it policy - himachal pradeshadmis.hp.nic.in/himachal/hpridc/hppwd it policy- draft.pdf · •it...

52
IT Policy PWD, Himachal Pradesh Wipro Ltd 1 Confidential IT Policy For Development of ICT Infrastructure in HPPWD and HPRIDC Submitted by: Submitted to: Wipro Ltd Himachal Pradesh Public Works department (HPPWD) This document is the property of Wipro Ltd., who owns the copyright thereof. The information in this document is given in confidence and without the written consent of Wipro Ltd., given by contract or otherwise, this document must not be copied, reprinted or reproduced in any material form, either wholly or in part. Also the contents of this document or any methods or techniques available there from, must not be disclosed

Upload: hahanh

Post on 16-Aug-2018

218 views

Category:

Documents


0 download

TRANSCRIPT

IT Policy PWD, Himachal Pradesh

Wipro Ltd 1 Confidential

IT Policy

For Development of ICT Infrastructure in HPPWD and HPRIDC

Submitted by: Submitted to:

Wipro Ltd Himachal Pradesh Public Works department (HPPWD)

This document is the property of Wipro Ltd., who owns the copyright thereof. The information in this document is given in confidence and without the written consent of Wipro Ltd., given by contract or otherwise, this document must not be copied, reprinted or reproduced in any material form, either wholly or in part. Also the contents of this document or any methods or techniques available there from, must not be disclosed

IT Policy PWD, Himachal Pradesh

Wipro Ltd 2 Confidential

Contents 1 Introduction ............................................................................................................................................ 5

2 Our approach ......................................................................................................................................... 7

3 Overview of HPPWD & HPRIDC ........................................................................................................... 8

3.1 Functions Performed by the Department ...................................................................................... 9

4 Recommendation and Road Ahead ..................................................................................................... 13

4.1 Technology .................................................................................................................................. 18

Network Architecture ............................................................................................................... 18

Solution Architecture ............................................................................................................... 20

Security Recommendations .................................................................................................... 24

Application List ........................................................................................................................ 28

Application Description ............................................................................................................ 30

Database Description .............................................................................................................. 36

4.2 Standards .................................................................................................................................... 38

Application and Development Standards ................................................................................ 38

Integration Standards .............................................................................................................. 38

Database Standards ............................................................................................................... 39

Localization & Language Technology Standards .................................................................... 42

Network Standards .................................................................................................................. 43

Security Standards .................................................................................................................. 43

Performance Requirement ...................................................................................................... 45

4.3 Training ....................................................................................................................................... 47

Training Approach ................................................................................................................... 48

Retraining of Existing Staff ...................................................................................................... 49

4.4 Progress Monitoring Parameters ................................................................................................ 49

5 Way Forward ........................................................................................................................................ 52

IT Policy PWD, Himachal Pradesh

Wipro Ltd 3 Confidential

Glossary

S. No. Abbreviation Full Form

1. BPR Business Process Re-engineering

2. CRF Central Road Funds

3. CE Chief Engineer

4. DC Data Center

5. DNIT Detailed Notice Inviting Tender (Bid Document)

6. DO Divisional officer

7. DRC Disaster Recovery Center

8. EE Executive Engineer

9. GIS Geographical Information System

10. GO Government Order

11. IP Infrastructure Project

12. JE Junior Engineer

13. NH National Highway

14. NIT Notice Inviting Tender (for publication purposes)

15. PMGSY Pradhan Mantri Gram Sadak Yojna

16. PPP Public Private Partnership

17. PWD Public Works Department

18. RFP Request for Proposal

19. RFQ Request for Qualification

20. SDC State Data Center

21. AE Assistance Engineer

IT Policy PWD, Himachal Pradesh

Wipro Ltd 4 Confidential

22. SE Superintending Engineer

23. SLA Service Level Agreement

24. WB World Bank

IT Policy PWD, Himachal Pradesh

Wipro Ltd 5 Confidential

1 Introduction

Public Works Department (PWD) & State Roads Project (HPRIDC) is a premier department of the

Himachal Government responsible for planning, developing, designing, construction, operation

and maintenance of roads, bridges and buildings in the State (which constitutes basic

infrastructure) with finances being provided by State Government, grant-in-aid / assistance from

Central Government or raising loans from Financial Institutions. Over the period under impetus

of infrastructure development number of roads, bridges and building projects being undertaken

by the Department have been on an increase every year. However, the human resources in the

department to handle these projects have been declining every year. The working of department

is both elaborate and exhaustive in terms of:

Project proposals and preparation of estimates

Arranging approval of project proposal and allocation of funds

Tendering for award of work to contracting agencies having previous experience of

executing similar works and meeting eligibility criteria.

Execution of works – requiring detailed measurements of executed quantities and

preparation of running-account and final bills.

Payments for executed work and fund flow

Monitoring and review of work and administering the Contract for work

Inspection of works by Engineers at various levels, exercise of quality control

Completion report, monitoring during defects liability period, handing over and

maintenance

Incidental works e.g. Arbitration, audit by Accountant General

Other administrative works i.e. human resource management

The above procedures and processes require lot of paper work in compliance with provisions of

rules and regulations of department’s working. With reduction in strength of engineering and

allied services staff at all levels and simultaneous increase in number of works relating to new

infrastructure to be developed and up-gradation and maintenance of existing infrastructure it is

imperative to strengthen institutional framework which also includes bringing in and adopting

strong tools like computerization, IT enablement, e-governance and automation at various level

in the department to bring effectiveness and efficiency in working. As a first step e-tendering has

been introduced and is being followed. As regard works approved and executed under PMGSY

scheme, e-governance is being followed. To certain extent for monitoring of works under a

particular scheme, e-governance has been adopted partially but not completely

The department shall not be the first to introduce computerization in day to day working as

parallel departments in various states have adopted e-governance partially in terms of

IT Policy PWD, Himachal Pradesh

Wipro Ltd 6 Confidential

“monitoring of approval of projects/works under various heads of accounts”, “allotment of funds

among sanctioned works approved under a scheme “record management system”, “record

management maintenance system” “Consolidation/Bank of Approval under each head of

account”, “consolidation of progress report of works approved under a scheme/head of account”

etc. The ideal situation would be paper-less working and all offices at various levels in the

department’s working and interacting with each other on-line and other communicating with

connected connecting departments on-line and simultaneously complying with requirements of

department rules, financial rules, accounts code, manual of orders etc. It is true that

departmental rules and regulations requires maintenance of some permanent records over a

specific period e.g. measurement book (MB) over a period of 100 years. Well here a thought

needs to be given that such Measurement Book (MB) in paper format may also be maintained

on completion of work in addition to soft copy. Further during execution of work itself, paper

format may also be followed in respect of hidden items of work which cannot be measured later

e.g. foundations of buildings and bridges.

The complete computerization has been envisaged in a phased manner and primary object refers to e-governance in work flow system of department to improve internal administrative efficiency, to bring in transparency and accountability in operations, effective systems for reducing paper work (particularly repetitive work) at all levels, efficient system for monitoring of projects, establish a real-time system for prompt and efficient decision making, integration of assets and efficient asset management, consolidation of inventory of roads, bridges and buildings for their maintenance, development of Project management systems etc.

The terms of reference under the present assignment:

Project Inception & Design

•SOW Understanding

•Understanding of organization structure, functions & services

•Requirement analysis

•AS-IS Study updation

•BPR & TO-BE processes report

•Financial Model & Cost Requirements

•IT Policy Formulation

Project Construction

•Preparation of TOR & RFP.

•Assistance in procurement process.

•Assistance in preparation of Contract agreement & SLA for System Integrator (SI).

Project Development

•Project Management

•Monitoring the progress of Project implementation by SI & Setting up of controls & mechanisms.

•Undertaking Quality audits.

•Project status summary

•Review of Project deliverables

Project Sustenance

•Assistance for adoption ofnew system.

•Change management services.

•Monitoring of SI as per SLAs.

•Project lerning documents.

•Knowledge transfer to State.

