear appeals.
The document discusses the objectives and key provisions of the Information Technology Act, 2000 in India. The key points are:
1) The Act aims to provide legal recognition for electronic commerce and electronic records on par with paper documents. It also aims to facilitate e-governance and electronic filing of documents.
2) The Act defines important terms related to digital infrastructure and transactions. It also establishes authorities like the Controller of Certifying Authorities to regulate digital signature certificates.
3) The Act addresses issues like legal recognition of electronic documents and digital signatures to support e-commerce. It also establishes mechanisms for offenses and justice systems related to cybercrimes.
The document summarizes key sections of the Information Technology Act, 2000 related to cyber security in India. It discusses sections establishing protected computer systems, designating agencies responsible for critical infrastructure protection and incident response, penalties for various cyber crimes, and intermediary liability exemptions. The sections establish national agencies to coordinate cyber security, empower agencies to investigate offenses, and outline penalties including imprisonment and fines for offenses like unauthorized access, privacy breaches, and publishing false digital signatures.
Neeraj aarora cyber_lawyer_current trends in cyber crime scenarioNeeraj Aarora
This document discusses cyber crimes and the Indian legal framework around them. It covers common cyber crimes like phishing, data theft, and cyber stalking. It then outlines relevant sections of the Information Technology Act 2000 regarding unauthorized access, identity theft, cyber terrorism and more. The document also discusses challenges like transnational nature of cyber crimes and lack of deterrent punishment. It analyzes cases related to admissibility of electronic records and emails as evidence in court. Overall, the document provides an overview of cyber crimes and Indian laws pertaining to their prevention and prosecution.
Appreciation of Electronic Evidence-PDFTalwant Singh
The document discusses electronic evidence or e-evidence. It defines e-evidence as any probative information stored or transmitted digitally that may be used in court. It notes that courts must determine if e-evidence is relevant, authentic, and not hearsay, and if the original is required. Common forms of e-evidence include emails, photos, records, documents and files. Indian law has been updated to recognize e-evidence, including provisions for admissibility and authentication of digital records. Courts have accepted various forms of e-evidence in several cases.
The Information Technology Act, 2000 provides the legal framework for electronic governance in India. Some key points covered in the act include:
- Legal recognition of electronic records and digital signatures.
- Regulation of certifying authorities that issue digital signature certificates.
- Establishment of the Cyber Appellate Tribunal to hear appeals related to the act.
- Offences and penalties related to cyber crimes like hacking and publishing obscene content.
- Procedures for adjudicating violations and determining appropriate penalties.
This document provides an overview of electronic evidence and its admissibility in Indian courts. It discusses the types of computer-generated evidence, the foundations for authenticating digital evidence, relevant sections of the Indian Evidence Act, and several key Supreme Court judgments related to electronic evidence. The document establishes that electronic records can be admitted as evidence if the requirements of Section 65B of the Evidence Act are met, including proving the integrity of the data, hardware/software, and security of the system used.
What does chapter 9 of IT Act, 2000, "Penalties & Adjudication" cover? [#24]Kamal Thakur
This document outlines penalties under Indian law for various cybercrimes and offenses related to unauthorized access and damage to computers and networks. It discusses 5 major points: 1) Penalties for damaging computers or introducing viruses without permission, up to 1 crore rupees. 2) Penalties for failing to provide information to authorities, up to 1.5 lakh rupees. 3) A general residual penalty up to 25,000 rupees for violating rules. 4) The process for adjudicating violations and imposing penalties or compensation. 5) Factors adjudicating officers must consider like any unfair gains or losses caused.
The document outlines guidelines for online service delivery through the eDistrict project in Kerala. Key responsibilities are defined for various roles including:
- District Collector oversees service delivery and is responsible for policy compliance, reviewing reports, addressing grievances.
- Tahsildars and Village Officers are responsible for administering services at local levels, processing requests according to SLA, and maintaining IT infrastructure.
- Village Assistants perform physical verification of requests and upload information to the eDistrict application.
All roles must adhere to security, integrity and record keeping guidelines to ensure accurate and transparent online service delivery.
This document summarizes key aspects of India's Information Technology Act, including:
1) It defines digital signatures and electronic signatures, and outlines requirements for their use in authentication.
2) It establishes rules for electronic governance, electronic records, controllers who regulate certifying authorities, and adjudication of related offenses and compensation.
3) The case study discusses how information was retrieved from laptops of terrorists involved in a Parliament attack case, which revealed their motives and allowed for punishment under the law.
The document discusses the Information Technology Act of 2000 in India. It was passed to promote e-commerce and regulate electronic transactions. Some key points:
- The Act provides legal recognition for digital signatures and electronic documents to facilitate online transactions and e-governance.
- It established regulatory authorities for certifying digital signature certificates and created provisions to prevent cybercrimes like hacking and publishing of obscene content online.
- Major amendments in 2008 introduced concepts of electronic signatures beyond digital signatures, data protection responsibilities for companies, and new cybercrimes under the Act.
E-contracts have several advantages over paper contracts such as faster communication, lack of paper, and reduced delays. Indian law does not have exclusive legislation on e-contracts but the Indian Contract Act of 1872 and the Information Technology Act of 2000 govern their validity. The IT Act recognizes the legal validity of e-contracts and digital signatures and outlines provisions regarding attribution, acknowledgment of receipt, and time and place of dispatch and receipt of electronic records and e-contracts. Court cases have also helped establish principles for jurisdiction related to e-contracts.
The document discusses how information technology and the Information Technology Act of 2000 have led to both benefits and risks in India. It provides an overview of the key aspects of the Act, including its provisions, objectives, and amendments. While IT has enhanced banking services and e-governance, it has also enabled new forms of cybercrime such as hacking, financial fraud, and dissemination of illegal/obscene materials online. The document examines examples of cybercrimes and NASSCOM's initiatives to address related issues while calling for continued efforts to update laws and increase cybersecurity awareness.
The document provides an overview of the Information Technology Act 2000 in India. Some key points:
- The Act was enacted in 2000 to provide legal recognition to electronic records and digital signatures. It is based on the UNCITRAL Model Law on E-Commerce.
- The objectives are to facilitate electronic governance and commerce. It defines electronic records, digital signatures, secure systems, etc. and recognizes their legal validity.
- It applies to the whole of India and any offenses committed outside India involving computers in India. Various cybercrimes are punishable under the Act.
- It establishes provisions for public key infrastructure, digital signature certificates, duties of subscribers, and regulates certifying authorities to facilitate
The document discusses the causes of delays in the Indian justice system and analyzes statistics on pending cases. It notes that as of 2009, there were over 53,000 pending cases in the Supreme Court, over 40 lakh in High Courts, and over 2.7 crore in lower courts. Some of the key reasons identified for delays include unclear laws, non-appearance of witnesses, granting of unnecessary adjournments, lack of infrastructure resources, and vacancies in judicial positions. Various reforms are proposed, such as introducing e-courts and information technology, establishing specialized and fast-track courts, increasing the jurisdiction of small claims courts, and recruiting more judges.
Logs & The Law: What is Admissible in Court?loglogic
What is the role of Log Data in legal cases, such as a database security breach? Learn how logs are used, best legal practices, logs as evidence, and what architecture and solutions can help.
This document provides an overview of cyber security laws and guidelines in India under the Information Technology Act 2000. It discusses the motivation for having cyber security legislation, common cyber crimes, and ensures technology is used legally and ethically. The key learning objective is for participants to understand the adequate laws in place in India to deal with cyber security offenses. It covers various cyber crimes and offenses defined under the IT Act, including hacking, data theft, computer tampering. Sections 43, 65, and 66 which deal with penalties for computer damage, tampering with source code, and computer related offenses are explained in detail through case studies. The size and future of cyber crimes in India is also highlighted.
This document summarizes key sections of the Information Technology Act 2000 of India related to cyber crimes and offenses. It provides:
1) An overview of cyber crimes and how they are defined in a narrow and broader sense under the IT Act.
2) Summaries of specific sections of the IT Act that outline penalties for offenses such as unauthorized access to computers, computer contamination, tampering with computer source documents, and transmitting offensive content.
3) Descriptions of relevant case studies that demonstrate how various sections of the IT Act have been applied and interpreted in court rulings related to cyber crimes.
IRJET- E-Voting System for Election using Fingerprint and Aadhar NumberIRJET Journal
This document proposes an online voting system for Indian elections that uses fingerprint and Aadhar number for authentication. It aims to increase security and voting percentages while reducing costs. The system would allow voters to verify their votes were cast correctly. It discusses issues with existing paper and EVM systems like tampering and a lack of verification. The proposed system has modules for voter registration using biometrics, authentication at voting time, casting and recording votes, and counting votes. It aims to provide a secure, practical online solution to address current problems with Indian election processes.
The document outlines 9 things that are prohibited under Indian cyber law. It discusses laws around unauthorized copying of files, downloading copyrighted content, copying website information for financial gain, improperly forwarding work emails, impersonating others online to commit fraud, intentionally spreading viruses, damaging computers or networks, deleting or modifying files without permission, and stealing source code or proprietary software. Violations can result in fines and imprisonment of up to 3 years under Sections 43 and 66 of the Indian Penal Code.
The document outlines major types of cyber crimes such as data diddling, Trojan horse attacks, and computer viruses. It then discusses methods to minimize cyber crimes like using strong passwords and security software. The document mainly focuses on India's Information Technology Act of 2000 which aims to provide legal recognition for electronic transactions. The key aspects of the Act include digital signatures, duties of certifying authorities, penalties for cyber crimes, and establishment of organizations to regulate the cyber space.
The document outlines major types of cyber crimes such as data diddling, Trojan horse attacks, and computer viruses. It then discusses methods to minimize cyber crimes like using strong passwords and scanning for viruses. The document primarily focuses on India's Information Technology Act of 2000 which aims to provide legal recognition for electronic transactions. The key aspects of the Act include provisions around digital signatures, certifying authorities, digital signature certificates, and penalties for cyber crimes. Adjudicating officers and the Cyber Appellate Tribunal are established to investigate offenses and hear appeals.
The document discusses the objectives and key provisions of the Information Technology Act, 2000 in India. The key points are:
1) The Act aims to provide legal recognition for electronic commerce and electronic records on par with paper documents. It also aims to facilitate e-governance and electronic filing of documents.
2) The Act defines important terms related to digital infrastructure and transactions. It also establishes authorities like the Controller of Certifying Authorities to regulate digital signature certificates.
