Best Practices for Veterans

Best Practices -  Will

While a career in the Service can give most officers little time to attend to domestic matters, retirement can be gainfully used to organise one’s life more systematically. Towards this end, there are various best practices which can be followed by naval veterans, as – unlike in the Service – they would have to do most things by themselves. Such best practices also ensure that in the unfortunate event of your death, your spouse and dependents have much less running around to do, while disposing of your worldly assets in accordance with your wishes, including searching for details on the multitude of accounts that you were holding in various institutions.

FAQs about Will

A ‘Will’ or ‘testament’ is a legal document that expresses a person’s (‘testator’) wishes as to how their property (estate) is to be distributed after their death and as to which person (‘executor’) is to manage the property until its final distribution. Some Frequently Asked Questions about a Will are placed below and some specimen will templates may be seen here.

  • It is never too early to execute a Will and every one is advised to do so at the earliest.
  • When an individual gets married/ remarried he should consider executing a Will in favor of his wife.
  • No one should be compelled to make a Will if for any reason, he is not inclined to do so.
  • On the death of an individual, if no Will is made i.e., he or she dies intestate, then his / her assets are equally distributed amongst his/ her heirs. In such a case his / her spouse or unmarried children or an ailing relative is likely to suffer unintended financial loss.
  • Nominees are normally made out for Bank Accounts / Deposits, Investments, Provident Fund, Gratuity, LIC claims, etc. However, the nominated person is entitled to receive the amount only as a temporary custodian on behalf of the rightful heirs, who will either be indicated either in the Will or – if the deceased dies intestate – then will be decided as per the relevant Succession Act.
  • A house or other immovable property, even if held in joint name by the intended beneficiary, can be claimed by other heirs unless it is specifically mentioned in the Will.
  • Even if there is only one heir and no Will is made, other relatives can stake a claim on the properties by taking advantage of the provisions of law. In some cases, even the sole heir is called upon to prove his or her bonafides in the court of law.
  • More often than not, the Will is the only tool to ensure proper and dignified treatment in old age.
  • There are many occasions in one’s life when one feels highly obliged towards someone in particular or feels like giving a helping hand to an individual or social organisation or a religious cause. One of the best ways to give expression to this feeling is to bequeath a suitable asset to such person / organisation through the medium of the Will.
  • On occasions, if all the individual’s offspring are not having the same financial status, a suitable balance can be sought through the medium of the Will. Adequate provision can even be made for a disabled child through the ‘Will.’
  • Every lady can and should make a suitable Will in respect of her possessions as per her desire. In particular, the ornaments and other household items are considered as Stree Dhan or the lady’s wealth, which she is free to dispose of as per her wishes.
  • To sum up, making a Will is amongst the foremost best practices that a veteran should follow.
  • A Will should be clear-cut, unambiguous and precise.
  • The Will should not have been made under duress.
  • No stamp paper or stamp duty is required to make a will. The Will can be made out on blank paper.
  • The existence of pin holes in a Will may give rise to an inference that some documents were attached to the Will and thus may create difficulties at the time of probate. Hence, using pins on the Will to keep pages together must be avoided.
  • It is advisable to consult a lawyer when drafting the Will, especially if the testator has diverse assets which are being bequeathed amongst several heirs, to ensure that it is will pass legal muster when produced in the Court for purposes of probate.
  • The Will can be either handwritten in the testator’s own handwriting (holographic will) or typed and signed. Overwriting and corrections should be avoided, but if made, the testator must put his full signature next to each of them.
  • If the person making the Will is sick, the same should be signed in the presence of a certified Doctor. A suitable certificate from the doctor, stating that the testator was in full control of his faculties and capable of conscientious thinking while signing the Will, should be endorsed on the Will.
  • The signing of the Will should be witnessed by at least two individuals, who should record their names and addresses and sign against each. The witnesses, as far as possible, should be younger than the person making the Will and should not be beneficiaries of the Will itself.