IT Policy PWD, Himachal Pradesh

Wipro Ltd 7 Confidential

2 Our approach

The purpose of this section is to provide the reader with an understanding of the approach adopted for preparation of this deliverable

Figure: Approach Adopted for Preparation of IT plan

Interaction

Interaction with officials of

each wing of PWD

Identify Functions of each wing

Capture the flow of

information/ data across wings

for each of the functions

Identify Issues and pain areas

for each wing

Simultaneously also study

examples of IT implementation

in similar organizations

Prioritization

Technology Definition

IT Plan Preparation

Prepare Recommendations for

addressing the pain areas

Prepare recommendations for

each pain area and identify

applications for the same

Prioritize the implementation

of applications on the basis of

need and feasibility

Validate the prioritization with

PWD

Prepare application definition

in line with the requirements

identified

Identify the interlink ages of

the applications identified

Identify networking security

and site requirements as per

technology required

Prepare IT Plan

Prepare Cost Estimates for

implementation of the budget

Define an Implementation Plan

and Approach

Define Training Needs for the

Implementation

IT Policy PWD, Himachal Pradesh

Wipro Ltd 8 Confidential

3 Overview of HPPWD & HPRIDC

HPWPD at Government level is headed by Principal Secretary (PW) to the Govt. of Himachal Pradesh, who holds Administrative responsibility for HPWPD. The Pr. Secretary physically located in the Secretariat and operates as the senior liaison between Government and HPPWD.

HPPWD at Directorate level is headed by a position of the Engineer-in-Chief (EnC) with Headquarters at Shimla. Works and matters regarding Codes, Specifications, Planning & Monitoring, and Inter-State Connectivity for the entire State and also the entire establishments of HPPWD are controlled by the Engineer-in-Chief. Engineer-in-Chief is responsible for all technical functions of the HPPWD. Engineer-in-Chief reports to Pr. Secretary (PW) to the Govt. of Himachal Pradesh.

In HPPWD there are one EnC (QC & D), 8 Chief Engineers (CE-cum-Project Director HPRIDC, CE Shimla Zone, CE Mandi Zone, CE Hamirpur Zone, CE Kangra Zone, CE PMGSY, and CE NH) who report to the EnC. Each Chief Engineers are responsible for each unit called ‘wing’/zone.

Engineer-in-Chief (Quality & Design) acts as State Level Quality Coordinator for achieving quality parameters of works in the State. Material Testing Laboratories at State level and Zonal Laboratories are under his control. He conducts quality control checks throughout the State. He is the in-charge for Standardization of Designs and Drawings for Buildings, Bridges and Assurance of common Technical Instructions, Manual of Order, Codes & Specifications, Schedule of Rates, Training Programs, Workshops and allied fields etc.

On administrative and functional considerations, the department has been divided into four zones namely Mandi Zone, Hamirpur Zone, Shimla Zone and Kangra Zone at Dharmshala.

Each zone is being headed by Chief Engineers and they are called as Zonal Chief Engineers. Zonal Chief Engineer deals with all works related to PMGSY, State Budget, RIDF, Annual plan, Maintenance, etc. They are responsible all works relating to DPR / Estimate preparation, tendering, and allotment of works, reviewing progress, monitoring, maintenance and expenditure.

Chief Engineer (National Highways) with headquarters at Shimla controls the Planning and Execution of works of National Highways traversing through the State.

Chief Engineer (PMGSY) is monitoring, planning and having day-to-day interaction with Govt. of India (MoRD) for the works of PMGSY and PMGSY (World Bank) funded projects through National Rural Road Development Agency (NRRDA).

The Zones (Buildings, Roads & Bridges), Electrical, Mechanical, Quality Control & Design and National Highways wing have filed offices called circles, which are headed by Superintending Engineers (SE) who reports to the concerned Chief Engineers for the administration and general professional controls of the public works being executed by officers of the department within their circles. There are 14 B & R circle, 2 Electrical circles, 1 Mechanical circle, 1 Arbitration circle,

IT Policy PWD, Himachal Pradesh

Wipro Ltd 9 Confidential

2 NH circle, 1 Land Acquisition Office, 1 Chief Architect Office. Each circle further divided into number of divisions, each headed by Executive Engineer.

There are 60 R&B divisions, 5 Electrical divisions, 2 Mechanical divisions, 5 NH divisions, 1 Land Acquisition office, 1 Architect Office. Each division further divided into sub-divisions, each headed by Assistant Engineers. There are 284 sub-divisions, 11 field offices viz. Arbitration office, Land Acquisition office, Architect office & Quality Control office.

Himachal Pradesh Road Infrastructure Development Corporation (HPRIDC)

Himachal Pradesh Road & Other Infrastructure Development Corporation Limited was incorporated in 10.06.1999 under the Companies Act, 1956, and it is wholly owned Company of Government of Himachal Pradesh. The main objective of HPRIDC is;

Construction of Roads/Bridges/Other infrastructure in the State of Himachal Pradesh

Maintenance of Roads/Bridges/Other infrastructure in the State of Himachal Pradesh

To act as a special purpose vehicle for resource mobilization on behalf of the State Government for all infrastructures projects and also discharge obligations on this account on behalf of the State Government from revenue other receipts accruing to the State Government from such projects

HPRIDC is headed by the rank of Chief Engineer and called as Project Director-cum-Chief Engineer HPRIDC.

3.1 Functions Performed by the Department

Public Works Department of Himachal Pradesh is primarily responsible for executing following

different types of development works;

Construction and maintenance of new roads, national highways & bridges

Construction and maintenance of residential and non-residential buildings

Construction of roads under centrally sponsored schemes

Undertaking deposit contribution works relating to different government

departments as well as of other local bodies

Resettlement works due to natural calamities like flood, earth quakes etc.

Construction of roads under employment guarantee scheme

Fixation of rent of private premises requisitioned for housing government offices

Developing parks and gardens in the vicinity of important public buildings and

landscaping of grounds

Providing reservation facility of government rest houses and circuit houses

To permit construction of approaches on both sides of roads to private individual,

other institutions, factories, petrol pumps etc.

IT Policy PWD, Himachal Pradesh

Wipro Ltd 10 Confidential

Making provisions for irrigation drains, electricity lines, telephone duct cables etc.

Along and across the roads

Facilitating evacuation of encroachment along the road sides

Landscaping along road sides

Construction of flyovers and airstrips

PWD undertakes two kinds of repairs for maintenance of buildings, viz., ordinary

repairs and special repairs. Ordinary repairs are carried out annually and include

activities like white washing, color washing, repairs of patches, replacement of small

broken parts, painting of doors, etc. Special repairs are less frequent and include

repairs to the damaged portions of the building, floors, doors and windows and

replacement of water supply and sanitary fittings.

Detailed Functions performed by various wings of HP PWD & HPRIDC is as below;

Road & Bridges Wing

Head of Road & Bridges wing is a Chief Engineer who looks after the functions of the wing which

are listed below;

Construction and maintenance of State buildings and their transfer from one

department to another

Construction and maintenance of building on behalf of other departments (except for

the Police Department)

Acquisition of land for construction of buildings and roads

Settlement of claims of contractors

Construction and maintenance of National Highways on behalf of Government of

India

Construction and maintenance of all roads in the State (except those owned by the

local bodies within municipal limits), bridges, ferries, tunnels, ropeways, causeways,

strategic roads, tactical roads, border area roads etc.

Toll levied by the State Government in connection with State subjects other then toll

levied by the Local bodies

Follow with Ministry of Railways with regard to development of railways and other

facilities provided by the Ministry of Railways

Construction of roads and bridges with funds made available by State Government

from budget allocations, by raising loan from Financial Institutions, by raising Bonds

and allocation under Central Road Funds (CRF)

IT Policy PWD, Himachal Pradesh

Wipro Ltd 11 Confidential

Construction of Rural links and development of Core networks through village roads

under PMGSY sponsored by Ministry of Rural Development, Govt. of India

Construction and maintenance of buildings of State Government departments with

funds provided under budget allocation, grant-in-aid/matching grant from Govt. of

India

Construction and maintenance of National Highways in the State with funds provided

by Ministry of Road Transport & Highways, Govt. of India

All aspects of tendering process right from the pre-qualification stage to the opening

of bids and its evaluation

Quality Control & Design Wing

Quality Check & Control Wing is headed by the rank of Engineer-in-Chief. It performs the

following functions;

Quality control wings monitors, manages and tracks all processes relevant to quality

assurance along with the entire execution of work.

Coordinates inspection processing and initiates corrective measures.

Create and maintain Quality Register

Capture test results/build test lab at sites

Generate National Quality Monitor/ State Quality Monitor

Track Action &Take report from site

To do inspection of site after complaint by any stakeholder of project.