3) The Act addresses issues like legal recognition of electronic documents and digital signatures to support e-commerce. It also establishes mechanisms for offenses and justice systems related to cybercrimes.
The document summarizes key sections of the Information Technology Act, 2000 related to cyber security in India. It discusses sections establishing protected computer systems, designating agencies responsible for critical infrastructure protection and incident response, penalties for various cyber crimes, and intermediary liability exemptions. The sections establish national agencies to coordinate cyber security, empower agencies to investigate offenses, and outline penalties including imprisonment and fines for offenses like unauthorized access, privacy breaches, and publishing false digital signatures.
Neeraj aarora cyber_lawyer_current trends in cyber crime scenarioNeeraj Aarora
This document discusses cyber crimes and the Indian legal framework around them. It covers common cyber crimes like phishing, data theft, and cyber stalking. It then outlines relevant sections of the Information Technology Act 2000 regarding unauthorized access, identity theft, cyber terrorism and more. The document also discusses challenges like transnational nature of cyber crimes and lack of deterrent punishment. It analyzes cases related to admissibility of electronic records and emails as evidence in court. Overall, the document provides an overview of cyber crimes and Indian laws pertaining to their prevention and prosecution.
Appreciation of Electronic Evidence-PDFTalwant Singh
The document discusses electronic evidence or e-evidence. It defines e-evidence as any probative information stored or transmitted digitally that may be used in court. It notes that courts must determine if e-evidence is relevant, authentic, and not hearsay, and if the original is required. Common forms of e-evidence include emails, photos, records, documents and files. Indian law has been updated to recognize e-evidence, including provisions for admissibility and authentication of digital records. Courts have accepted various forms of e-evidence in several cases.
The Information Technology Act, 2000 provides the legal framework for electronic governance in India. Some key points covered in the act include:
- Legal recognition of electronic records and digital signatures.
- Regulation of certifying authorities that issue digital signature certificates.
- Establishment of the Cyber Appellate Tribunal to hear appeals related to the act.
- Offences and penalties related to cyber crimes like hacking and publishing obscene content.
- Procedures for adjudicating violations and determining appropriate penalties.
This document provides an overview of electronic evidence and its admissibility in Indian courts. It discusses the types of computer-generated evidence, the foundations for authenticating digital evidence, relevant sections of the Indian Evidence Act, and several key Supreme Court judgments related to electronic evidence. The document establishes that electronic records can be admitted as evidence if the requirements of Section 65B of the Evidence Act are met, including proving the integrity of the data, hardware/software, and security of the system used.
What does chapter 9 of IT Act, 2000, "Penalties & Adjudication" cover? [#24]Kamal Thakur
This document outlines penalties under Indian law for various cybercrimes and offenses related to unauthorized access and damage to computers and networks. It discusses 5 major points: 1) Penalties for damaging computers or introducing viruses without permission, up to 1 crore rupees. 2) Penalties for failing to provide information to authorities, up to 1.5 lakh rupees. 3) A general residual penalty up to 25,000 rupees for violating rules. 4) The process for adjudicating violations and imposing penalties or compensation. 5) Factors adjudicating officers must consider like any unfair gains or losses caused.
The document outlines guidelines for online service delivery through the eDistrict project in Kerala. Key responsibilities are defined for various roles including:
- District Collector oversees service delivery and is responsible for policy compliance, reviewing reports, addressing grievances.
- Tahsildars and Village Officers are responsible for administering services at local levels, processing requests according to SLA, and maintaining IT infrastructure.
- Village Assistants perform physical verification of requests and upload information to the eDistrict application.
All roles must adhere to security, integrity and record keeping guidelines to ensure accurate and transparent online service delivery.
This document summarizes key aspects of India's Information Technology Act, including:
1) It defines digital signatures and electronic signatures, and outlines requirements for their use in authentication.
2) It establishes rules for electronic governance, electronic records, controllers who regulate certifying authorities, and adjudication of related offenses and compensation.
3) The case study discusses how information was retrieved from laptops of terrorists involved in a Parliament attack case, which revealed their motives and allowed for punishment under the law.
The document discusses the Information Technology Act of 2000 in India. It was passed to promote e-commerce and regulate electronic transactions. Some key points:
- The Act provides legal recognition for digital signatures and electronic documents to facilitate online transactions and e-governance.
- It established regulatory authorities for certifying digital signature certificates and created provisions to prevent cybercrimes like hacking and publishing of obscene content online.
- Major amendments in 2008 introduced concepts of electronic signatures beyond digital signatures, data protection responsibilities for companies, and new cybercrimes under the Act.
E-contracts have several advantages over paper contracts such as faster communication, lack of paper, and reduced delays. Indian law does not have exclusive legislation on e-contracts but the Indian Contract Act of 1872 and the Information Technology Act of 2000 govern their validity. The IT Act recognizes the legal validity of e-contracts and digital signatures and outlines provisions regarding attribution, acknowledgment of receipt, and time and place of dispatch and receipt of electronic records and e-contracts. Court cases have also helped establish principles for jurisdiction related to e-contracts.
The document discusses how information technology and the Information Technology Act of 2000 have led to both benefits and risks in India. It provides an overview of the key aspects of the Act, including its provisions, objectives, and amendments. While IT has enhanced banking services and e-governance, it has also enabled new forms of cybercrime such as hacking, financial fraud, and dissemination of illegal/obscene materials online. The document examines examples of cybercrimes and NASSCOM's initiatives to address related issues while calling for continued efforts to update laws and increase cybersecurity awareness.
The document provides an overview of the Information Technology Act 2000 in India. Some key points:
- The Act was enacted in 2000 to provide legal recognition to electronic records and digital signatures. It is based on the UNCITRAL Model Law on E-Commerce.
- The objectives are to facilitate electronic governance and commerce. It defines electronic records, digital signatures, secure systems, etc. and recognizes their legal validity.
- It applies to the whole of India and any offenses committed outside India involving computers in India. Various cybercrimes are punishable under the Act.
- It establishes provisions for public key infrastructure, digital signature certificates, duties of subscribers, and regulates certifying authorities to facilitate
The document discusses the causes of delays in the Indian justice system and analyzes statistics on pending cases. It notes that as of 2009, there were over 53,000 pending cases in the Supreme Court, over 40 lakh in High Courts, and over 2.7 crore in lower courts. Some of the key reasons identified for delays include unclear laws, non-appearance of witnesses, granting of unnecessary adjournments, lack of infrastructure resources, and vacancies in judicial positions. Various reforms are proposed, such as introducing e-courts and information technology, establishing specialized and fast-track courts, increasing the jurisdiction of small claims courts, and recruiting more judges.
Logs & The Law: What is Admissible in Court?loglogic
What is the role of Log Data in legal cases, such as a database security breach? Learn how logs are used, best legal practices, logs as evidence, and what architecture and solutions can help.
Judicial Appreciation of Digital Evidence 2016Talwant Singh
Cyber law is evolving in India. Every now and then we get new judgments from Supreme Court and High Courts. This is an attempt to keep pace with the changes.
This document is a research project submitted by Ronak Karanpuria to Prof. S.B.N. Prakash at the National Law School of India University in Bangalore for the subject of E-commerce & IT law in trimester IV of 2013-14. The research project examines the topic of "Electronic Evidence" and addresses its relevance, authenticity, and admissibility in court procedures in the context of the modern digital environment. The document includes sections on the types of electronic evidence, assessing electronic evidence, techno-legal prerequisites for electronic evidence, and the admissibility of electronic evidence. It also briefly discusses cloud computing.
Electronic or Digital evidence in India Courts
ip address as evidence
cdr address as evidence
electronic evidence under indian evidence act
electronic record in india
The document discusses court automation and electronic filing. It provides an overview of key features of court automation systems like e-filing, document management systems, case management systems, calendaring and scheduling, and evidence presentation. It then focuses on e-filing, describing it as the electronic transmission of documents to the court rather than on paper. The document compares e-filing to legacy imaging technologies, noting advantages of e-filing like lower costs, faster processing, and independence from time and distance. It also outlines factors to consider when implementing e-filing and desirable features of an ideal electronic case filing system.
This document discusses the use of information and communication technologies (ICT) to enhance legal education. Many law schools are moving their education online. ICT allows teachers to store and reuse educational materials and provides students an environment to manage legal information. Electronic materials for legal education can include communication tools, information tools, and instructional tools. When implementing ICT in legal education, the focus should be on quality of content and educational processes rather than technical aspects. A principled design approach is needed for electronic learning materials.
A presentation given at the Glasgow Caledonian University, Digital Forensics Student Conference in 2014 discussing some of the technical challenges we face in cyber forensics and possible research areas.
Digital forensics involves identifying evidence from digital sources using scientific tools and techniques to solve crimes. There are two criteria for evidence admission in court: relevance to the case and use of scientific methods. Errors in evidence gathering can result in meaningless evidence or penalties. The process involves preservation, identification, extraction, documentation, and interpretation of data. Tools like WetStone's Gargoyle and Niels Provos's stegdetect can detect hidden data. The reliability of found data must undergo a Daubert hearing to ensure the tools and methods are viable in court. Professional, ethical, and legal issues must be considered regarding an investigator's role, privacy concerns, and challenges from evolving technologies.
This document discusses digital crime and digital forensics. It begins by defining digital crime and noting the complexities involved in investigating digital crimes due to issues like anonymity and lack of legal governance across borders. It then examines how digital crime has evolved and compares digital crimes to conventional crimes. Challenges in digital forensics are also evaluated, such as untrained staff and challenges in preserving evidence across jurisdictions. The document argues that while digital crimes pose serious threats, digital forensics remains an important tool for determining culpability and preventing future attacks.
The document provides project documentation for a Court Case Management System (CCMS) being developed for Ceylinco Insurance PLC. Key details include:
- The CCMS will manage case registration, courts, counsels, fees, payments and provide reporting capabilities.
- It will be a web-based system using PHP and MySQL to simplify complex case management processes and improve communication.
- The system aims to enhance productivity, communication, planning/monitoring and accessibility for Ceylinco Insurance staff.
Digital Evidence in Computer Forensic InvestigationsFilip Maertens
The document discusses digital evidence and its importance in investigations. It defines different types of digital evidence and outlines challenges and best practices for acquiring, handling, and preserving digital evidence. Specifically, it covers defining digital evidence, why it is important, challenges involved, general methodologies including seizure practices and safe acquisition methods, and safeguarding digital evidence. The presentation provides guidance to law enforcement on properly obtaining and securing digital evidence.