  • It is not compulsory to register the Will. There is, however, a provision for registration of the Will either by the Testator or by the Executor, for which there is no time restriction. Registering the Will means that it is considered authentic and, if the original is lost, then a certified copy of the same can be obtained from the Registration Office (this is not, however, a substitute for a Probate). Another advantage is that those seeking transmission of assets of the deceased will not have to obtain ‘No Objection Certificates’ from other legal heirs. A sealed envelope containing a copy of the Will is to be handed over to the Registration Office for safe custody. On demand of a copy, the envelope is opened and the Will is first copied in the register. A copy of this document, duly certified, is then handed over.
  • The Will can be changed or modified by the testator at any time. However, if a new Will is made or a correction slip (called a Codicil)  is attached, all the formalities mentioned above must be gone through again. In the case of a new Will, it should be clearly stated that, “This Will supersedes the earlier Will made by me on – (date).” In the absence of such a clause, the new Will may be considered as null and void.
  • To ensure that the testator’s wishes indicated in the Will are faithfully carried out, a person should be nominated in the Will as the Executor of the Will. The Executor can be a beneficiary of the Will.
  • All the properties acquired from an individual’s own earnings e.g salary, business proceeds, investments, shares, provident fund, gratuity, LIC claims, etc qualify for disposal in his / her Will, and the same cannot be challenged by the heirs.
  • As per Hindu law, a Hindu lady is the bonafide owner of the immovable property in her name, in addition to all the ornaments and household goods received by her from her parents, her husband, her in-laws, etc and she is free to dispose off the same as per her own desire.
  • An individual generally Wills his possessions to his or her spouse and offspring. Properties gained through hereditary laws are liable for equal distribution to the direct heirs. It is preferable to mention details of such properties as well as the direct heirs in ones Will.
  • When a self acquired property is held in joint name, the portion of the property owned by an individual can be disposed off through the Will.
  • It is appropriate to attach a detailed list of all the testator’s assets, with the Will. It is inevitable that such a list will undergo certain changes in course of time. A suitable mention of action to be taken in such an eventuality can be incorporated in the Will.
  • If it is established that the Will itself or some portion of it has been written under duress.
  • If there is overwriting and changes, which are not authenticated by the maker of the Will and the witness.
  • If the Will is not duly signed by the witnesses.
  • If the provisions made in the Will are impossible to comply with or not legal or are derogatory to social harmony.
  • Probate means to determine judicially the validity of a Will and is granted by an appropriate Court when a Will exists. For this, the Executor of the Will must make an application to the Court of competent jurisdiction.
  • In order to obtain Probate, there are two legal requirements.
    • To establish that the Will in question had been made voluntarily and signed by the deceased Testator in the presence of independent witnesses.
    • To ascertain that there was no subsequent Will executed by the deceased.
  • To establish the first requirement, those who have signed as witnesses are required to appear in the civil court and give evidence to authenticate the Will in question. Once this is done, the court promulgates notice in Govt. Gazette and local newspapers, to whom it may concern, to produce before the court within the given period, any Will, if held by anyone claiming to be made by the so-named Testator. When the Will in question is not contested by any other member of the family, a Probate of Will is issued by the court.
  • In case witnesses to the Will have predeceased or are not traceable, then the nominees have to obtain a succession certificate for claiming the estate of the deceased. If the Will is registered with the Registrar/Sub Registrar, it obviates the requirement of the presence of witnesses to appear before the Magistrate to authenticate the Will and obtaining of probate of Will is made easier.

Bank Accounts

Best Practices - Joint Bank Accounts

If you are drawing your pension through a single bank account in your name and if, at the time of your retirement or within one year thereafter, you have not made a nomination in favour of your spouse, please do so immediately. This will enable your spouse to receive, after your passing, any balance left in that account as well as any arrears of pension due to you during your life time; as also for receiving the Family Pension. It is also a best practice to have your other bank accounts as joint accounts with your spouse, though this may be a matter of personal preference. The advantage of having a joint account is that even if a nomination has not been made, the surviving spouse can continue to operate the account under the ‘Either or Survivor’ clause, instead of having to go through the lengthy transmission process, described below.