National Highway Wing

Chief Engineer, National Highways looks after the improvement and maintenance of National

Highways. There are 2 NH circle and 5 NH divisions who reports to CE. The CE-NH reports to E-in-

C.

The functions of this wing are as follows;

Reduce the line of communication between the GoI and state authorities

Achieve efficiency in implementation by avoiding cumbersome and outdated

delegations for administrative and technical sanction which limit the ability of the

HPPWD to respond quickly

Achieve uniform maintenance & construction standard on National Highways

IT Policy PWD, Himachal Pradesh

Wipro Ltd 12 Confidential

Architecture Wing

Head of Architecture wing is Chief Architect who looks after the activities of the wing listed

below;

Generate Building Designs

Generate Preliminary Sketch/Concept Note/Master Plan/ Working Drawing/Detail

Drawing

It helps to maintain building designs/drawings and make them available centrally

It also assists to provide drawings for the estimate preparation

Generate feasibility report for any project undertaken by PWD or RIDC

Coordinates with other department (such as electrical, water & sanitation) for

Planning and estimate preparation

Arbitration Wing

Superintending Engineer Arbitration Circle Solan deals with the entire arbitration cases of the

Department viz.

Entry of Court Cases & Follow up actions

All the court cases registered against the department are centrally maintained in this

wing

It maintains the details of court case, status and make available to reporting seniors if

required.

Electrical Wing

Superintending Engineer (Electrical) controls the works related to electrical installation, central

heating, air conditioning, lifts, fire-fighting, fire alarm system, L.T. Sub-Station, Public Address

system and CCTV systems in all Govt. residential & non-residential buildings. There are two

electrical circles and 5 electrical divisions.

Mechanical Wing

Superintending Engineer (Mechanical) controls the works related to this wing. SE (Mechanical)

reports to CE (Road & Bridges). There are one mechanical circle and two mechanical divisions.

IT Policy PWD, Himachal Pradesh

Wipro Ltd 13 Confidential

4 Recommendation and Road Ahead

This section shall give a listing of the issues noted and illustrate actions that need to be taken by PWD for effective implementation of IT. Benefits of taking the proposed actions have also been listed to give reader an understanding of thought process behind the proposed action.

Public Works Department of Himachal Pradesh is primarily responsible for executing following

different types of development works;

Construction and maintenance of new roads, national highways & bridges

Construction and maintenance of residential and non-residential buildings

Construction of roads under centrally sponsored schemes

Undertaking deposit contribution works relating to different government

departments as well as of other local bodies

Resettlement works due to natural calamities like flood, earth quakes etc.

Construction of roads under employment guarantee scheme

Fixation of rent of private premises requisitioned for housing government offices

Developing parks and gardens in the vicinity of important public buildings and

landscaping of grounds

Providing reservation facility of government rest houses and circuit houses

To permit construction of approaches on both sides of roads to private individual,

other institutions, factories, petrol pumps etc.

Making provisions for irrigation drains, electricity lines, telephone duct cables etc.

Along and across the roads

Facilitating evacuation of encroachment along the road sides

Landscaping along road sides

Construction of flyovers and airstrips

PWD undertakes two kinds of repairs for maintenance of buildings, viz., ordinary

repairs and special repairs. Ordinary repairs are carried out annually and include

activities like white washing, color washing, repairs of patches, replacement of small

broken parts, painting of doors, etc. Special repairs are less frequent and include

repairs to the damaged portions of the building, floors, doors and windows and

replacement of water supply and sanitary fittings.

IT Policy PWD, Himachal Pradesh

Wipro Ltd 14 Confidential

The list of different processes for PWD is as below:

Sr.

No. Name of the Process

A Execution Process

1. Preparation of estimate for Road work and its Administrative Approval(State Budget)

2. Preparation of Estimate for Bridge Works (Original Work) and its Administrative Approval (State Budget)

3. Preparation of estimate for Original Building Work & its Administrative Approval

4. Preparation of detail estimate and its technical Sanction

5. Checking of Estimations / DPR(State Budget)

6. Preparation and Approval of Structural Design

7. Revision of Estimate & Approval(State Budget)

8. Time Extension request under contract(State Budget/PMGSY/NABARD)

9. Execution of Deposit Work

10. Progress monitoring (Physical and Financial)

11. Annual Maintenance Plan(Roads)

12. Preparation of Annual Plan

13. Enlistment of Contractor (C & D level)

14. Enlistment of Contract(A & B level)

15. Tendering and Contract Management

16. Deviation in work(State Budget, NABARD)

17. Approval of works under CRF, ISC, EI scheme (Ministry of Roads, Transport & Highway)

18. Release of funds under CRF / Interstate Connectivity / Economical Important scheme

IT Policy PWD, Himachal Pradesh

Wipro Ltd 15 Confidential

19. Approval of works under NABARD( Rural Infrastructure Development Fund – RIDF)

20. Release of funds by NABARD under RIDF

21. Approval of work under PMGSY

22. Payment under PMGSY

23. Release of fund under PMGSY

24. Purchase Plan

25. Purchase Of Material

26. Issue of material

27. Approval for repair of Government vehicles / Machinery

28. Preparation of estimate for Bridge work and its approval (Mechanical work)

29. Purchase of Machinery/Vehicles

30. Annual maintenance Plan for Electrical Work

31. Preparation of Estimate for electrical installation at site and its approval

32. Preparation of estimate for NH works

33. Billing & Payments(NH)

34. Annual Plan for NHs( Ministry of Road & Highway, GOI)

35. NOC for retail outlet / access to private properties / construction of new buildings

36. Land Acquisition process of National Highway( Under the National highway act,1956)

37. Release of NOC(Other than NH)

38. Estate Office

39. Revision of SOR

40. Issue of MBs

41. Processing of complaints- Vigilance Cell

42. Requisition of Vehicles

43. Requisition of IT equipment

IT Policy PWD, Himachal Pradesh

Wipro Ltd 16 Confidential

44. Process of Arbitration

45. Meetings Management

B Financial Process

1. Budget Allotment

2. Billing and Payment

3. Audit of Records

4. Release of LOC

5. Reconciliation of expenses

6. Payment under establishment(other than salary)

C Common Process

1. File Movement in PWD Office

2. RTI processing

3. Assembly Question

4. Procedure to defend court cases in subordinate courts

5. Procedure to defend court cases in High court / Supreme Court

6. Process of E-Samadhan

7. Petty Purchase

8. Purchase of items through DGSND

D Quality Control Process

1. Technical testing of material

2. Inspection of Work

3. Inspection of work based on complaints

4. Inspection of PMGSY Work

E HPRIDC Process

1. Approval of Project under HPRIDC

IT Policy PWD, Himachal Pradesh

Wipro Ltd 17 Confidential

2. Approval of DPR under HPRIDC

3. Tendering & Contract agreement of Consultant under HPRIDC

4. Tendering & contract agreement of Contractors under HPRIDC(up gradation work)

5. Billing & payment of contractor under HPRIDC

6. Time Extension based on Variation under HPRIDC

7. Approval Of variation Quantity

8. Approval of Black spot work under HPRIDC

9. Periodic Maintenance work under HPRIDC

10. Billing & Payment of periodic Maintenance Work

11. Dispute Management under HPRIDC

12. Complete work flow of up gradation work under HPRIDC

F Human Resource Process

1. Service Record Book

2. Earned Leave

3. Transfer of Employee

4. Sanction of Leave other than Earned Leave

5. Promotion(Group C Employees)

6. GPF Management

7. Loan/Withdrawal through GPF

8. Promotion (Group A&B Employees)

9. Release of Pension- Payment Order (Gratuity, Pension, Commutation of Pension)

10. No objection Certificate for Pensioner Benefits

11. GPF – Payment on Retirement

12. GPF Number Allotment

IT Policy PWD, Himachal Pradesh

Wipro Ltd 18 Confidential

4.1 Technology

On the basis of the identified solutions for the issues faced in the execution of the work of PWD, the technological recommendations have been devised as shall be illustrated in the subsequent sections.

Network Architecture

The applications shall be hosted at the SDC. All the Users on internet will access the application/interface servers located in the public zone and the departmental users on intranet shall be accessing the application from Sub Divisional offices, Circle, etc.