Digital Crime & Forensics - Presentationprashant3535
The document discusses digital crime and forensics. It defines digital crime as any crime where a computer is used as a tool or target. Examples include malware, denial of service attacks, and phishing. Forensics involves the identification, preservation, extraction, documentation, interpretation and presentation of digital evidence. However, forensics faces challenges due to issues like anonymity, large data storage, encryption, and differences between legal systems of countries. The document concludes that collaboration between law enforcement, governments and industry is needed to address new trends in digital crime.
This document provides an overview of computer forensics. It defines computer forensics as the process of preserving, identifying, extracting, documenting and interpreting computer data for legal evidence. The document outlines the history of the field from the 1970s to present day, describes the typical steps of acquisition, identification, evaluation and presentation, and discusses certifications, requirements, evidence collection, uses, advantages and disadvantages of computer forensics. It concludes that computer forensics is needed to uncover electronic evidence for prosecuting cybercrimes.
This document provides an overview of computer forensics. It defines computer forensics as identifying, preserving, analyzing and presenting digital evidence in a legally acceptable manner. The objective is to find evidence related to cyber crimes. Computer forensics has a history in investigating financial fraud, such as the Enron case. It describes the types of digital evidence, tools used, and steps involved in computer forensic investigations. Key points are avoiding altering metadata and overwriting unallocated space when collecting evidence.
Electronic Evidence is found in all computer and multimedia as well as communication devices. Increasingly most of the business transactions are done in paperless mode but when the disputes arise, then where to look for evidence? This presentation will help you in this field.
Use of ICT in Courts is increasing day by day. Courts of today are ready for the IT revolution. It is an open debate as to how to bring them at par with other modern organisations in terms of use of technology. This article is an attempt in this direction.
Lanka Government Cloud (LGC) is a government-owned community cloud that provides cloud computing services to Sri Lankan government organizations. It offers infrastructure-as-a-service, platform-as-a-service, and software-as-a-service. LGC offers benefits like reduced procurement times, lower costs through economies of scale, elasticity and scalability. It is located at the LGN Hub data center and managed by ICTA. Government organizations can host their cloud-ready eGovernment applications on LGC servers and pay monthly or annually based on the resources used. Security measures like access control, encryption, and regular audits ensure that data in LGC is protected.
Computers in Management BBA 2 Sem
We Also Provide SYNOPSIS AND PROJECT.
Contact www.kimsharma.co.in for best and lowest cost solution or
Email: amitymbaassignment@gmail.com
Call: 9971223030
Crime & Criminal Network Tracking & Systems (CCTNS) has been projected as the panacea to all ills in the Police all across the country. This emanates from the fact that over and over again lack of accurate documentation and its timely retrieval has raised insurmountable problems to our functioning as a modern police force.
Information systems are combinations of hardware, software, and telecommunications networks that people build and use to collect, create, and distribute useful data, typically in organizational settings.
Many businesses use information technology to complete and manage their operations, interact with their consumers, and stay ahead of their competition. Some companies today are completely built on information technology, like eBay, Amazon and Google.
IT infrastructure consists of the physical devices and software applications that operate an entire enterprise. It includes computing platforms, telecommunications services, data management services, application software services, and IT management services. The infrastructure provides a shared platform for the firm's information systems applications. It includes hardware, software, and shared services across the organization. Major components are computer platforms, operating systems, enterprise software, networking/telecommunications, databases, internet platforms, and consulting services.
A computer base information system (CBIS) is defined as a set of hardware, software, database, telecommunications, people, and procedures configured to collect, manipulate, store, and process data into information. The document outlines the key components of a CBIS including hardware, software, databases, telecommunications networks, people, and procedures. It provides examples of each component and their functions in a CBIS.
Introduction to IT, Introduction to IS, Difference be IS and IT, Need for Information System, Information Systems in the Enterprise, Impact of Information Technology on Business (Business Data Processing, Intra and Inter Organizational communication using network technology, Business process and Knowledge process outsourcing), Managers and Activities in IS, Importance of Information systems in decision making and strategy building, Information systems and subsystems.
The document discusses stream processing models. It describes the key components as data sources, stream processing pipelines, and data sinks. Data sources refer to the inputs of streaming data, pipelines are the processing applied to the streaming data, and sinks are the outputs where the results are stored or sent. Stateful stream processing requires ensuring state is preserved over time and data consistency even during failures. Frameworks like Apache Spark use sources and sinks to connect to streaming data sources like Kafka and send results to other systems, acting as pipelines between different distributed systems.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
This document discusses deployability and continuous deployment in the context of microservice architectures. It begins by describing National ICT Australia (NICTA) and its work in information and communications technology research. It then discusses how microservice architectures support continuous deployment by allowing individual teams to deploy new versions of their services independently without coordination. Key aspects of microservice architectures that enable this include: each service having a single responsibility; services communicating asynchronously via messaging; and services registering themselves with a discovery service. The document also discusses how feature toggles and canary deployments can be used to maintain consistency when deploying new versions of services.
This document discusses key aspects of internetworking infrastructure. It begins by outlining some announcements and an upcoming business plan project assignment. It then presents three options for the business plan - developing one's own startup idea, a one-number dialing solution, or a campus transportation management system. The rest of the document provides details on these options and outlines what should be included in the business plan. It also discusses trends in infrastructure, challenges, components, and implications for business.
1)IT infrastructure is the shared technology resources that provid.pdfaparnawatchcompany
1)
IT infrastructure is the shared technology resources that provide the platform for the firm’s
specific information system applications. IT infrastructure includes hardware, software, and
services that are shared across the entire firm. Major IT infrastructure components include
computer hardware platforms, operating system platforms, enterprise software platforms,
networking and telecommunications platforms, database management software, Internet
platforms, and consulting services and systems integrators.
2)
The five stages of IT infrastructure evolution are as follows: the mainframe era, the personal
computer era, the client/server era, the enterprise computing era, and the cloud and mobile
computing era. Moore’s Law deals with the exponential increase in processing power and
decline in the cost of computer technology, stating that every 18 months the power of
microprocessors doubles and the price of computing halves. The Law of Mass Digital Storage
deals with the exponential decrease in t he cost of storing data, stating that the number of
kilobytes of data that can be stored on magnetic media for $1 roughly doubles every 15 months.
Metcalfe’s Law shows that a network’s value to participants grows exponentially as the network
takes on more members. Also driving exploding computer use is the rapid decline in costs of
communication and growing agreement in the technology industry to use computing and
communications standards.
3)
Moore\'s Law and Microprocessing Power:
The Law of Mass Digital Storage
Metcalf\'s Law and Network Economics
Declining Communications Costs and the Internet
Standards and Network Effects
4)
Computer hardware platforms
Operating system platforms
Enterprise and other software applications
Data management and storage
Networking and telecommunications platforms
Internet platforms
Consulting and system integration services
5)
current trends in computer hardware platfor
Increasingly, computing is taking place on a mobile digital platform. Grid computing involves
connecting geographically remote computers into a single network to create a computational grid
that combines the computing power of all the computers on the network. Virtualization organizes
computing resources so that their use is not restricted by physical configuration or geographical
location. In cloud computing, firms and individuals obtain computing power and software as
services over a network, including the Internet, rather than purchasing and installing the
hardware and software on their own computers. A multicore processor is a microprocessor to
which two or more processing cores have been attached for enhanced performance. Green
computing includes practices and technologies for producing, using, and disposing of
information technology hardware to minimize the negative impact on the environment. In
autonomic computing, computer systems have capabilities for automatically configuring and
repairing themselves. Power-saving processors dramatically reduce .
The document provides information about an IT services company called Coalesce Technologies. It discusses Coalesce's services, commitment to client satisfaction, growing network, and customized solutions. It also describes the library management system project, including the problems with existing systems, proposed new system features, and UML diagrams for modeling the system. Key aspects of the proposed system include automating transactions, providing a simple GUI, efficient database updating, and restricting administrative access for security.
1. The document summarizes a lecture on computer center management. It discusses the various names computer centers can have, the services they provide, types of computer centers, and factors to consider when installing computer systems.
2. Key services computer centers provide include data processing, management information systems, data storage, office automation, and general IT support services. Successful computer center management requires service planning, defining service levels, organizing staff, and collecting performance data.
3. The lecture outlines best practices for computer center operations, including developing clear policies and service level agreements, setting key performance indicators, and preparing reports for management.
1. The document summarizes a lecture on computer center management, outlining objectives like naming conventions, services provided, and types of computer centers.
2. It discusses factors to consider when installing computer systems and different models for a computer center's presence in an organization.
3. The summary also outlines services provided by computer centers like systems development, data entry, and consultancy as well as management of daily operations and types of users.
This document outlines the planning for an E-Taxi graduation project. It defines the project objectives as providing a safe, reliable and easy taxi booking service. It identifies key stakeholders as system owners, users, designers, builders and analysts. The project scope is to manage online taxi booking operations and customize user needs. Technologies used include Oracle, SQL Server, C#, ASP.Net, and tools like Visual Studio and Android Emulator.
The document discusses the e-court system in India and compares the websites of three high courts - Delhi, Mumbai, and Patna. It conducted surveys of law students and legal professionals to understand their experiences and opinions of the websites. The Delhi and Mumbai websites provide many e-services like e-filing, online case status checking, and orders downloading. However, all three websites have issues like poor search functionality, outdated content, and lack of feedback mechanisms. The Mumbai website is the most advanced but still has security and performance optimization problems. The study aims to improve e-courts in India based on findings.