Nominations

Best Practices - Nominations

Even if one has made a will, it is a best practice to make nominations in favour of desired beneficiaries in respect of all financial assets such as bank/demat accounts, fixed/recurring deposits, bank lockers, investments (mutual funds, shares, bonds, debentures), Public Provident Fund, insurance policies and other corporate and Govt investment schemes. The nominee in respect of these assets should ideally be the same as the beneficiary mentioned in the Will. Transmission of the deceased veteran’s accounts to the nominee is much smoother and requires less paperwork (normally nothing more than a death certificate of the deceased, proof of identity of the nominee and an application form). If, on the other hand, no nominee is listed, the transmission process can get quite complicated and may require additional documents such as a copy of the Will / Succession Certificate, Indemnity Bond, Affidavit, NOC from each of the heirs, all of which can be quite a hassle.

Online Security

Best Practices - Passwords

The introduction of the Personal Computer in the early 1980s, the Internet – or more specifically, the World Wide Web – in the 1990s and the smartphone in 2007 has made our daily life quite different from what it used to be in the 20th Century. These technological marvels have provided us with the systems and means to access information at the press of a key, click of a mouse button or the swipe of a finger. In fact, we can conduct many of the activities that previously required us to physically visit banks, offices or shops directly from our home. The Covid-19 pandemic has also seen the ‘Work from Home (WFH)’ paradigm being embraced by organisations across the world. Though we often take the advantages and convenience that technology provides us for granted, we need to be aware that this transformation has come at a price. It has left us exposed to a plethora of malafide activities by cybercriminals, who are doing their best to steal our personal information and our financial records for their own benefit. Some of the more common activities are described below, along with the best practices that one needs to follow to avoid having our own identity, personal data and financial assets compromised.

A computer virus, much like a biological virus (such as the Covid-19 virus), is designed to spread from host to host and has the ability to replicate itself. Similarly, in the same way, that biological viruses cannot reproduce without a host cell, computer viruses cannot reproduce and spread without programming such as a file or document.

In more technical terms, a computer virus is a type of malicious code or program written to alter the way a computer operates and is designed to spread from one computer to another. A virus operates by inserting or attaching itself to a legitimate program or document that supports macros in order to execute its code. In the process, a virus has the potential to cause unexpected or damaging effects, such as harming the system software by corrupting or destroying data.

Unlike viruses, worms don’t require human help in order to infect, self-replicate or propagate. As soon as they breach a system, they infect their entry point and spread through the device and across any network to which the device connects. By exploiting network vulnerabilities—such as missed operating system (OS) updates or application patches, weak email security or poor internet safety practices—worms can execute, self-replicate and propagate at an almost exponential rate as each new infection repeats the process. Originally, most worms simply “ate” system resources and reduced performance. Now, most worms contain malicious “payloads” designed to steal or delete files upon execution.

Commonly called “Trojans,” these programs hide in plain sight by masquerading as legitimate files or software. Once downloaded and installed, Trojans make changes to a computer and carry out malicious activities, without the knowledge or consent of the victim.

Ransomware infects your computer, encrypts your PII and other sensitive data such as personal or work documents and then demands a ransom for their release. If you refuse to pay, the data is deleted. Some ransomware variants lock out all access to your computer. Sometimes, they might claim to be the work of legitimate law enforcement agencies and suggest that you’ve been caught doing something illegal.

A computer virus attack can produce a variety of symptoms, which can include:-

  • Frequent pop-up windows. Pop-ups might encourage you to visit unusual sites. Or they might prod you to download antivirus or other software programs.
  • Changes to your homepage. Your usual homepage may change to another website, for instance. Plus, you may be unable to reset it.
  • Mass emails being sent from your email account. A criminal may take control of your account or send emails in your name from another infected computer.
  • Frequent crashes. A virus can inflict major damage on your hard drive. This may cause your device to freeze or crash. It may also prevent your device from coming back on.
  • Unusually slow computer performance. A sudden change in processing speed could signal that your computer has a virus.
  • Unknown programs that startup when you turn on your computer. You may become aware of the unfamiliar program when you start your computer. Or you might notice it by checking your computer’s list of active applications.
  • Unusual activities like password changes. This could prevent you from logging into your computer.