All the Branches will get terminated at the SDC. The Connectivity between the various branches / State Data Center / Disaster Recovery Centre will be as per the following Diagram

Networking forms the back-bone of any IT infrastructure setup in the current period. Data and functional integrity between the applications installed at different locations depends on the networking connectivity between the locations. Reliable and high bandwidth connectivity between all the offices of PWD will make a centralized architecture feasible that will remove duplicate data entry and make the information flow across the hierarchy smooth. However, it is important to note that the implementation of a state-wide network infrastructure is a part of national e-Governance programme; therefore PWD shall use HIMSWAN for the implementation

IT Policy PWD, Himachal Pradesh

Wipro Ltd 19 Confidential

its proposed ERP solution. HIMSWAN should be utilized as the communication backbone for connecting HPPWD offices (up to Divisional Office level). Offices outside the span of HIMSWAN Point of Presence (POP) can be connected through optimal connectivity means like Optical Fiber Cable (OFC) or leased lines as per requirement and availability. However, wherever, it is not possible to have network connectivity using these options, department can consider using broadband connection over VPN

But, looking at the pace of implementation and connectivity problem at the offices located at

remote locations, it is therefore suggested that all the proposed ERP solution shall have the

architecture that works in both offline and online mode with the central server at the State Data

Centre. The architecture should be such that it supports the synchronization of data with

centralized database when the systems work in offline mode to consolidate the data at the

central database (refer below Figure). The offline and online mode is dictated by the reliability

and bandwidth of the connectivity between the office and the central server. The offline mode

shall be case only when the required reliability and bandwidth is not available. It is hoped that

when the HIMSWAN implementation is fully implemented all the offices of PWD shall be

functioning in online mode.

IT Policy PWD, Himachal Pradesh

Wipro Ltd 20 Confidential

Solution Architecture

The application will be hosted on the Himachal State Data Center. The application will be

accessible to the administrator, department users, citizens and business. Various components of

the solution are shown on in the fig. below:-

IT Policy PWD, Himachal Pradesh

Wipro Ltd 21 Confidential

Users

Users of the application are department employees, Citizens and contractors etc.

o Citizens

The citizens can register themselves via Portal. Once registered, citizens will be able to log

into the Portal using their credentials and will access the portal services for which they

are authorized. Citizen registration or can fill applications and track the status of their

requests / road complaints through web browser as well as mobile devices via SMS. The

Portal will make the public content available to all users without authentication.

o Business Users (Contractors)

Contractor will register on the portal for the enlistment, submit bills online, submit

project progress reports any project related communication with the contractor will be

done through the online system.

o Departmental Users

Department users will access the application as per the predefined roles to take action on

the work-items and update the project status. Users will use system for their day to day

activities and generate MIS. Any departmental communication between the employees

will be done through the system.

Presentation Layer

The proposed solution will provide a way for users (PWD Employees, Contractors, Business and

Employees of PWD) to interact with the application. User interfaces are implemented using

different technologies to render and format data for users and to acquire and validate data

coming in from them. Under the proposed system a web based portal and Mobile based will

facilitate the communication between the Public Works Department and Business Entities and

Citizens of Himachal Pradesh.

Service Layer

The service components are the critical elements of the proposed model. These elements define

the way in which the request will be entertained, processed and finally executed.

o Service agents: When a business component needs to use functionality provided in an

external service, you may need to provide some code to manage the semantics of

communicating with that particular service. Service agents isolate the idiosyncrasies of

calling diverse services from your application, and can provide additional services, such

IT Policy PWD, Himachal Pradesh

Wipro Ltd 22 Confidential

as basic mapping between the format of the data exposed by the service and the format

the proposed application requires.

o Service interfaces: To expose business logic as a service, service interfaces are created,

that supports the communication contracts (message-based communication, formats,

protocols, security, exceptions, and so on) it’s different user’s require. Service interfaces

are sometimes referred to as business facades.

To-Be Processes

The proposed application will have embedded improved To-Be processes as the core mechanism

for the execution of work. These processes will detail out the optimum way by which the work

will be executed. The proposed ‘To-Be’ processes will define the work flow, the roles and

responsibilities of the service personnel – process owners, main and participating actors,

information and data flow, decision points, starting and completion criteria, constituent

activities, rules and regulations for the actors, workflow , service levels etc.

Business Layer

Application layer will be the technology within which the To-Be processes will be embedded. This

layer would define all the functionality and work flow of service delivery and contains all the

possible logics based on acts, rules, government orders, departmental orders, etc. This layer will

contain the defined way through which the user can interact with the application – provide

required input to the system and get output from the system. Also, this backend supports an

intelligent Management Information System (MIS) so as to perform the defined functionality for

monitoring and reporting associated with the selected services.

Additionally, this layer would interact directly with the application process and perform common

application services based on the service request. It will also ensure that effective communication

between all the components in a network is possible.

o Business entity components

The Proposed application requires data to be passed between components. The data is

used to represent real-world business entities, such as services and applications. The

business entities that are used internally in the application are usually data structures,

such as Datasets, Data Readers, or Extensible Markup Language (XML) streams, but they

can also be implemented using custom object-oriented classes that represent the real-

world entities your application has to work with, such as a service or application.

o Business components

Regardless of whether a business process consists of a single step or an orchestrated

workflow, the proposed application will require components that implement business

IT Policy PWD, Himachal Pradesh

Wipro Ltd 23 Confidential

rules and perform business tasks. Business components implement the business logic of

the application

Database Layer

The database layer will host any data that is persisted or consumed by the application. Relational

databases housing application data, content repositories, Directory, external storage are

examples of components that will be part of Database layer. This layer will be the centralized

data repository for the contents and associated attached documents by user department. Along

with the service related data, the repository will also hold the information documents along with

archives of the content available on the portal.

The data storage and handling will also be a backend task as defined by the system in specified

structure. Advantages of proposed service component based architecture:

Introduces one comprehensive data repository ensuring

Reduced duplication of effort

Removal of redundancy from the processes

Cross verification of information

Easy access to inter-departmental data

Reduced requirements for verification

Scope for innovations

Data access logic components

The application and the services will need to access a data store at some point during a business

process. It makes sense to abstract the logic necessary to access data in a separate layer of data

access logic components. Doing so centralizes data access functionality and makes it easier to

configure and maintain.

Components for security, operational management, and communication

The Proposed application will probably also use components to perform exception management, to authorize users to perform certain tasks, and to communicate with other services and applications

IT Policy PWD, Himachal Pradesh

Wipro Ltd 24 Confidential

Security Recommendations

Security can be sub-divided into two broad categories of Logical Security and Physical Security. The logical security can be defined as the electronic security to maintain data integrity and prevent any unauthorized access/modification of data. On the other hand, the physical security deals with security of the physical infrastructure and protects it from any physical damage

4.1.3.1 Logical Security

Logical Security comprises of security needed for the data and the applications from malicious/ harmful code or attacks or data on the network and the internet. It shall broadly comprise of the following components:

Firewall- A firewall is a dedicated appliance, or software running on another computer, which

inspects network traffic passing through it, and denies or permits passage based on a set of rules.

A firewall's basic task is to regulate some of the flow of traffic between computer networks of

different trust levels. As the firewall shall provide perimeter security at the Data Center. Due to

its relatively high importance in the system, the following design criteria have been decided for

this-

High Availability

Support for virtual firewall / sliced firewall functionality

Support for multiple types of VPN

Ability to handle different network segments

Intrusion Prevention System- An intrusion prevention system is a computer security device that

monitors network and/or system activities for malicious or unwanted behavior and can react, in

real-time, to block or prevent those activities. Network-based IPS, for example, will operate in-

line to monitor all network traffic for malicious code or attacks. When an attack is detected, it

can drop the offending packets while still allowing all other traffic to pass.

The intrusion prevention system offered shall need to include content filtering gateway to

provide protection against malicious content in the form of modified data packets, corrupt codes

etc. The Content Security Gateway scans data in real-time as it enters the network, unlike

traditional anti-virus software, which requires files to be written to disk before scanning

commences. It also provides effective protection against new blended attacks, which may render

systems vulnerable.

High Availability

Protection from zero day attacks

Detection from attacks such as TCP hijacking, Trinoo, TFN, SYN Floods etc.

Monitoring of various protocols such as TCP/IP, ICMP, UDP, FTP, RPC, DNS, HTTP, etc.