Week 8 Lecture 1 - Key PointsManagement of Information Systems.docxhelzerpatrina
Week 8 Lecture 1 - Key Points
Management of Information Systems
Key Points
Key Points to remember are:
Business information systems
· Some information systems have become strategic tools as a result of strategic planning; others have evolved into strategic tools
· Strategic information systems help companies gain strategic advantage
· Company achieves strategic advantage by using strategy to maximize its strength, resulting in a competitive advantage
Strategic uses of information systems
· Various initiatives for establishing strategic advantage:
· Cost reduction, raising barriers to competitors, establishing high switching costs, new products, differentiating products, enhancing products, alliances, and locking in clients or suppliers
· Creating standards often establishes strategic advantage in software industry
· Reengineering: the process of redesigning a business process from scratch to significantly reduce costs
· Strategic advantages of information systems are short-lived; new opportunities must always be sought
· Must keep systems on the leading edge to maintain strategic advantage
· Bleeding edge is the undesirable result of a failed innovation effort
Business functions and supply chains
· Effectiveness is the degree to which a task is accomplished
· Efficiency is the ratio of output to input
· Productivity is the measure of people’s efficiency
· Information systems have been integrated into accounting services
· Financial information systems help managers track cash
· Computer-aided design (CAD) systems help engineers design new projects
· Computer-aided manufacturing (CAM) systems direct machines that assemble parts
· Supply chain management (SCM) systems optimize workload, speed, and cost in supply chains
· Customer relationship management (CRM) includes the entire cycle of relationships with customers
· Human resource management systems facilitate staff selection and record keeping
· Multiple companies’ SCM systems can be linked, facilitating cooperation, which requires trust
· An enterprise resource planning (ERP) system can encompass all business processes, but is expensive and challenging
Business hardware
· Understanding hardware is important for purchasing decisions
· Computers are classified according to power
· All computers have a CPU to process instructions
· Clock rate measures the speed of a CPU
· Data word: the number of bits the computer can process in a single cycle
· Computer power: measured by its speed, memory size, and number of processor cores
· RAM: volatile memory
· ROM is nonvolatile; it does not require power
· Imaging devices help process text and graphics
· When evaluating external storage, consider transfer rate, capacity, portability, and form of data organization supported
· Data is organized sequentially on tapes
· Direct access storage devices such as RAM, magnetic disks, and optical discs allow random access
· Databases require direct access storage devices
· When purchasing hardware, professionals ...
The document discusses various elements of systems design. It describes components that require design such as the network, application architecture, user interfaces, and system interfaces. It also discusses inputs to the design process such as functional models from analysis. The document then covers specific design areas in more detail, including network design, the application architecture using various models like client-server and n-tier architectures, user interface design, and database design. It also discusses design techniques like prototyping.
This document discusses various types of cyber crimes and precautions individuals can take. It describes cyber crimes such as hacking, malware attacks, phishing, online scams/fraud, cyberbullying, and identity theft. It notes that cyber crimes are increasing as the world's reliance on technology grows. The document also provides statistics on the prevalence and financial costs of cyber crimes in India. Finally, it recommends precautions like using strong passwords, reviewing statements regularly, and avoiding suspicious emails or links.
Role of Training and Development in CourtsTalwant Singh
Training is a continuous exercise in every department of an organisation. Judiciary is not an exception to it. To serve the litigants, it is necessary that adequate and timely training is provided to all stakeholders in the Judicial System.
Change Management is essential for any organisation. Judiciaries all over the world are realising its importance and taking steps to implement the same..
Appreciation of Digital Evidence in Sri Lankan LawTalwant Singh
The document discusses the appreciation and admissibility of digital evidence under Sri Lankan law. It notes that prior to 1995, there were no provisions for admitting computer evidence. The Evidence (Special Provisions) Act of 1995 was introduced to efficiently and legally manage computer-based evidence in civil and criminal court proceedings. The act defines computers broadly and allows computer-generated evidence to be admitted if it meets certain conditions regarding the computer's operation and the accuracy of information supplied. Several other acts also address digital evidence admission. Digital evidence poses challenges regarding discovery due to its volume, persistence, and multiple storage locations.
This document discusses the use of information and communication technology (ICT) in human resource management (HRM) activities within judiciaries. It defines e-HRM as the application of IT to support HR activities and interactions between actors. Large judiciaries are more likely to adopt e-HRM due to benefits of automation, information sharing, and collaboration. ICT can be used in various HR processes like recruitment, selection, and training. Examples include storing employee information, sorting job candidates, producing competence profiles, and providing online training resources. The use of ICT in HRM is growing and can help profile employees, track information and processes, and manage talent.
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITYTalwant Singh
Cyber is a real threat and we can not keep our eyes shut to the same. Most of the countries surrounding us are involved in cyberwar covertly and we need to take steps to counter the same at the earliest.
The document discusses the threat of cyberwar and the lack of established definitions and international agreements regarding cyber conflict. There are differing definitions of cyberwar between countries like China/Russia and the US. The document also notes the difficulty of attribution in cyber attacks and challenges in applying existing laws of war to the digital domain. Overall, the document argues that internationally agreed rules and standards are needed to address the growing threats in cyberspace and avoid escalating conflicts between nations.
CYBERWAR IS NOT A CONVENTIONAL WAR. NATIONS ARE YET TO ENTER INTO ANY INTERNATIONAL TREATY IN THE FIELD OF CYBERWAR. RULES ARE REQUIRED TO BE FRAMED IN THIS FIELD KEEPING IN VIEW THE POTENTIAL OF DAMAGE WHICH CAN BE CAUSED IN THE EVENT OF CYBERWAR.
This document discusses cyber law and cybercrime in India. It provides definitions of cybercrime from international organizations and Indian law. It notes that cybercrime spans national boundaries and discusses the need for international cooperation between law enforcement agencies. It also analyzes cybercrime statistics in India and discusses challenges in investigating and prosecuting cybercrimes like ensuring legally admissible digital evidence. It emphasizes the importance of training police and judiciary on technology issues to effectively address cybercrime.
Jurisdictional Issues In Internet DisputesTalwant Singh
This document discusses various jurisdictional issues that arise in internet disputes. It covers different approaches taken by courts around the world in determining jurisdiction for online disputes. Issues around applicable law and enforcing foreign judgments are also examined. Several suggestions are proposed to address jurisdictional uncertainty for cross-border internet transactions, including developing uniform internet laws or alternative dispute resolution mechanisms, but each approach faces challenges in implementation.
The document provides an overview of cyberlaw in India. It discusses the key aspects of cyberlaw including cybercrimes, electronic signatures, intellectual property, data protection and privacy. It summarizes the Information Technology Act 2000 and its amendment in 2008, which serves as the primary legislation governing cyberlaw in India. The amendment added new sections covering cyber terrorism and data protection and replaced 'digital signature' with 'electronic signature' to make the act more technology neutral.
The document provides an overview of the Indian legal system, including its history and sources of law. Some key points:
- Indian law is largely based on English common law and retains many Acts introduced during British rule.
- The primary sources of law are enactments passed by Parliament and state legislatures. Secondary sources include Supreme Court and High Court judgments.
- The Indian Constitution establishes a democratic republic and guarantees fundamental rights and duties. It contains 395 articles and is the world's longest written constitution.
- The legal system includes criminal and civil codes. It has a three-tiered structure of Supreme Court, High Courts, and subordinate courts. Recent trends focus on alternative dispute resolution and improving judicial efficiency.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/how-axelera-ai-uses-digital-compute-in-memory-to-deliver-fast-and-energy-efficient-computer-vision-a-presentation-from-axelera-ai/
Bram Verhoef, Head of Machine Learning at Axelera AI, presents the “How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-efficient Computer Vision” tutorial at the May 2024 Embedded Vision Summit.
As artificial intelligence inference transitions from cloud environments to edge locations, computer vision applications achieve heightened responsiveness, reliability and privacy. This migration, however, introduces the challenge of operating within the stringent confines of resource constraints typical at the edge, including small form factors, low energy budgets and diminished memory and computational capacities. Axelera AI addresses these challenges through an innovative approach of performing digital computations within memory itself. This technique facilitates the realization of high-performance, energy-efficient and cost-effective computer vision capabilities at the thin and thick edge, extending the frontier of what is achievable with current technologies.
In this presentation, Verhoef unveils his company’s pioneering chip technology and demonstrates its capacity to deliver exceptional frames-per-second performance across a range of standard computer vision networks typical of applications in security, surveillance and the industrial sector. This shows that advanced computer vision can be accessible and efficient, even at the very edge of our technological ecosystem.
"Choosing proper type of scaling", Olena SyrotaFwdays
Imagine an IoT processing system that is already quite mature and production-ready and for which client coverage is growing and scaling and performance aspects are life and death questions. The system has Redis, MongoDB, and stream processing based on ksqldb. In this talk, firstly, we will analyze scaling approaches and then select the proper ones for our system.
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframePrecisely
Inconsistent user experience and siloed data, high costs, and changing customer expectations – Citizens Bank was experiencing these challenges while it was attempting to deliver a superior digital banking experience for its clients. Its core banking applications run on the mainframe and Citizens was using legacy utilities to get the critical mainframe data to feed customer-facing channels, like call centers, web, and mobile. Ultimately, this led to higher operating costs (MIPS), delayed response times, and longer time to market.
Ever-changing customer expectations demand more modern digital experiences, and the bank needed to find a solution that could provide real-time data to its customer channels with low latency and operating costs. Join this session to learn how Citizens is leveraging Precisely to replicate mainframe data to its customer channels and deliver on their “modern digital bank” experiences.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Conversational agents, or chatbots, are increasingly used to access all sorts of services using natural language. While open-domain chatbots - like ChatGPT - can converse on any topic, task-oriented chatbots - the focus of this paper - are designed for specific tasks, like booking a flight, obtaining customer support, or setting an appointment. Like any other software, task-oriented chatbots need to be properly tested, usually by defining and executing test scenarios (i.e., sequences of user-chatbot interactions). However, there is currently a lack of methods to quantify the completeness and strength of such test scenarios, which can lead to low-quality tests, and hence to buggy chatbots.
To fill this gap, we propose adapting mutation testing (MuT) for task-oriented chatbots. To this end, we introduce a set of mutation operators that emulate faults in chatbot designs, an architecture that enables MuT on chatbots built using heterogeneous technologies, and a practical realisation as an Eclipse plugin. Moreover, we evaluate the applicability, effectiveness and efficiency of our approach on open-source chatbots, with promising results.
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
AppSec PNW: Android and iOS Application Security with MobSFAjin Abraham
Mobile Security Framework - MobSF is a free and open source automated mobile application security testing environment designed to help security engineers, researchers, developers, and penetration testers to identify security vulnerabilities, malicious behaviours and privacy concerns in mobile applications using static and dynamic analysis. It supports all the popular mobile application binaries and source code formats built for Android and iOS devices. In addition to automated security assessment, it also offers an interactive testing environment to build and execute scenario based test/fuzz cases against the application.
This talk covers:
Using MobSF for static analysis of mobile applications.
Interactive dynamic security assessment of Android and iOS applications.
Solving Mobile app CTF challenges.
Reverse engineering and runtime analysis of Mobile malware.
How to shift left and integrate MobSF/mobsfscan SAST and DAST in your build pipeline.