Viruses can be spread through email and text message attachments, Internet file downloads, and social media scam links. Your mobile devices and smartphones can become infected with mobile viruses through app downloads. Viruses can hide disguised as attachments of socially shareable content such as funny images, greeting cards, or audio and video files. To avoid contact with a virus, it’s important to exercise caution when surfing the web, downloading files, and opening links or attachments. To help stay safe, never download text or email attachments that you’re not expecting, or files from websites you don’t trust.

Antivirus software is designed to find known viruses and oftentimes other malware such as ransomware, trojan horses, worms, spyware, adware, etc., that can have a detrimental impact on the user or device. Antivirus programs provide a way to protect against known threats. The effectiveness of an antivirus program is heavily dependent on how often it is updated. Therefore, it is important to have the antivirus program scheduled to update daily. Most antivirus programs rely on a library or database of known viruses that they use to compare with programs on a user’s device. If a match is found, the malicious program will either be deleted or placed into a quarantine area from which a user can decide to restore or delete the program manually. One limitation of traditional antivirus programs is that they only provide protection against known threats. Therefore, if someone cooks up new malicious code, an antivirus program may fail to detect it when a scan is done. Users should not consider an antivirus program to be universal protection against all viruses and malware. Instead, users should consider an antivirus program to be one part of a comprehensive online security hygiene regimen.

There are some antivirus manufacturers that are incorporating predictive analysis and artificial intelligence into their antivirus software to be able to detect new malicious programs. They focus on detecting malicious software based on what it does, as opposed to whether it exists in a library or dictionary. While we cannot recommend one antivirus program over another, we encourage users to do independent research to find which antivirus program will work best for them.

Kaspersky and BitDefender are generally recognised as the two best paid anti virus software, both of which have excellent virus libraries as well as heuristic detection capabilities(they also have limited free versions). Avast, AVG and Avira are the most popular free AV software, all of which also have excellent virus detection capabilities, though they may not have as comprehensive features for virus removal or quarantining.

  • Have a good antivirus such as Kaspersky and BitDefender installed on your computer. It is also better to pay a small amount and have a quality premium AV, which can not only detect and remove viruses, but also warn you when you navigate to a suspicious website and protect your banking transactions
  • Be wary when you receive an email – even one seemingly bonafide – that calls for action on your part, such as clicking on a link or button. Check the proper email domain address from where it originated and whether it matches the supposed sender. Do not open any attachment, even if it is from a friend, without calling him or her up and ascertaining whether it actually was sent by them.
  • Update your operating system with the latest updates as soon as they are released
  • Avoid clicking on links to questionable websites
  • Avoid using pirated software, most of which have malware implanted normally in the ‘crack’ provided
  • Back up your important data frequently onto a separate hard disk and a reliable cloud storage provider
  • Disconnect your machine from the Internet and any network that it may be connected to
  • If you have a ‘rescue disk’ (either a CD or USB drive) already of a reputed AV company such as Kaspersky and Bitdefender, you can reboot off the CD/USB (instead of the main HDD) and run the rescue software, which will search for and remove any malware it finds, including boot sector viruses.
  • If there are still manifestations of malware appearing, try and restore the computer to an earlier state, where it was performing normally.
  • If a simple restore also does not work, reset the machine to a clean state, where the operating system and other software are reinstalled
  • After the reinstallation, do a complete virus scan again, using the Rescue Disk.
  • Only once you are convinced that all malware has been removed, should you restore the data from a backup HDD or cloud storage

Phishing is a type of online fraud, where an attacker sends a fraudulent (“spoofed”) message designed to trick a computer user into revealing sensitive information to the attacker or to deploy malicious software on the victim’s computer like ransomware. A target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure them into providing sensitive data such as personal records, banking and credit card details, and passwords. The information is then used to access important accounts and can result in identity theft and financial loss. Generally, emails sent by cybercriminals are masked so they appear to be sent by a business whose services are used by the recipient. A bank will not ask for personal information via email or suspend your account if you do not update your personal details within a certain period of time. Most banks and financial institutions also usually provide an account number or other personal details within the email, which ensures it’s coming from a reliable source. The first thing to do when you receive an email, which requires an affirmative action from your side such as clicking a button or a link is to check the actual email address from where it originated. In GMail, this can be easily done by clicking on the down arrow next to the ‘To’ in the header. Common features of phishing emails are:-