Protection against Viruses, Spam, Adware, Spyware, etc.

IT Policy PWD, Himachal Pradesh

Wipro Ltd 25 Confidential

Administration & Monitoring- Robust reporting capabilities, advanced notification options, and

an intuitive web-based console should be used to enable effective administration and monitoring

of the data center. An Enterprise Management Solution needs to be considered to facilitate

monitoring and administration of the IT infrastructure installed at the Data Centre. Care has to

be taken that a 24x7 Administration & Monitoring Capability is provided.

4.1.3.2 Physical Security

In addition to the logical security being offered to the data center from malicious/ harmful data

packets on the internet, the physical infrastructure would need to be protected from physical

threats as well. Physical security is the protection of personnel, hardware, programs, networks,

and data from physical circumstances and events that could cause serious losses or damage to

an enterprise, agency, or institution. This includes protection from fire, natural disasters,

burglary, theft etc. Moving in this direction, Physical Security shall comprise of the following

components:

Environment

Careful site selection and accommodation planning of a purpose-built computer

installation shall be conducted. Reference to the security specifications for construction

of special installation or office as standard should be made

Data centres and computer rooms shall have good physical security and strong protection

from disaster and security threats, whether natural or caused by other reasons, in order

to minimise the extent of loss and disruption.

Backup media containing business essential and/or mission critical information shall be

sited at a safe distance from the main site in order to avoid damage arising from a disaster

at the main site

Equipment Safety

All information systems shall be placed in a secure environment or attended by staff to

prevent unauthorised access. Regular inspection of equipment and communication

facilities shall be performed to ensure continuous availability and failure detection

IT Policy PWD, Himachal Pradesh

Wipro Ltd 26 Confidential

Staff in possession of mobile device or removable media for business purposes shall

safeguard the equipment in his/her possession, and shall not leave the equipment

unattended without proper security measures.

IT equipment shall not be taken away from sites without proper control

Physical Access Control

A list of persons who are authorised to gain access to data centres, computer rooms or

other areas supporting critical activities, where computer equipment and data are located

or stored, shall be kept up-to-date and be reviewed periodically

All access keys, cards, passwords, etc. for entry to any of the information systems and

networks shall be physically secured or subject to well-defined and strictly enforced

security procedures

All visitors to data centres or computer rooms shall be monitored at all times by

authorised staff. A visitor access record shall be kept and properly maintained for audit

purpose

All staff shall ensure the security of their offices. Offices that can be directly accessed from

public area and contain information systems or information assets should be locked up

when not in use or after office hours

In line with the above conditions the following measures need to be taken-

Restricting the entry of personnel in the room by allowing only pre-authorized

officials/staff into the Data Centre using authentication procedures.

In addition to this a 24 x 7 surveillance comprising of CCTVs and sensors (heat,

temperature, etc.) are needed to keep track of all conditions in the data center- Entire

Data Centre should be covered using Closed Circuit Video Surveillance, Recording and

Replay facilities. Use of Motion Sensors is preferable.

The CCTV surveillance system should support operations in duplex communication

(record and relay) mode.

The recorded video should be stored for a minimum period of 6 months.

A 24-hour battery power backup is required for the access control system including the

electric door lock(s).

The access control system should also be connected to the UPS if it is installed.

The entrance to the building shall be guarded by the Building Management’s Security

Guards. At the reception, guards provided by the State shall be deployed and shall capture

details of all visitors. Scanning of all personnel before entry into data Centre would be

mandatory.

IT Policy PWD, Himachal Pradesh

Wipro Ltd 27 Confidential

Heavy-duty electric lock has been recommended for the main entrance doors. With time

delay setting, the lock would effect after time is over. The lock must be fail-safe type.

Panic Bolt should be provided at the emergency exits.

4.1.3.3 Access Control Security

Data Access Control

Access to information shall not be allowed unless authorized by the relevant information

owners

Data access rights shall be granted to users based on a need-to-know basis

Data access rights shall be clearly defined and reviewed periodically. Records for access

rights approval and review shall be maintained

Access to information systems containing information classified CONFIDENTIAL or above

shall be restricted by means of logical access control

Authentication

Access to classified information without appropriate authentication shall not be allowed

Authentication shall be performed in a manner commensurate with the sensitivity of the

information to be accessed

Consecutive unsuccessful log-in trials shall be controlled.

User Identification

Each user identity (user-ID) shall uniquely identify only one user.

Users are responsible for all activities performed with their user-IDs

User Privileges Management

Procedures for approving, granting and managing user access including user

registration/de-registration, password delivery and password reset shall be documented

All accounts shall be revoked after a pre-defined period of inactivity

User privileges shall be reviewed periodically

The use of special privileges shall be restricted and controlled

IT Policy PWD, Himachal Pradesh

Wipro Ltd 28 Confidential

Password Management

Passwords shall not be shared unless necessary (e.g., helpdesk assistance, shared PC and

shared files). The risk of sharing passwords is that it increases the probability of security

being compromised

Passwords shall always be well protected when held in storage. Passwords shall be

encrypted when transmitted over an un-trusted communication network

All vendor-supplied default passwords shall be changed before any information system is

put into operation

All passwords shall be promptly changed if they are suspected of/are being compromised,

or disclosed to vendors for maintenance and support

Mobile Computing and Remote Access

Appropriate security measures shall be adopted to avoid unauthorized access to or

disclosure of the information stored and processed by these facilities. Authorized users

should be briefed on the security threats, and accept their security responsibilities with

explicit acknowledgement

Employees are prohibited from connecting workstations and mobile devices to external

network by means of communication device, such as dial-up modem, wireless interface,

or broadband link

Security measures shall be in place to prevent unauthorized remote access to Department

information systems and data

Unauthorized computer resources including those privately-owned shall not be

connected to Department internal network. If there is an operational necessity, approval

from Department should be sought

Application List

The main objective of introducing IT in an organization is to bring efficiency and transparency in the core and support business functions. PWD needs specific software applications to support its core and support business, therefore a list of core and support applications have been proposed

A. Primary Applications

Budget Allocation and Management

Work Execution

Project Planning

Road and Bridge Inventory

Routine Maintenance Management

IT Policy PWD, Himachal Pradesh

Wipro Ltd 29 Confidential

Finance and Accounts Management

Quality and Control

Purchase and Store

Traffic Management System

Tools and Machinery

Grievance System

Legal and Arbitration

HRMS

B. Base Application

Web Portal

Digitization of SOR

Contractor Empanelment System

User Dashboard and Profile

MIS

User Management Module

IT Policy PWD, Himachal Pradesh

Wipro Ltd 30 Confidential

Application Description

IT Policy PWD, Himachal Pradesh

Wipro Ltd 31 Confidential

Process Module Mapping

Module / Sub Module Description Mapped To-Be Process

Work Execution

Estimation Preparation Technical sanction &

approval Architecture Design Process Tender Management Work Allocation &

Agreement Progress Monitoring of Work Work Deviation Time Extension

This module takes care of all the work execution related activities of Department like estimation and DPR preparation, technical sanction and approval of competent authorities.

1. Preparation of estimate for Road work and its Administrative Approval(State Budget)

2. Preparation of Estimate for Bridge Works (Original Work) and its Administrative Approval (State Budget)

3. Preparation of estimate for Original Building Work & its Administrative Approval

4. Preparation of detail estimate and its technical Sanction

5. Checking of Estimations / DPR(State Budget)

6. Preparation and Approval of Structural Design

7. Revision of Estimate & Approval(State Budget)

8. Time Extension request under contract(State Budget/PMGSY/NABARD)

9. Execution of Deposit Work 10. Progress monitoring

(Physical and Financial) 11. Preparation of Annual Plan 12. Deviation in work(State

Budget, NABARD) 13. Approval of works under

CRF, ISC, EI scheme (Ministry of Roads, Transport & Highway)