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Ict in the district courts
1. ICT IN THE DISTRICT COURTS OF DELHI
Challenges, Strategies and Solutions
By
Shiv Talwant Singh
Additional District & Sessions Judge, Delhi
1. Introduction
An independent, effective, just and efficient judicial system that fosters respect
for the rule of law is indispensable in a truly democratic system.
Modernization, streamlining and improved efficiency of the court systems are
paramount in order to ensure a high degree of protection of individual rights and
therefore increase citizens’ faith and confidence in the State. District Courts of
Delhi, functioning in three different Court Complexes, known as Tis Hazari
Courts Complex, Karkardooma Courts Complex and Patiala House Courts
Complex and having a working strength of about 280 Judges, are striving hard
to achieve this objective.
In the year 2002-2003, Ministry of Home Affairs along with Planning
Commission and Ministry of Law and Justice decided to release funds to all the
four Metropolitan Cities for computerization of District Courts to made as them
‘‘Model Courts’’. Delhi was given an initial outlay of about Rs.49.80 Millions
for starting the computerization process in District Courts.
Page 1 of 37
2. The District Courts Computerization Project was formally inaugurated by
Hon'ble Chief Justice of India in a glittering function held at District Courts
Complex, Tis Hazari on 23.11.2003 and from that day onwards District Courts
have not looked back and have achieved one milestone after the other in the
field of computerization.
When the initial plan was being implemented, another batch of 76 Judicial
Officers consisting of Delhi Higher Judicial Service Members and Delhi
Judicial Service Members joined the District Judiciary. So it was necessary to
provide additional computers for the Courts of newly appointed Officers. The
further allocation of Rs.22.80 Million was made by the Central Government for
this purpose as well as to take care of enhanced requirements in other fields
also.
Delhi Government has made yearly allocation of Rupees 27.50 Million for the
next five years beginning with financial year 2004-2005 for computerization of
District Courts. As on date, the finance provided by the Delhi Government is the
only source for financing present and future plans of computerization in District
Courts as no more funds are being released by the Central Government for this
project.
Page 2 of 37
3. 2. Operating System
Operating system is the software that determines how a computer operates,
including such things as file structure, input and output devices, printer routines
and screen manipulations. When the question regarding selection of the -
operating system came up, then after due deliberations, it was decided to use
LINUX based operating system. The main reason for selecting this operating
system is that it is cost effective and is an open platform software. As and when
future upgrades are required, the same are available either free of cost on the
Internet or at a negligible cost from vendors. The other reason to go for LINUX
based system is that it is almost virus free.
3. Hardware
In the first phase, standalone Personal Computer systems [PCs] were provided
to the Stenographers and Ahlmads (Record Keepers) attached with every Court
and instead of Dumb Terminals [ A terminal that doesn’t contain an internal
micro processor. It responds to simple control codes and usually displays only
characters and numericals] or Thin Clients- linked to main server [ A computer
system or service that provides information or a service to other computers on a
network] through the network. The rationale of providing PC system was to be
allow system -to perform the required task that is capability of storing sufficient
amount of data and retrieval of the same should be quick and instantly available
as and when required for efficient functioning of the Court system.
Moreover, the Judges were hesitant to allow transfer of half-baked information
Page 3 of 37
4. to the servers like judgments or orders, which have not been finalized.
Similarly the data for daily use is required to be kept in the computers of the
Ahlmads. A backup copy of the data in the Steno's computer system is also kept
in the computer system of the Ahlmads, so that in case of any accidental
erasing of data of Steno's computer system, its backup copy can be retrieved
from the computer system of the Ahlmads of the same Court. Both these
computer systems are linked to the servers by LAN [Local Area Network] . In
the first phase, only one Dot Matrix Printer was provided on the table of the
Stenographers for one Court. The Ahlmad was required to take printout of the
reports, cause list and other documents at the Steno's end as both these
computers were networked with each other.
The Server Room is the nerve centre of all activity as far as the computerization
is concerned. In Tis Hazari Court Complex, six Servers were installed in Server
Room on the second floor. Similarly, in Karkardooma Court Complex, four
servers have been installed in the designated Server Room. In Patiala House
also four servers were installed in the make-shift room, as there is acute
shortage of space in the said Court Complex.
Initially, it was decided to go for centralized UPS [Uninterrupted Power Supply]
System to power the computer systems in case of electricity failure. One UPS
of 10 KVA serves about 30 computer systems. These UPS were installed in
secured ventilated rooms with proper power supply and from those UPS rooms,
Page 4 of 37
5. power supply cables were laid to the user's ends in respective Courtrooms. Later
on, it was noticed that if one central UPS trips, it will make about 30 Court
computer systems non-functional. So, from the year 2005 onwards, it has been
decided to install individual UPS with every system to provide required power
back up in case of electricity failure. .
The three Court Complexes were connected to NIC's Headquarters; initially by
using ISDN lines, which are now being upgraded to 2 MBPS leased lines of
MTNL. This upgradation is the need of the hour keeping in view the manifold
increase in traffic between the three Court Complexes and NIC's Headquarter at
CGO Complex, Lodhi Road New Delhi. Enhanced speed as well as online
connectivity is required for integration of the computerization process of the
three District Courts into one centralized system from the users’ point of view.
4. Customized Software
The heart of computerization of District Court of Delhi is the customized
software developed by NIC under the guidance and supervision of the Software
Development Committee of the District Court Level. The Judges and the
Court Staff i.e. Court Clerks, Stenos, Ahlmads, Readers etc. gave their valuable
input to software developers to make them aware of the work flow type of
registers/forms/data/summons/warrants etc. being maintained and the reports
being generated in the Courts. Requirements were analyzed and in
accordance with the said requirements specific Softwares were developed.
Page 5 of 37
6. After a test run and approval of the Software Development Committee, the
software modules were integrated in the main Case Information Management
System (CIMS). There is no doubt that it was a time consuming process but
there were no other shortcuts available.
The District Courts in Delhi are governed under the Delhi High Court Rules,
Punjab Court Act and a number of other legislations and rules passed from time
to time. Entire working is quite complex to understand by a layman who may be
a programmer but without having any legal background. NIC's programmers
were taught step by step the complex processes before thay could venture into
the development of the appropriate customized software modules. These were
deliberated in length with the members of Software Development Committee of
the District Courts. After the members of the Software Development
Committee were satisfied, authorization was given to commence the
computerization of those processes. These software modules were then
standardized and authorization was given to integrate them it in the master
software known as CIMS.
5. Management of Computerization in District Courts - As on date, the
computerization process is being looked after at the District Courts level by a
Central Computer Committee, which assists the learned District & Sessions
Judge in computerization of District Courts. The members of the said Central
Page 6 of 37
7. Computer Committee are the Judges In charge of Computerization in the three
Court Complexes alongwith Nodal Officers of Tis Hazari Court Complex and
the Administrative Civil Judge. Central Computer Committee lays down the
guidelines and oversees the proper implementation of the computerization.
There is also a Central Computer Purchase Committee, which looks after the
hardware and software purchases under the guidance of the District & Sessions
Judge. The Purchase Committee consists of members of the Central Computer
Committee, representative of Delhi Government, and an official from Accounts
Department etc. and the purchases are made as per the guidelines laid down by
the Government of NCT of Delhi from time to time after observing all the
necessary formalities. At the respective District Court Complex level, a Higher
Judiciary Judge has been appointed as the Judge In charge, who is assisted by a
Nodal Officer and other members of the computer committee for the said Court
Complex. Computer Branches in all the three Court Complexes are utilizing the
services of the staff withdrawn from other areas as the process of creation of
posts for Computer Branch is still pending with the Delhi Government. The
Staff so withdrawn and posted in the Computer Branch is computer savvy, they
have been given basic training in troubleshooting and maintenance of computer
systems and most of them are holding computer qualifications like
Certificate/Diploma/Training. It is worthwhile to note here that we even have
MCAs and BCAs working in our District Courts and their expertise is being
utilized in computerization of District Courts.
Page 7 of 37
8. The Trouble Shooters take care of the day-to-day maintenance of the computer
systems, Printers, UPS Systems, Servers and the LAN connectivity, which is the
backbone of the entire system. In case a problem is too complex, the Trouble
Shooters immediately inform the Service Engineers and ensure that the work of
the Court should not be hampered beyond reasonable minimum period. If a
particular item requires removal to the workshop, standby equipment is
provided to the said Court/Branch. Complaint Registers are maintained in all the
three District Court Complexes in the Computer Rooms and direct telephone
connections as well as Inter-com connections have been provided so that
complaints can be lodged, which are rectified on top priority.
6. Progress made
The main Court processes, which have been computerized and put into practice,
can be categorized as under:
(i) Creation of database of all the pending cases - In District Court of
Delhi, at 1 January 2005, 471.403 cases were pending [ 82,265 Civil cases
and 389,138 Criminal cases] Every year more than 110,000 cases are filed
and about 115,000 cases are disposed of. It was a mammoth task to enter the
details of all the pending cases into the computer system and that too, not by
employing any external hands for assistance but by the Court staff itself, who
Page 8 of 37
9. are otherwise looking after the day to day functioning of the Courts and they
are too busy in their regular court work. District Court is proud to complete
the entire data entry of all the pending cases as on date. It was possible by
dividing the data entry into three stages.
At that initial stage, the staff was required to enter only the case
name, type of the case and other minor details so that unique ID (Identity
Number) of the case is created and a slot is reserved for the case in the
CMIS. In the second stage, complete names, addresses and other particulars
of the parties to the cases were entered. In the third stage, the list of witnesses
and all other remaining fields were entered.
A major problem was faced at Patiala House Court Complex because
of pendency of about one hundred thousand complaint cases under
Negotiable Instruments Act regarding dishonour of cheques before the
Magistrates. In some of the Courts, more than ten thousand cases are pending.
There is no space in the Courtrooms of Magistrates to accommodate
additional helping hands, as most of the courtrooms are too small. This
problem was solved by dedicating the computer training room only for the
purpose of data entry for a period of six months and by identifying and
allocating 10 computer trained staff members for data entry work.
Initially a proposal was also mooted to outsource the work of
Page 9 of 37
10. clearing the backlog of data entry but the idea was discarded because of the
sensitive nature of data to be fed in. Moreover the case files containing
important documents cannot be handed over to outside agencies. Further, the
economic parameters were also not found feasible. During summer vacations
of 2005, the Judges and staff worked tirelessly to complete the data entry
work. District Courts Administration is grateful to the Judges and staff
members for their cooperation to complete this Himalayan task, which has
not been achieved so far by any other organization in the country on the same
scale in such a short time without incurring any cost and without employing
an outside agency.