  • They generally seem too good to be true.
  • They convey a sense of urgency and of catastrophic consequences if you fail to respond e.g. suspension of bank account
  • Hyperlinks may not be all they appear to be, which can be seen by hovering over a link.
  • Unexpected attachments – even from a known person – often contain payloads like ransomware or other viruses.
  • Unusual Sender


Just as phishing takes place through email, vishing is an attempt to collect sensitive information over the phone. Attackers often pretend to be with tech support, your bank or a government agency to steal account information or even gain remote access to your computer. Often, the scammer will put a Javascript popup on a site, which triggers when a user visits the site and typically has a message warning the user that there there is some problem on his computer, for which he needs to call a tech support number. Once the user calls the number, he is asked to download software such as TeamViewer and provide the security code to the ‘technician’ so that he can remotely check the ‘defective’ PC. Invariably, this results in the scammer gaining full access to the user’s PC, wherein he can also lock him out. One should follow these five best practices to avoid getting vished:-

  • Be sceptical when answering calls from unknown numbers, even when the number appears to be local.
  • Do not panic and immediately rush to contact a ‘tech support’ number, when an alarming popup appears when you visit a website.
  • If they ask for personal information, don’t provide it over the phone.
  • Do not download any software such as TeamViewer or GoToMyPC and provide the security code to an unknown person, as it will allow him to remotely access your computer and have total control over it
  • Use a caller ID app, but don’t trust it completely.
  • Search for the caller’s phone number online, even while on the call, to see if it’s a known scam.
  • If the call is about a product or service you use, go to the vendor’s website or call the vendor directly to confirm the claim.

Pharming is a type of social engineering cyberattack in which criminals redirect Internet users trying to reach a specific website to a different, fake site. These “spoofed” sites aim to capture a victim’s personally identifiable information (PII) and login credentials (such as passwords, Credit Card numbers, social security numbers, account numbers etc.) or attempt to install pharming malware on their computer. Pharmers often target websites in the financial sector, including Banks, online payment platforms, or e-commerce sites, usually with identity theft and financial misuse as their ultimate malicious objective.

There are several ways in which pharming can be carried out:-

  • DNS Spoofing / Poisoning: DNS stands for “Domain Name System” and is responsible for translating human readable domain names into IP addresses that computers can understand. Pharmers modify the DNS table in a server for a legitimate website and replace it with their own IP address, causing multiple users to visit the fake website instead of the legitimate one.
  • Malware: A hacker may send malicious code in an email which installs a virus or Trojan on a user’s computer. This malicious code changes the computer’s hosts file to direct traffic away from its intended website and redirected toward a fake website instead.
  • Man-in-the-Middle (MITM) attacks: In a MITM attack, the attacker intercepts the victim’s traffic and redirects it to a fake site using various techniques such as Address Resolution Protocol (ARP) Spoofing and SSL stripping.

How to protect yourself from such attacks:-

  • Always use a trusted and verified Internet Service Provider (ISP) & VPN service that has reputable DNS servers.
  • Make sure that your web connections (web address should have https with lock icon) are secure.
  • Enable two-factor authentication (2FA) on sites wherever available.
  • Change default password on your routers & wireless access points.
  • Be cautious of links and attachments in emails and other messages, especially from unknown senders.
  • Use antivirus and anti-malware software on your device and keep them up to date.