14. Approval of works under NABARD( Rural Infrastructure Development Fund – RIDF)

IT Policy PWD, Himachal Pradesh

Wipro Ltd 32 Confidential

15. Approval of work under PMGSY

16. Approval for repair of Government vehicles / Machinery

17. Preparation of estimate for Bridge work and its approval (Mechanical work)

18. Preparation of Estimate for electrical installation at site and its approval

19. Preparation of estimate for NH works

20. Annual Plan for NHs( Ministry of Road & Highway, GOI)

21. NOC for retail outlet / access to private properties / construction of new buildings

22. Land Acquisition process of National Highway( Under the National highway act,1956)

23. Release of NOC(Other than NH)

24. Issue of MBs 25. Meetings Management 26. Approval of Project under

HPRIDC 27. Approval of DPR under

HPRIDC 28. Time Extension based on

Variation under HPRIDC 29. Approval Of variation

Quantity 30. Approval of Black spot work

under HPRIDC 31. Periodic Maintenance work

under HPRIDC

Asset management

Annual maintenance plan

This module shall handle the roads inventory of the state. It

1. Annual Maintenance Plan(Roads)

IT Policy PWD, Himachal Pradesh

Wipro Ltd 33 Confidential

Tools and Machinery Routine maintenance

System Road and Bridge Asset

Register (GIS based) Traffic Information system

shall store data pertaining to roads inventory, roads surface condition, pavement, deterioration, condition of bridges, etc. in respect of all the roads in the state. It shall provide comprehensive MIS in respect of the roads in the state. The outputs shall be viewable on textual and map interfaces

2. Purchase of Machinery/Vehicles

3. Annual maintenance Plan for Electrical Work

4. Estate Office 5. Requisition of Vehicles 6. Requisition of IT equipment

Project Planning

Activity Planner Work Flow Management Resource Allocation MIS reporting

This module will take care planning of project activities and define deliverables and further workflow / resource required for completion of activities.

1. File Movement in PWD Office

Financial & Accounts Management

Budget Pre Planning Budget Approval Process Budget Allocation System Budget Monitoring Billing and payment to

Contractor Billing and payments

This Module will improve governance by providing real – time financial information that can be used to administer programmes effectively, formulate budgets and manage resources. Financial and Accounts Management System will computerize the key aspects of budgeting and accounting operations

1. Budget Allotment 2. Billing and Payment 3. Audit of Records 4. Release of LOC 5. Reconciliation of expenses 6. Payment under

establishment(other than salary)

7. Billing & Payments(NH) 8. Release of funds under CRF

/ Interstate Connectivity / Economical Important scheme

9. Release of funds by NABARD under RIDF

10. Payment under PMGSY 11. Release of Fund under

PMGSY 12. Billing & payment of

contractor under HPRIDC

IT Policy PWD, Himachal Pradesh

Wipro Ltd 34 Confidential

13. Billing & Payment of periodic Maintenance

Purchase & Store The purchase and Store Management System should consist of computerized database of the store inventory, including records of receipts & issues, stock-in-hand etc.

1. Purchase Plan 2. Purchase Of Material 3. Issue of material 4. Petty Purchase 5. Purchase of items through

DGSND

Quality and Control This module will help in working of quality and control cell like testing of material and test report generation

1. Technical testing of material 2. Inspection of Work 3. Inspection of work based on

complaints 4. Inspection of PMGSY Work

Scheme Management Scheme Management System will comprise of Master Data for various Scheme PMGSY and Scheme Codes

To manage Scheme wise database like

1. Scheme Codes 2. Start and End Date 3. Budget 4. Approval and Authorization 5. Physical and Financial

Reports

Digitization of SOR This module shall manage the detail of category wise and item wise schedule rates of all construction items being followed by the department of PWD or any other engineering wing

1. Revision of SOR

Contract Management This module shall manage the inventory of all the approved contractors PWD and

1. Enlistment of Contractor (C & D level)

2. Enlistment of Contract(A & B level)

IT Policy PWD, Himachal Pradesh

Wipro Ltd 35 Confidential

RIDC, registration of new contractors etc.

3. Tendering and Contract Management

4. Tendering & Contract agreement of Consultant under HPRIDC

5. Tendering & contract agreement of Contractors under HPRIDC(up gradation work)

Legal and Arbitration 1. Procedure to defend court cases in subordinate courts

2. Procedure to defend court cases in High court / Supreme Court

3. Dispute Management under HPRIDC

4. Process of Arbitration 5. RTI Processing 6. Processing of complaints-

Vigilance Cell

IT Policy PWD, Himachal Pradesh

Wipro Ltd 36 Confidential

Database Description

In line with the application description developed in the previous section, the database

description has been defined as listed in the following table (it defines the data that shall be

stored in different groups and their interlink ages).

Data base Instance Accessing departmental Application

Wings or Branches using the application

Full Access Partial Access

Work execution Engineering Engineering Project Management

Project Planning Project Management

Project Management/ Engineering

Project Management

Tendering Tendering Engineering Project Management

Finance and Accounts Management

Finance and Billing

Finance/Engineering Project Management

Budget Allocation

and Management

Project Management

Finance/Engineering Project Management

Quality and Control Quality Assurance and Inspection

Engineering

RTI ,Legal Cases

,Grievance System

and Arbitration

RTI and Legal Cases

Legal/Engineering

Human Resource and Management

Human Resource and Management

HRM

Road and Bridge

Inventory

Asset Management

Engineering Finance/Engineering/GIS

IT Policy PWD, Himachal Pradesh

Wipro Ltd 37 Confidential

Data base Instance Accessing departmental Application

Wings or Branches using the application

Routine Maintenance Management

Engineering GIS and Engineering

Purchase and store Engineering Project Management/ Engineering

Finance/Engineering

Tools and

Machinery

Engineering Engineering Finance/Engineering

Contractor

Empanelment

System

Engineering Engineering Finance/Engineering

MIS & Miscellaneous

MIS & Miscellaneous

MIS and Engineering

All the wings

User Management User Management

User Management All the wings

IT Policy PWD, Himachal Pradesh

Wipro Ltd 38 Confidential

4.2 Standards

The objective of this section is to provide a view of the standards that need to be taken care of

the by software development agency to ensure future integration with applications in other

departments and/or the new applications that shall be implemented in the future

Application and Development Standards

Software applications shall have the capability to securely exchange information and integrate or

interoperate with other applicable or related software applications. The vendor shall develop and

deploy the Software applications with the following:

Vendor shall develop on open interface, interoperable Service oriented architecture

Common, proven, pervasive, and open software products (programming, database, and

productivity software) to provide a consistent framework to enable integration,

communication, and interoperability.

Non-proprietary technologies, wherever possible, to facilitate integration and

interoperability

Use of XML formats for data transferring between different databases

Application should be web browser based

Application should have n-tier architecture

Application with middleware component for purpose of integration

Software applications should utilize target platform and network operating systems to

allow for common, open-standards-based, management tools that are deployable at

State Data Centre and can easily integrate with Enterprise Architecture domains and their

extension to management of applications

Integration Standards

For integration of different applications, use XML, ebXML standards. Using these standards

applications are required to be seamlessly integrated.

IT Policy PWD, Himachal Pradesh

Wipro Ltd 39 Confidential

Database Standards

Data management is the management of all data/information in an organization. It includes data

administration, the standards for defining data and the way in which people perceive and use it.

The database connectivity and report and analysis depend on the data base design capability.

Therefore the vendor shall follow following standards but not limited to with regard to database

connectivity or reporting & analysis. The following database capability standards are

recommended.

Availability

Database Server should be highly available with every processing node providing full view

of data.

Database Server must support Clustering exploiting rapidly emerging disk storage and

interconnect technologies

Manageability

Single system Management view which could be a part of the overall Enterprise

Management System

A centralized, lightweight console as a primary interface for performing all management

tasks

Centralized management of user privileges

Scalability

Flexibility and effortless scalability

Security

Restrictive data access that enables users from different departments to have secure,

direct access to mission-critical data sharing

Encryption capabilities while transferring data over networks, and ability to encrypt data

stored in the database at the column level

Public Key Infrastructure (PKI) support

Support for enhanced authentication

Comprehensive auditing for inserts/ deletes/ updates / selects to quickly spot and

respond to security breaches.

Automated Disaster Recovery solution to maintain consistent transactional copies of

database

Operational Features

Database must function on Multiple Operating System Platform

Ability to index, search, and analyze data

IT Policy PWD, Himachal Pradesh

Wipro Ltd 40 Confidential

Support different partitioning schemes to split large volumes of data into separate pieces

or 'partitions' which can be managed independently

Embedded data mining capabilities

Queue management should support queue persistence, queue logging, recoverability etc,

conforming to open standards

Database Connectivity – Defines the protocol or method in which an application connects to

a data store or database.