(ii) Automatic generation of Cause Lists - Before the computerization
process was started, every Ahlmad (Record Keeper) used to spend about 45
minutes everyday for preparation of the Cause List of the cases to be listed
before the Court on the next day. This was quite time consuming task and
there were chances of mistakes, like non-listing of the cases fixed for the day
or listing of the cases which are not fixed for the said date. It used to cause
great inconvenience to the lawyers, litigants and the Judges. After
computerization, this problem has been solved successfully as the database is
upgraded on daily basis by the Ahlmads so, as and when required, Cause List
for any working day can be generated at the press of the button. It saves time,
efforts and energy on the part of the Ahlmads who have become more
efficient after introduction of the automatic generation of Cause List. The
Page 10 of 37
11. said Cause Lists are also available on the Internet in advance, so that lawyers
and litigants can plan and schedule their visits to the Courts accordingly.
(iii) Automatic generation of Monthly Statements - Every Court is
required to submit to the Hon'ble High Court monthly statements showing
institutions of fresh cases, disposal of the cases during the month and
pendency at the end of the month. Earlier, the Ahlmads used to take about
2/3 days to manually prepare the said Monthly Statements. As mentioned
earlier, since the entire database is available on computers, the Monthly
Statement is generated only on the press of a button, resulting in saving of
time and energy. The response time has reduced to the bare minimum. Now
the said statements can be generated for a week, fortnight or on monthly
basis, which helps in planning by the Judges to maximize the disposal.
(iv) Generation of reports in response to Parliament questions -
Sometimes Parliament questions are received regarding number of cases of a
particular type pending in the Courts, the age of the cases or the Courts in
which the said cases are pending. All these details can be sorted out on the
basis of the inquiry and reports can be generated and dispatched in the least
possible time only because of availability of the entire data on the Servers.
(v) Centralized Filing - Prior to computerization, the filing was scattered
in different Courts causing great inconvenience to the Lawyers and the public
Page 11 of 37
12. at large. Nobody was sure about the place where he had to do the filing.
Now special Counters known as “Facilitation Centers” have come up in all
the three Court Complexes where the entire filing for the Courts can be done.
In Tis Hazari Court Complex, filing counters have been opened at two places,
keeping in view that there are about 160 Courts functioning in the said
Complex and it is the largest Court Complex in Asia. At the counters near
the Post Office facing the Civil Side Chamber Complex, cases of the Court of
Senior Civil Judge and District Judge including matrimonial and rent matters
can be filed. The filing counters have been opened at the said place with a
purpose because most of the Civil Lawyers have their chambers in the
Eastern Wing and it is very convenient for them to approach the filing
Counters on the Eastern side.
The Criminal Lawyers have their chambers mainly in the Western
Wing and they also operate from Central Hall. Hence a filing counter has
been opened in the Central Hall itself where criminal complaints to be listed
before the Chief Metropolitan Magistrate and the bail matters to be listed
before the Additional Sessions Judges, can be filed.
As soon as a matter is filed, it is given a unique number; the first
digit denotes the Court Complex like ''1'' stands for Tis Hazari, ''2'' stands for
Karkardooma and ''3'' stands for Patiala House. The next six digits denote the
number of case and last four digits after ''/'' denote the year of filing. The
Page 12 of 37
13. type of case is mentioned in the beginning and a normal case number
generated by the computer looks like ''Civil Suit No. 1756/2005''. In this
number, the type of suit is ''Civil Suit'', ''1'' stands for Tis Hazari and ‘756’
stands for the particular case number and 2005 is the year of filing. The
bumbering digits can go upto six digits, so that the future needs of filing
have been also taken care of.
The case number will remain permanent for the life of the case
irrespective of the fact that the case is transferred from one Court to the other.
Even after final disposal, the case file can be easily traced from the Record
Room on the basis of this number. The permanent numbers have solved the
problem of identification and tracing of cases because at the time when
computerization was not in place, every Court was assigning its own case
numbers as and when the matters were allocated or transferred to the said
Court and this practice used to result in great confusion in the minds of the
litigants.
Now with the introduction of permanent case numbers, one can
easily trace his case by making query on the internet or by visiting the
Information Counters where Public Relation Officers have been appointed to
assist the general public and the Lawyers for answering their specific queries
regarding the allocation, transfer and pendency of cases and their present
status.
Page 13 of 37
14. (vi) Automatic allocation of cases - At the time of filing a case at the
Central Registry, the party's name, jurisdiction, type of case and the statute
under which the case has been filed, are entered into the system. Immediately
the computer assigns unique IDs to the cases and sorts them on the basis of
set norms like jurisdiction of a particular Police Station, pendency status in
the respective Courts, specific allocation of cases to designated Courts and
other pre-determined parameters and the cases are automatically allocated to
the Courts. The lawyers/litigants are informed in the least possible time about
the allocation of the cases filed by them. This system operates without any
intervention by the officials manning the Filing Counters, so the chances of
manipulating the allocation of cases is ruled out. However, the District
Judge/Judge In charge has the right to over-ride the allocation done by the
Computer and for this purpose, he may identify a particular case online and
decide that the said case is to be allocated not to a Court chosen by the system
but to some other Court. This overriding option is excised in exceptional
cases, as and when the need arises.
(vii) Transfer of the physical case file and the data to the Allocatee
Court - After allocation, the sanction of the District Judge/Judge In charge is
obtained and the hard copy of the case file is sent to the said allocatee Court.
The data captured in the Central Registry is also transferred to the said Court
through Central Server. Once the case reaches the concerned court, the
Page 14 of 37
15. Ahlmad makes the second and third stage entries, i.e., he completes names
and addresses of the parties and witnesses in the computer system alongwith
the next date of hearing as fixed by the learned Judge. So by the end of the
day, the entire details of the cases filed during the course of the day reach the
Central Server and the said data can be used for any pre-defined purpose.
This information is automatically sent to the Court Web-Site.
(viii) Grouping of cases - Sometimes, it is decided to transfer cases of a
particular type to one court. Earlier the process of identifying the said cases
used to take a long time as manual lists were prepared but now as and when a
decision is taken, it can be implemented within few minutes because the
entire data regarding the nature of cases, their respective age, special
characteristics, nature of offences, age of the accused, place of residence of
the parties and other unique identities are available in the data bank.
(ix) Allocation of Court Numbers to different Courts - Prior to
computerization, all the Courts were known by the names of the Presiding
Officers of the said Courts like the ''Court of Mr. ABC''. The frequent
transfers, abolition of certain courts due to exigencies and creation of new
Courts because some Officers had come back from deputation or they had
been transferred to a particular Court Complex used to result in great
confusion in the minds of the Lawyers and litigants. Another reason for the
said confusion was that a number of Judges share the same name. Allocating
Page 15 of 37
16. specific Court Numbers to all the Courts, which are situated in three District
Court Complexes, has solved this problem.
To overcome the problem of abolition of a particular Court when a
Judge is transferred out/he proceeds on deputation, it has been decided not to
allocate the same Court Number to any other Judge for a period of one year.
The said Number can only be re-used after one year so that in the intervening
period, the pending cases of the earlier Court stand transferred to other Courts
and by that time, the litigants and the lawyers may also notice that a particular
Court stands abolished. To take care of appointment of new Judges and
creation of new Courts when the Judges are transferred to a particular Court
Complex or they come back from deputation, sizable numbers of vacant
Courts numbers have been provided in every Court Complex, where the said
Officers can be accommodated.
It is pertinent to mention here that a particular Court Number is not
associated with the Room Number or seniority of the Judge. The Court
Numbers continue from year to year and it becomes easy to identify a
particular Court by its Number rather than by the name of the Presiding
Officer. Even for the purpose of report generation, the process has become
quite simple now because Computer can easily track the Court Numbers.
Associating the Courts with the names of the Judges was quite a cumbersome
process which was very difficult to be handled by modern technology of
Page 16 of 37
17. computerization, where certain specific parameters and fundamentals have to
be followed while performing a particular task.
(x) Automation of the Process Serving Agency - The automation of the
Process Serving Agency was a daunting task as it was following the practices
adopted about one century ago of creation of Beats for distribution of
summons, marking of reports on the said summons and their ultimate return
to the concerned Courts. This process has been given special attention.
The summons is entered in the Computerized Registers on receipt
from respective Courts. The said Programme automatically allocates the
summons to the next Process Server in line and the summons are accordingly
distributed area-wise to the Process Servers by the computer. After such
distribution, the progress regarding service of summons is noted on day-to-
day basis in the form of Daily Reports to be submitted by the said Process
Servers.
The Process Servers are made accountable. Every day, they have to
submit a report stating the number of summons already pending with them,
new summons allocated on the said day, number of summons served by them
during the day and number of summons returned by them unserved with
specific reasons as to why the said summons were not served. The data
collected from Process Servers is fed into the Computer System, which
generates a Daily, Weekly and Monthly Report on the basis of number of
Page 17 of 37
18. processes served during the said period and the percentage of success.
The performance of the Process Serving Agency has significantly improved
after computerization.
The Ahlmads of the Courts have the facility to check at the end of
the day as to how many summons issued by their respective Courts have been
served and how many of them are still pending. The matter can be brought to
the knowledge of the concerned Judge regarding the service of the summons
because the performance of the Process Serving Agency is available on the
intra-net to all other terminals in different Courts and Branches.
(xi) Implementation of the Financial Accounting Package - The
Accounts and Cash Branch are fully automated. Payment of Salaries to the
Judges and the Staff, numbering about five thousand has being taken care of
by the System. The fines collected in the Courts, fees collected in the
Copying Agency and other Branches are being monitored by the Accounts
and Cash Branch on real time basis and remedial actions are taken as and
when required. It has minimized the risk of financial irregularities because
the details are available online and any deliberate deviations can be pin-
pointed well within time.
(xii) Automated Attendance Marking System - The District Courts of
Delhi are first in India to opt for the most modern Automated Attendance
Page 18 of 37
19. Marking System, which is based upon Advanced Smart Card Technology.
A Micro Chip of 1 KB capacity is embedded in every Smart Card, which
contains all the details regarding a particular employee alongwith his
photograph and designation etc. The attendance can be marked on the
Automatic Contactless Terminals provided at different entry points in all the
three District Court Complexes. To mark the attendance, only the Card is to
be waved before the Machine and it takes not more than one second for one
person to do so. The problem regarding late coming and leaving the Court
early stands resolved by installing this system.