All of us do a considerable amount of personal transactions online such as banking, shopping, bill payment, management of utility services such as telephone, electricity and gas, etc. Each of these service providers requires us to open an account with them, whether it be a bank, e-commerce site, or public service. Consequently, over a period of time, individuals build up a large number of accounts to access these services, all of which require a login name and password. While the login name can be relatively well-known information such as your email address, the password should be as secure as possible so that unauthorised persons cannot access your personal data and, worse still, make financial transactions. It is, therefore, a best practice to choose passwords that as random and meaningless as possible. However, these are almost impossible to memorise and, consequently, most human beings for reasons of convenience select weak and easy to crack passwords based either on a simple alphanumeric combination (e.g. abcd1234), common words (e.g. password) or life events such as dates of birth and wedding anniversaries. Moreover, many of us use the same passwords for different sites. These days, data breaches are being reported from various sites such as Zomato, BigBasket and most recently Air India wherein email addresses and passwords of millions of users have been compromised. If you wish to know whether any of your own personal data has been compromised, you can check it from this site. Hence, if one is using the same password for, say, banking then it may be possible for a hacker to access financial records too. It is recommended, firstly, to use a good password manager such Bitwarden – which is both free and open-source – to generate individual and randomised passwords for each site one accesses; and secondly, also have a mechanism by which one’s spouse or dependents (or other beneficiaries of the Will) can access these sites after one’s death. It is recommended that all the user names and passwords or the master password (if one is using a password manager) be printed, sealed in an envelope and kept in a secure location, which should be known to the spouse/dependents with instructions to open only on death.

Master Folder

Death is a certainty for all of us. While we hope that all veterans will be able to live long and fulfilling lives, it is also a fact that some of us may have to depart this world a little earlier. Whatever be the case, it is a best practice to plan for when that day will come – whether expectedly or otherwise. We will not be around, but our near and dear ones should not have to run from pillar to post to settle our affairs.

It is, therefore, a best practice to keep all important original documents in a central Master Folder, which should remain in a safe and secure location, either in the veteran’s house or a Safe Deposit Locker. In the unfortunate event of the veteran’s death, the spouse / dependents should be able to access the Master Folder for retrieving and producing any document whenever required. In addition to the originals, it is also a good idea to keep notarised true copies of each document, some of which such as PPO would be required to be submitted with applications for transmission of financial assets, family pension, PRDIES claim, etc. Documents can also be scanned and uploaded to a secure digital locker such as the Govt of India Digilocker website/app for ready referral when required. An indicative list of documents that may be kept in the Master Folder is below.

  • Will
  • Details of Bank Accounts, Fixed / Recurring Deposits and Safe Deposit Lockers (including key number).
  • Cumulative Time Deposits of Bank/Post Office, PPF etc.
  • Birth Certificate.
  • Motor car/scooter RC book, insurance policies and PUC certificates.
  • Income Tax/Wealth Tax files.
  • LIC, GIC, Health/Mediclaim/Fire/Household Accident policy documents.
  • PPO.
  • Property papers such as Transfer Deed, Ownership / Rental Agreement, Society Share Certificate, Property Tax receipts, etc.
  • Telephone file- first original Bill, wherein rent equivalent to 12 months has been retained as security deposit, should be preserved.
  • Deposit receipt for Gas/Electricity/Water etc.
  • Passport, Driving License, Identity Card, ECHS Card, Canteen Smart Card, Sainik Board Ex-Servicemen Identity Card, Club/Institute membership cards etc (photocopies of these to be kept separately).
  • Medical file, including relevant test reports and medication taken regularly.
  • Files containing investment documents such as Share Certificates (if not dematted) and Mutual Funds monthly statements.
  • Pending litigation papers and court decision, if any.
  • Details of loans, if any, taken for House-building/purchase of car etc and their repayment schedule.
  • Details of Credit Cards with dates of validity.
  • Any other matter of interest to your family/NOK

Personal Information

Best Practices - Personal Information Organiser

In addition to the Master Folder, it is also a best practice for the veteran to keep all his personal information such as Aadhar, PAN, service particulars, PPO, driving license, voter ID, CSD Smart Card, ECHS card, details of bank and deposit accounts, safe deposit locker, credit / debit card PINs, property share certificate, utilities (electricity, gas, telephone), WiFi, PCs, installed software, cloud storage accounts, personal mobile (access PIN), Investments, Income Tax, RSAMI / SSTASC Memberships, EMail addresses and many others well organised and in a central safe and secure location. The information could either be printed or stored digitally using a notes application such as Microsoft OneNote (with password protection) or a password manager, which has the capabilities to store notes securely.