Java Database Connectivity (JDBC) – JDBC provides access to virtually any tabular data

source from the Java programming language. It provides cross-DBMS connectivity to a

wide range of SQL databases, and other tabular data sources, such as spreadsheets or flat

files.

Open Database Connectivity (ODBC) – A database programming interface from Microsoft

that provides a common language for Windows applications to access databases on a

network. ODBC is made up of the function calls programmers write into their applications

and the ODBC drivers themselves.

Object Linking and Embedding/Database (OLE/DB) –OLE/DB allowed connectivity to

ODBC-based SQL providers/sources as well as other formats such as text and comma

delimited.

Reporting and Analysis – Consist of the tools, languages and protocols used to extract data

from a data store and process it into useful information.

Extensible Business Reporting Language (XBRL) – Extensible Business Reporting

Language (XBRL is an open specification which uses XML-based data tags to describe

financial statements for both public and private companies.

Java Online Analytical Processing (JOLAP) – JOLAP is a Java API for the J2EE environment

that supports the creation and maintenance of OLAP data and metadata, in a vendor

independent manner.

Online Analytical Processing (OLAP) – Decision support software that allows the user to

quickly analyze information that has been summarized into multidimensional views and

hierarchies.

XML for Analysis – XML for Analysis uses the Simple Object Access Protocol (SOAP) to let

Web browser based programs access backend data sources for data analysis. The

specification allows companies to build online analytical processing (OLAP) and data

mining applications that work over the web.

IT Policy PWD, Himachal Pradesh

Wipro Ltd 41 Confidential

Backup Policy

Objective

To counteract interruptions to business activities and to critical business processes from the

effects of major failures or disasters; to maintain the integrity and availability of information

processing and communication services

Purpose

Routine procedures should be established for carrying out the agreed back-up strategy taking

back-up copies of data and rehearsing their timely restoration, logging events and faults and,

where appropriate, monitoring the equipment environment. In order to safeguard

information and computing resources from various business and environmental threats,

systems and procedures shall be developed and implemented for backup of all business data,

related application systems and operating systems software. This shall be done on a

scheduled basis and in a standardized manner across the organization

Approach and Strategy

Back‐up of information (user‐level and system‐ level information) and software contained in the Information system shall be taken at defined frequency and protected at storage location.

Backup should be taken for all core applications, databases etc.

Backup should be kept for adequate number of years

The back‐up information shall be tested at a specified frequency in accordance with

agreed back‐up policy to verify media reliability and information integrity

The backup information shall be selectively used in the restoration of information

system functions as a part of contingency plan testing

The backup copies of the operating system and other critical information system

software shall be stored in a separate facility or in a fire‐proof container that is not

collocated with the operational software

The system backup information shall be protected from unauthorized modification

Backup media should be stored in a safe, secure environment, in accordance with

manufacturers’ specifications

Information stored on media that needs to be available longer than the media lifetime

(in accordance with manufacturers’ specifications) should be also stored elsewhere to

avoid information loss due to media deterioration

IT Policy PWD, Himachal Pradesh

Wipro Ltd 42 Confidential

Data Retention – Data retention policy will identify documents that need to be maintained

and for how long certain documents should be kept and how they should be destroyed

Temporary Records Temporary records include all business documents that have not

been completed. Such include, but are not limited to written memoranda, Draft cost

estimation, project plans, reminders, to-do lists, report and calculation drafts, interoffice

correspondence regarding a client or business transaction, and running logs

Final Records Final records include all business documents that are not superseded by

modification or addition. Such include, but are not limited to: documents given to any

third party not employed by Organization, or government agency; final memoranda and

reports; correspondence; minutes of meeting; design/plan specifications; cost estimates;

etc. All accounting records shall be deemed final. All final records should be archived after

specific time period.

Permanent Records Permanent records include all business documents that define

Organization’s scope of work, expressions of professional opinions, research and

reference materials etc. such records should be retained for permanently and should be

updated as per requirements

Employment, Employee, and Payroll Records Employment records include, but are not

limited to job announcements and advertisements; employment applications,

background investigations, resumes, and letters of recommendation of persons not

hired; etc. such records should be retained permanently.

Data retention duration: - Data should be retained so long as the law requires or for as

long as you actually have use for them, and not a moment longer.

Localization & Language Technology Standards

Keyboard Layout: INSCRIPT Keyboard layout. However, Output of any user specific

keyboard layout must conform to Unicode current version.

Fonts: Cross platform Open Type Fonts must be used in applications. Proprietary fonts

should not be adopted unless the vendor assures interoperability. PWD should only adopt

fonts that have been tested on different platforms for the relevant scripts.

Identity & Access Management- The appropriate Identity Aggregations and

Synchronization should be used to integrate systems to share their identity information.

Single sign-on should be provided to the user for accessing the systems. Single Sign On to

make it easier for user and avoiding the need for him to write down complex password

since it becomes difficult to remember multiple passwords. Only in case of performing

critical operation or accessing sensitive information user may be asked to provide

credentials again.

IT Policy PWD, Himachal Pradesh

Wipro Ltd 43 Confidential

Network Standards

As the solution is accessed by different stake holders in different environment and in different

networks like HIMSWAN, internet, etc. therefore the solution should support the following

Network Services technology, Service Transport technologies and all network devices. For

networking use TCP/IP (IPv4/IPv6) protocol whereas for internet, HTTP/S, HTML, J2EE, SOAP,

WSDL, UDDI, W3C standards need to be followed. The Solution Provider shall follow open

standards as far as possible.

Standards to be followed are summarized as follows:

Category Current Standards

Internet HTTP/S, HTML, J2EE, SOAP, WSDL, UDDI, W3C

Integration XML, ebXML

Messaging JMS, GoI Gateways

Forms Xforms, (PDF/XDF)

Data Security IT Act 2000 Standards

Mail Protocols SMTP, POP3,IMAP

Workflow XPDL, BPEL4WS

Databases ORDBMS

Directory LDAP

Wireless WAP,802.11

Networking TCP/IP (IPv4/IPv6)

Security Standards

Security defines the methods of protecting information and information systems from

unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide

integrity, confidentiality and availability. The vendor shall refer the IT Act 2000 standards or latest

IT Policy PWD, Himachal Pradesh

Wipro Ltd 44 Confidential

published by Government of India for data security. The following standards and digital signature

technologies not limited to shall be followed by the vendor.

Certificates / Digital Signature – Software used by a certification authority (CA) to issue

Digital certificates and secure access to information. The evolution of Public Key

Infrastructure (PKI) is based on the verification and authentication of the parties involved in

information exchange. Examples of Certificates/Digital Signature technologies include:

Digital Certificate Authentication – Authentication implementation for controlling access

to network and internet resources through managing user identification. An electronic

document, digital certificate, is issued and used to prove identity and public key

ownership over the network or internet.

FIPS 186 – The Digital Signature Standard (DSS) specifies a digital signature algorithm

(DSA) appropriate for applications requiring a digital, rather than written, signature. The

DSA authenticates the integrity of the signed data and the identity of the signatory. The

DSA may also be used to prove that data was actually signed by the generator of the

signature. Additional references: Draft ANSI X9.30199x Part 1 and ISO/IEC

JTC1/SC27/WG2, Project 1.27.08 Digital Signature with Appendix.

Secure Sockets Layer (SSL) – An open, non-proprietary protocol for securing data

communications across computer networks. SSL is sandwiched between the application

protocol (such as HTTP, Telnet, FTP, and NNTP) and the connection protocol (such as

TCP/IP, UDP). SSL provides server authentication, message integrity, data encryption, and

optional client authentication for TCP/IP connections.

Supporting Security Services – These consist of the different protocols and components to

be used in addition to certificates and digital signatures. The designed and deployed solution

must support all the security services technologies which include the following.

Secure Multipurpose Internet Mail Extensions (S/MIME) – Provides a consistent way to

send and receive secure MIME data. Based on the Internet MIME standard, S/MIME

provides cryptographic security services for electronic messaging applications:

authentication, message integrity and non-repudiation of origin (using digital signatures)

IT Policy PWD, Himachal Pradesh

Wipro Ltd 45 Confidential

and data confidentiality (using encryption). S/MIME is not restricted to mail; it can be

used with any transport mechanism that transports MIME data, such as HTTP.