The Attendance software is duly integrated with the Salary
Preparation System and it takes care of leaves and other facilities availed by
the said employees. Different reports based upon the information captured
through the system can be generated. The entire information collected from
all the three Court Complexes regarding attendance is combined in one
database, which can be accessed even from the web browser.
In future the finger print identification system is also to be
introduced with a view to restrict entry of undesirable elements in security
zones like Server Rooms, Record Rooms and Stores etc.
(xiii) Digitization of Disposed Records - The disposed files take a lot of
space to store, so it has been decided to digitize the old records and keep
Page 19 of 37
20. them safe in the digitized form instead of maintaining the physical files for
decades together. Proper care has been taken while weeding out the record
by following the rules framed in this regard. A lot of space is being made
available for other important purposes after digitization of the records and
there is no danger of any fire, termites or other natural calamities, which may
destroy the record. Proper backups are being kept at different places so that
the data is not lost in case of any eventuality.
(xiv) Computerization of Judges’ Libraries - The Judges’ Libraries in all
the three Court Complexes have hundreds of thousands of books, which have
been affixed with Bar Code Tags. As and when a book is to be searched, it is
easy to trace the same and entries regarding their issuance and return are
made automatically with the help of the Bar Code Readers. On the intra-net,
the judgments of the Hon'ble Supreme Court and Hon'ble High Courts have
been provided so that Judges may access them from their computers installed
in the chambers. The said judgements can also be accessed from terminals
installed in Courts so that the Judges have the ease of looking for a particular
law point and use the same as and when required.
(xv) Provision of TFT LCD Screens on the Dias - In the second phase of
computerization, TFT/LCD 15'' Screens have been provided on the Dias
which are connected to the computers of the Stenos. The Judges are able to
keep a watch on the evidence being recorded by Stenos under their dictation
Page 20 of 37
21. and they are further able to go through the transcripts of the judgments typed
out by the Stenos. Necessary corrections can be made there and then so that
the judgments are announced on time, without any delay and mistakes.
(xvi) Provision of Computers in the Chambers of the Judges – Similarly,
in the second phase of computerization, Judges have been provided with
computer systems in their respective chambers so that they are able to use
them as and when they are free. These systems can be also used by the
Stenos to type out the judgments when the learned Judge is holding his Court.
Thereafter, the learned Judge can check the said judgments and in spare time,
he/she can also access the judgments of Hon'ble Supreme Court and High
Courts. He/She can transfer the files from his Court Room to his residential
Computer Systems by using the secured E-mail facility. The judges have
been provided with digital signatures and they can always sign their
judgements digitally, so that no one is able to tamper the data when the same
is transmitted. Judges may make necessary corrections in the judgments in
the comfort of their homes and thereafter the said judgments can be
transmitted to Courts by using the secured E-mail.
(xvii) Computerization of Copying Agency - Since all the orders and
judgments are available on the intra-net, now there is no need for typing or
photocopying the orders in the Copying Agency. The required orders are
downloaded and printed in the Copying Agency, properly authenticated and
Page 21 of 37
22. delivered to the applicants in the minimum possible time. Uncertified copies
of the orders are available on payment of nominal fees on the very next day of
moving the application, as the Copying Agency only has to print the orders
already available on the intra-net.
(xviii)E-Mail Facility - E-Mail facility has been provided to all the Judges
and Courts with the commissioning of dedicated E-Mail Server for district
judiciary in Delhi. The Judges are able to transfer the drafts of the
judgements/orders from Courts to their residences by using the secured e-mail
facility and vice-versa. All the circulars are also e-mailed to the Judges.
It has resulted in availability of cost effective instant communication facility.
District Courts have been able to cut cost of paper printing and labour by use
of e-mail facility.
(xix) Automatic Staff Posting System - Prior to computerization, it was
very difficult to keep track of the postings of the staff members numbering
about five thousand. Now a Personnel Information System (PIS) is in place.
All the details and particulars of the employees alongwith their postings have
been entered into the system and the said software generates the reports on
the set parameters and indicates the names of the Court Officials who are
mature for their transfers after serving for a particular number of years in
their present postings. The said PIS System also takes care of the Annual
Confidential Reports, Provident Fund Entries and Service Book Entries. It
Page 22 of 37
23. signals well in time the steps to be taken in respect of the Court Officials who
are going to retire in a few months time. It helps in proper management of
the staff, which is a valuable asset for the District Courts of Delhi.
(xx) Stores Management - Every year, the District Courts purchase huge
quantity of consumables valued at millions of rupees. A proper Stores
Management System has been put in place with computerization of the
District Courts. It indicates well in time the store items, which need
replenishment, monthly/weekly consumption pattern of different types of
stores and the budgeted and actual expense on a particular store item. It helps
in planning the future budget for purchase of the store items and proper
inventories are maintained.
(xxi) Laser Printers for District Courts - Dot Matrix Printers installed in
the first phase of computerization on the stenos’ tables have been found to be
very noisy and slow in their operation. After much deliberation and working
out the feasibility of going for different options, it was decided to purchase
Laser Printers for the Stenos. The Laser Printers perform the printing
function without any noise and disturbance. The speed is fantastic and over
all efficiency of the Stenographers has improved. They do not interfere with
the normal functioning of the Courts. The Dot Matrix Printers removed from
the Stenos’ seats have been provided to the Ahlmads, who need to generate
different types of reports and summons etc.
Page 23 of 37
24. (xxii) Automatic Generation of Summons and Warrants etc. -
Considerable time was being spent every day by the Ahlmads for preparation
of the summons, warrants and other types of notices to be sent to the
witnesses, parties and other officials requiring their attendance in Court.
After the introduction of computerization and completion of third phase of
data entry (primarily concerning with entering the names of the witnesses in
the Computer Data Bank) now the summons to the witnesses and Notices to
the parties, Production Warrants, Bailable and Non Bailable Warrants,
Release Warrants and custody warrants etc. are being generated by using the
Computer System. The Ahlmad only requires to select the serial number of
witness to be summoned and thereafter, the summons is automatically
generated showing the next date of hearing, time of appearance and the
purpose for which the summons/warrant has been issued. It saves a lot of
time for the Ahlmads and the summonses are generated in a legible format,
which can be duly acted upon by the concerned authorities. In the past,
number of reports were received regarding non-mentioning of complete
names and illegible handwriting in which the summon formats were filled in
and sent for service resulting in delays. With the introduction of
computerization of summons, this problem has been taken care of.
(xxiii)Training to the Staff - The District Courts had engaged the services of
NIIT in the initial stage to train the staff and judges, which ran a capsule
Page 24 of 37
25. course of 15 days for all the court officials. Moreover, intensive training was
provided by NIC to the staff regarding the customized software developed
for District Courts. Refresher courses are being run from time to time as and
when the need arises. New staff appointed in the District court is given
training to use the computer system in the most effective manner soon after
their appointment. Gradually we have developed our own faculty to take care
of the staff training and dependency on outside training agency is not
required.
(xxiv) Introduction of Digital Signatures - Since the volume of data being
sent and received by use of electronic means is increasing, a concern was
shown regarding security of the said valuable data. Need was felt to
introduce digital signatures for Judges. Digital signatures have been
provided to the Judges and the Court officials. After pronouncing the
judgments, the same are digitally signed and transmitted in a secured
environment to the intended recipients. The benefit of digitally signing a
document is that a third party will not be able to make alteration in the
contents of the document and the intended receiver on receipt can verify
whether the transmitted document has been in its original format or not.
Successful experiments have been made to transmit the bail orders to the jail
complexes from District Courts by using the digital signatures and very soon
it will be implemented on a large scale.
Page 25 of 37
26. (xxv) Provision of Photocopiers - The plans are afoot to provide one
photocopier to each Court so that the copies of the evidence recorded during
the trial and the orders/judgments pronounced by the learned Judge are made
available to the litigants there and then. It will save their frequent visits to
the Court Complexes and will result in lessening the burden of the Copying
Agency. It is worthwhile to mention here that as per Law, the Courts are
bound to supply free copies to all the under-trials lodged in Jails and to the
parties in Motor Accident matters. In other cases, copies have to be provided
as and when proper application is moved with requisite Court fees. Hence,
one photocopier in each Court is the minimum that is required to take care of
granting copies to the said applicants/parties.
(xxvi) Computers for Readers/Court Masters - Computers are also being
provided to the Readers/Court Masters as the said officials are also required
to maintain and update a number of registers like Peshi Register, Disposal
Register and they have to collect fine and prepare Fine Statement etc. In the
spare time, the said computers can be utilized by the additional Steno for
typing the judgments or orders. It is a step, which is necessary to be taken for
full computerization of District Courts. This proposal is being forwarded to
Delhi Government for approval.
(xxvii) District Courts Website - The District Court Website is a unique in-
house venture of District Courts of Delhi. It is the first Web-Site of District
Page 26 of 37
27. Judiciary in India, which is, updated daily. The entire Website was
developed by the Author and the same is being hosted successfully for the
last about two years. The website is available at www.delhicourts.nic.in.
It provides the Judges, Lawyers, litigants and the general public host of
facilities. Some of the highlights of the Web-site are :-
(a) History of the District Courts - The history of Delhi Courts has been
traced back to the year 1911 when the Commissionerate of Delhi was carved
out by a Proclamation Notification and from that date onwards all the
historical developments in the field of judicial history of Delhi have been
enumerated.
(b) Introduction - The brief background of all the three Court complexes
has been given. Specific Courts housed in the said Court complexes have
been detailed and direct links have been provided to the said Courts.
Introduction of the present District & Sessions Judge and a list of his learned
predecessors has been provided along with brief introductions of the Judges
In charge of Karkardooma Courts and Patiala House Courts.
(c) Jurisdiction - The jurisdiction of different types of Courts situated in
District Courts has been given. The Court numbers, names of the Judges,
their respective jurisdictions, specific room numbers and their place of sitting
have been listed. A special feature is the chart showing Police Station wise
Page 27 of 37
28. list of the Magistrates in which all the Police Stations of Delhi have been
alphabetically arranged. If a person knows the Police Station where crime has
taken place, he can track the concerned Court, where the case is pending
alongwith other details. It works as a guide to litigants. A list of all the
Special Courts in Delhi has been also provided, which deal with specific type
of offences under different law enactments.
(d) General Information - General information regarding types of cases,
place of filing, requisite documents to be filed alongwith specific types of
petitions, necessary Court Fees to be affixed etc. is provided in the General
Information Section.
(e) Important Links - Links have been provided to all the important legal
Websites available on the inter-net like Supreme Court of India, Delhi High
Court, National Crime Records Bureau, Delhi Police, Tihar Jail, different
Libraries and other Departments concerned with the District Courts.
(f) Other Legal Forums - All the other legal forums in Delhi have been
listed like FERA/FEMA Board, MRTP, NCDRC and State Consumer
Commission etc. and links have been provided to the Websites of the said
Forums is available.
(g) Tender/Bids - All the tenders and bids issued by the office of the District
Page 28 of 37
29. & Sessions Judge are being uploaded on the inter-net so that interested
vendors may submit their competitive quotations and the purchases can be
made in an open and fair manner.
(h) Daily Cause List - Cause Lists of all the Courts in the three District
Court Complexes are uploaded a day in advance on the inter-net and the same
are available after 6:00 PM. Lawyers and litigants can plan their visit to the
respective Court Rooms on the basis of the information provided in the Cause
Lists and it helps in reducing the rush in the Court Complexes in the morning
hours.
(i) Bail Cause List - Seven Sessions Courts in Delhi hear bail matters for
specific districts. The Cause Lists of these Bail Courts are also uploaded a
day in advance so that the Lawyers can plan their visit to appear in the said
Courts, where their bail matters are listed.
(j) Bare Acts - Bare Acts, which are necessary for running the Courts on day
to day basis have been provided with direct links so that as and when
required, a particular bare Act may be accessed and relevant section may be
extracted, copied, saved or printed.
(k) Pleading Forms - Most of the pleading forms used for filing in the
District Courts have been listed and their specimen formats have been
Page 29 of 37
30. provided on the Website so that Lawyers and litigants are able to use the said
forms for drafting pleadings.
(l) Daily Orders All the important interim orders passed by the District
Courts in Delhi are uploaded in secured PDF format on the same day so that
lawyers/litigants are able to access them by the evening. The orders can be
searched by name of the Judge and specific date of the said order. Daily
Orders are available on the Internet for a period of one month from the date
when they are pronounced.
(m) Availability of District Courts Judgments - Judgments pronounced by
District Courts are uploaded on the Internet by 6.oo p.m. in secured PDF
format so that the lawyers and litigants are able to access the said judgments
and there is no need to come to Court for their uncertified copy as prints can
be directly taken from the Website. It reduces the work load of the Copying
Agency and the visits of the public and the lawyers to the Court complexes.
Care is taken not to upload the judgments in matrimonial cases, rape matters,
Official Secret Act cases and other matters of sensitive nature.
(n) Judgments of Hon'ble High Court - Every month's judgments of the
Hon'ble High Court are uploaded on the District Courts Website after sorting
them subject-wise, party name-wise and Judge-wise. It helps the District
Court Judges to access the latest judgments of the Hon'ble High Court on the
Page 30 of 37
31. specific topics pending before the District Court Judges. The High Court
Judgments work as a guiding force for them and they are kept informed of the
latest developments in the field of law. Even lawyers and litigants have
found this feature quite useful in sharpening their legal skill and knowledge.
(o) Case Status - Any litigant can check the case status on the Internet where
he is a party by entering the name of any of the party/case number/Court
Number/Name of Judge. Free text search is also available. One can check
the case status even by entering the type of case if he is not sure of any of the
above parameters. It reduces the crowds in Court Rooms where
litigants/lawyers and their clerks visit only for enquiring the purpose for
which the case is fixed on the next date of hearing.
(p) Certified Copy Status - The certified copy status of the applications
filed in the three Court Complexes is available on the inter-net. If the copy is
ready, the party can visit the Copying Agency and collect the same. If the
copy is not ready then the probable date when the copy will be ready is
automatically displayed and there is no need to visit Copying Agency only for
the purpose of noting down the next date when the copy will be ready.
(q) On Line Enquiry Facility - To reduce the rush in the Courts, an on-line
enquiry facility has been provided on the Website. Litigants/lawyers can
submit their queries, which are answered on-line in least possible time. The
Page 31 of 37
32. enquiries can be related to any matter concerning their cases pending in
District Courts.
(r) Members’ Area - The Web-site also provides an exclusive members’
area for the District Court Judges. The telephone directories of the District
Courts and other important institutions are available. The list of judges with
their date of appointment and place of posting has been provided. In the E-
Journal Section, Judges are encouraged to publish their articles. All the
forms useful for the Judges, like Leave Applications, Medical Claim Form
and LTC form etc. with extracts of the relevant rules have been provided. It
saves the numerous rounds to the different branches to collect the forms and
to know the relevant rules. The Judges can also access their own personal
information like salary and leave details etc. on-line.
A discussion forum has been started where unique questions of
law are put to the participants who are encouraged to provide their view
points/solutions. The Judges may also file their computer related complaints
on-line, which are attended on priority. The members’ area is quite popular
with the members of District Judiciary.
(s) Service Rules – The service rules of Delhi High Judicial Service (DHJS)
and Delhi Judicial Service (DJS) have been published on the Website, so that
interested persons can view them. For the lawyers who wish to join judiciary,
Page 32 of 37
33. these rules are quite useful.
(t) Statistics– The periodical pendency statements in respect of all types of
cases are also published on the Website, which are quite helpful to
understand the trend of disposal of cases.
(u) Annual Report – We are the only District Court in India that
publishes every year Annual Report of the District Judiciary on its Website.
The Annual Report gives details of history of Courts organization, branches,
disposal trends and future vision etc. One of the resolutions in the Conference
of the Chief Ministers of the States and Chief Justices of the High Courts held
on September 18, 2004 in New Delhi is that one of the confidence building
measures among all the stakeholders in the justice delivery system is for the
Court system is to publish Annual Reports of achievements and use of
resources. In Delhi we have already achieved this target.
7. Future Plans: –
(i) Video Conferencing - A need was felt to establish Video conferencing
Studios in all the existing Court Complexes. As far as future Court
Complexes are concerned, plans have been made to introduce E-Courts in the
said Court Complexes, which will be fully equipped with Video
Conferencing facilities as well as other E-Governance paraphernalia. In the
present Court Complexes, efforts are being made to establish at least two
Page 33 of 37
34. Studios in each Court Complex to enable Video Conferencing between
Courts and Jails as well as between Courts and Witnesses, who are living at
far flung places and are unable to come to Court to attend the hearings. There
is a legal requirement to have Video Conferencing facilities in the Courts in
view of the judgment of the Hon'ble Supreme Court in the matter of Sakshi
vs. State as well as the judgment passed by our own Hon'ble High Court in a
child rape case where it was observed that the child is not to be exposed again
to the said alleged rapist during the trial and electronic means are to be used
to record his testimony.
(ii) Direct Connectivity with Delhi Police, Hospitals and Jails - In the
near future, we wish to go for direct connectivity with different Police
Stations in Delhi so that copies of FIR can be sent using E-mail and other
electronic facilities to the concerned Magistrates. The summons of police
witnesses can be also issued using electronic communication. Another area
where we want to concentrate is to have a direct link to the posting list of
Delhi Police. By the time a case reaches the evidence stage, the
concerned Police Officials, who are witnesses in a case stand transferred once
or twice and their present postings are not noted anywhere. It results in delay
in tracing the said witnesses. If the present posting status of over fifty-four
thousand strong Delhi Police is available on intra-net, our system can track a
particular police official using his PIS number and the summons can be
directly sent to his present place of posting. This way, the wastage of
Page 34 of 37
35. Court time in tracing the police officials can be minimized and disposal rate
will certainly increase.
Similarly, we require direct access to the data banks of different
hospitals as the Medico Legal Cases requiring opinion in respect of nature of
injuries, the availability of the doctors to depose in Courts and opinion of the
experts take a long time to reach the Court.
District Courts also we want to establish a direct access to the
Computer Systems of the Jail Authorities as on number of occasions, the
under trials are not produced due to one reason or the other. In some cases,
they are lodged in Jails under different names because at the time of arrest,
they did not disclose their real name by which they were earlier booked. The
identity can be ascertained on the basis of finger prints, Retina Identification
and other approved electronic identification kits so that the anomaly of
identifying a person only by his name is taken care of and accused are
produced in Courts on time. The bail orders can also be transmitted
electronically to Jail by e-mail in secured environment using digital
signatures.
(iii) Interactive Voice Response System – In India, the penetration of
computers is very low. Although most of the lawyers now have computers
and Internet facility but most of the litigants do not have these facilities
Page 35 of 37
36. available to them. To provide instant information to them, the District Court
has plans to introduce Interactive Voice Response System by providing
dedicated telephone numbers for enquiry. The litigants can dial these
numbers and a voice will guide them to make appropriate choices regarding
Court Complexes, type and number of Court, details of the case and then the
present status of the case will be intimated to him. The details provided are
the next date of hearing and the purpose for which the case is listed.
(iv) SMS Enquiry Facility for Lawyers/Litigants – The lawyers, who
will register for e-filing, they will be provided facility of automatic SMS
intimating them the next date of hearing and purpose for which their cases
have been adjourned. The litigants and other lawyers can send in their
queries at a given number by SMS and the latest details of their cases will be
sent back to them by SMS. It will save frequent visits to Courts by the
lawyers, their staff and litigants to know the present status of their cases.
(v) Minute to minute progress of Cause List on Internet - It has been
also proposed to provide minute to minute progress of the Cause Lists of the
Courts, so that the lawyers and litigants can come to know whether their
cases have been adjourned or their matters are still pending, so that they can
attend the same.
(vi) E-filing - The next big step is to go for E-filing. We are in the process
Page 36 of 37
37. of establishing infrastructure to allow the Lawyers to file civil cases in
electronic form. It is need of the hour as legislature has already allowed
electronic service of summons by use of e-mail and fax but it can become a
reality only when e-filing of cases is allowed. The availability of the
electronic copies of arguments and pleading in the system will improve the
efficiency of the Case Information Management System (CIMS), as there will
not be any need to type in the details mentioned in the said cases and the
summonses can be generated and dispatched to the parties by E-mail and fax
by enclosing the copy of the petition and documents available in electronic
form. The concerns and advice of different interested groups like Lawyers,
Litigants, Judges and the Staff as well as the Higher Authorities will be taken
into consideration before initiating E-filing in consonance with the laws of
the land.
In the end, it is reiterated that we have a vision to become the first District
Court in India to be fully computerized before the end of 2005 and to achieve
this target we are working tirelessly.
*****************
***********
*****
**
*
Page 37 of 37