Transport Layer Security (TLS) – Standard for the next generation SSL. TLS provides

communications privacy over the Internet. The protocol allows client/server applications

to communicate in a way that is designed to prevent eavesdropping, tampering, or

message forgery.

Web Services Security (WS Security) – Describes enhancements to SOAP messaging to

provide message integrity, message confidentiality, and single message authentication.

These mechanisms can be used to accommodate a wide variety of security models and

encryption technologies including X.509, Kerberos, and SAML.

Security Assertion Mark-up Language (SAML) – An XML-based framework for exchanging

security information expressed in the form of assertions about subjects, where a subject

is an entity (either human or computer) that has an identity in some security domain.

SAML is expected to play a key role in the Enterprise wide-Authentication initiative, and

is supported by both the Liberty Alliance and WS Security.

Performance Requirement

The proposed solution components should be scalable horizontally and vertically to take the

solution from Pilot to full-scale implementation.

Architecture Scalability -Architecture provides the Scalability to support additional users,

additional infrastructure (i.e. Hardware servers and other components), and additional

application components. Scalability is supported at the Database Layer, Application Layer

& Messaging Layer.

Application Scalability- The architecture should be scalable and it is necessary to look into

same application components/instances that be can be loaded on multiple servers to

absorb the more transactional load.

The software products scalability and performance- The product used /Application

which are using/developed shall have Replication feature so that it will be used by

IT Policy PWD, Himachal Pradesh

Wipro Ltd 46 Confidential

directory servers to improve performance, scalability, availability, and reliability. The

replication should have following:

o Redundancy of information - Replicas back up the content of their supplier

servers.

o Faster searches - Search requests can be spread among several different servers,

instead of a single server. This improves the response time for the request

completion.

o Security and content filtering - Replicas can contain subsets of the data in a

supplier server

IT Policy PWD, Himachal Pradesh

Wipro Ltd 47 Confidential

4.3 Training

Training programs shall help prepare the employees for working on the application. The training

programs need to be held by Vendor or be arranged by Vendor with an institute specializing in

such training.

The training content shall be different for the employees as per their designation. Depending on

the category of officers they can be categorized in –

Top Executive cum Management level

The supervision level, middle management and executive level

All other employees

Training will include the following

a. Imparting training in Information Communication Technology (ICT) which includes basic

computer training, advance computer training, Business Process related training,

application specific training etc.

b. Such trainings and skills will be imparted to all levels of HPPWD officials involved in the

processes pertaining to the selected wing or divisions.

c. Prepare and organize training programs to facilitate the officials of HPPWD in the efficient

usage of the new system

d. Implementation Partner shall include the learning from past projects implemented in

other states and update the necessary changes in the training.

e. Training shall encompass the knowledge of basic functionality of application to be

developed, Guidelines and other back-end processes.

f. Training shall also be provided for RDBMS, hardware, IT infrastructure basic trouble

shooting activities etc.

g. Trainings shall be provided to all the new employees as and when joining the department.

h. Implementation Partner would also be required to develop user manuals and computer

based tool kits, Presentations and videos to promote self-learning and assist training

participants in undergoing the training.

IT Policy PWD, Himachal Pradesh

Wipro Ltd 48 Confidential

Training Approach

Programme Training Type Objective of Training Remarks

Awareness

Programs

Basic

Computer

Training

The purpose of this training is to

acquaint and aware HPPWD

officials employees with computer

systems (hardware, internet

browsing, using email and basic

software tools like MS Office,

adobe etc.). The effort will be

concentrated towards providing

exposure to computers especially

to ground level functionaries like

draftsman, head draftsman etc.

During the short

term capacity

building program,

core team member

would be identified

based on the

interest level as well

as assessment result

of training provided

to them

Application

Specific

Training

Specialised

Computer

Training

The training of ICT-IIS application to

be developed under this project is

envisaged compulsory for HPPWD

official cutting across departmental

hierarchy. The training is proposed

to acquaint and train the work

force with the various modules of

ICT-IIS, RDBMS, IT infrastructure,

GIS system etc. These skill set

should be enhanced for the core

group identified during the basic

computer training.

Once core team is

identified, a training

plan shall be made

for the members of

the core group. This

would enable core

group in providing

technical support to

the end users,

manage all the

existing applications

and application to be

implemented in near

future.

Training as

Domain

Knowledge

Experts

Advance

Computer

Training &

Process

Related

Trainings

Keeping in view the enormous task

of driving e-Governance in line with

the overall spirit of service

orientation most departments are

inadequately equipped in terms of

personnel and the skill-sets needed

to handle the host of issues

IT Policy PWD, Himachal Pradesh

Wipro Ltd 49 Confidential

involved. To ensure successful e-

Governance in the HPPWD, it is

suggested that at-least 10% of the

total employees in the department

be identified as e-champion. The e-

Champions should be equipped

with advance skill like;

Project Management, Web

Technologies Management,

Process Reforms Management,

Data Security & Disaster Recovery

Management

Retraining of Existing Staff

Training programs will have to be an ongoing feature in PWD especially in the light of rapid

changes in technologies and applications.

After expiry of a pre-defined period since the last training held for a wing/branch or after major

up gradation/ changes are implemented in the system, the employees of the concerned

wing/branch would need to be re-trained in the system by the vendor or the institute arranged

by the vendor.

It is also being suggested that a self-automated module of e-training be developed for training

which can be used by the employees as and when required to refresh his/her skill

4.4 Progress Monitoring Parameters

After finalization of the IT strategy as per the vision for IT implementation in PWD, it is essential

to track the Actual progress made in comparison to the Planned Progress. For this, it is necessary

to decide on Key Performance Indicators (KPI) for the same. On the basis of benefit envisaged as

per IT vision of PWD, the KPIs can be classified into two broad categories as follows:

1. Progress Tracking Measures: It aims to assess the progress achieved in transforming PWD

operations with the aid of IT. The following KPIs can be classified in this category:

Percentage of departmental services delivered with aid of Implemented Applications.

IT Policy PWD, Himachal Pradesh

Wipro Ltd 50 Confidential

Percentage of departmental service information published over PWD portal. For

example, Percentage of policies, percentage of information regarding allotment of plots,

etc. being provided to the public through the web portal

Percentage of transactions of each service executed electronically (including forms entry

and enquiry)

2. Customer Value Measures: It aims to assess the advantages and benefits gained with

introduction of IT within PWD and for all agencies interacting with PWD. The KPIs falling in

this category can be sub-divided further into two categories- externally visible and internally

visible as follows:

Externally Visible: This shall include the KPIs that shall be visible to entities outside PWD

like citizens and other government departments interacting with PWD

o Reduction in number of visits of citizens to department premise for each service.

o Reduction in time required to request for a service and for delivery of the end

deliverable. For example, time taken for filing a request and submitting the

documents including the time lost due to standing in the queue.

o Reduction in time required to track pending transactions for each service.

o Reduction in time required to file in and follow-up on complaints and suggestions.

o Reduction in time required to obtain information for each service

Internally Visible: This shall include KPIs that are visible inside PWD to its employees who

benefit from the introduction of IT

o Reduction of time required to locate and/or retrieve relevant information for each

activity in the service

o Reduction of paper volume to be dealt with for each activity for each service

o Reduction of time lost in tracking movement of data and status of processing

involved in the service

o Overall reduction of time invested in each activity for each service

o Reduction in number of physical movement of employees is required for data

transfer.

IT Policy PWD, Himachal Pradesh

Wipro Ltd 51 Confidential

The exact KPIs of the analysis for each of the application that is to be implemented would need

to be studied in detail after the implementation of the project. This must be done by the PWD IT

Wing.

IT Policy PWD, Himachal Pradesh

Wipro Ltd 52 Confidential

5 Way Forward

This section covers what needs to be taken up and done after this document. The initiatives to

be taken up after acceptance of this document have been given as follows

Initiative Steps to be taken

Implementation of

Applications

developed/underway

(PPM, FAS, dynamic web

portal and associated

services)

1. Roll out the current version of the application

2. Take the improvement possibilities identified in the plan to the

software partner for incorporation

3. Keep the areas for linkages ready for easy integration with

other future application

Implementation of new

Applications Identified

The RFP of PWD needs to be prepared for selection of a software

vendor for implementation of all new applications to be

implemented in PWD

Data Centre & Wide Area

Network

To invest in the minimum Infrastructure for IT hardware and

infrastructure to sustain requirements till State Data Centre.