Towards this end, NWWA has brought out an Indian Navy Family Logbook which is a good aide memoire to store personal data in a single point format. A copy of the same may be downloaded by clicking here.

Actions on Death of a Veteran

In the unfortunate event of a veteran’s death, there are various actions – some immediate, others as a follow-up – that the spouse and next of kin may be required to take. Some of these are placed below for reference but are not all-encompassing.

  • If the deceased had registered with an Organ Retrieval Banking Organisation (ORBO) for donation of organs, they should be informed immediately to do the needful.
  • Inform relatives and friends.
  • Decide the time, date and place where the funeral is to be carried out.
  • Inform DESA and CRSO, WNC so that they may inform the CNS and C-in-C WNC respectively, who may wish to depute representatives to lay wreaths on their behalf. The CRSO would also arrange for a guard to be paraded during the funeral, along with the laying of wreaths.
  • Inform Secretary, Navy Foundation Pune Chapter for passing to all NFPC members, for those who wish to attend the funeral and/or pay their condolences.
  • Obtain a Death Certificate from the Hospital/Attending Doctor or a Registered Medical Practitioner.
  • Arrange an ambulance/hearse for carrying the body to the crematorium/burial ground.
  • Arrange material required for cremation/burial.
  • Obtain cremation/burial certificate from the crematorium/burial ground authority on completion of the funeral.
  • The hospital’s / doctor’s death certificates and cremation/burial certificate are to be submitted to Municipal Authorities (Depth of Registration of Births and Deaths) for the issue of the Death Certificate.
  • Obtain at least 30 original copies of the Death Certificate (and also get an additional 10-20 notarised true copies). These are required to be submitted with all claims as well as various other applications for transmission of the deceased’s accounts.

The Pune Cantt Facility is available to veterans of the Army, Navy, and Air Force and open to all ranks (officers, JCO, or their dependents). Both gas and traditional cremation facility are available. Charges are as follows:-

  • Gas cremation charges – Rs 250/-
  • Traditional cremation charges – Rs 4000/- approx
  • Charges for religious teacher – Rs 4000/- (incl dahan samagri)
  • Hearse van charges
    • Within cantt limits – Nil
    • Outside cantt limits – Rs 60/- for the first 5 kms and Rs10/- per km thereafter

Contact details

  • SO (Cantt) – Lt Col Vikas Savalge – 9422363077
  • Crematorium – Dhanraj – 9028315779
  • Cantonment Board hospital – 020-29912891
  • In the case of death due to an accident, lodge an FIR at the nearest police station at the earliest. This will be required for claims on Insurance Companies as well as for processing payment of compensation by the concerned authorities.
  • Inform IHQ MoD(N)/DOP/DPA, PCDA(N) Mumbai (Post 1986 retirees)/ PCDA(P), Allahabad (Pre 1986 retirees), and DESA (sample).
  • Apply for demise grant to CRSO (form / letter) as per Assured Decent Last Rites Scheme (ADLRS).
  • Inform NAVPEN (application forms for family pension).
  • DNPF (for PRDIES claim) (instructions and claim forms).
  • Inform Pension Authority
    • In case the pensioner has migrated to SPARSH system, inform the SPARSH Cell at PCDA (Pensions), Allahabad about the death of the pensioner online through this link (see video). You would require a scanned copy of the death certificate. Thereafter, apply for family pension using this link on the SPARSH portal (see video). A clarification on both these functions, issued by PCDA (P) may be accessed here.
    • In case the pensioner has not opted to migrate to SPARSH, inform the Bank (Pension Disbursing Authority)of the demise of the pensioner, asking them to discontinue service pension and commence payment of family pension of the spouse/ NOK/ heir. Enclose an ink signed death certificate (on receipt) and copy of PPO (sample letter).
  • Return the deceased pensioner’s identity card to the nearest Depot Ship/ CRSO for further disposal (draft letter).
  • Inform the concerned Zila Sainik Board and return the deceased pensioner’s ESM Identity Card (draft letter).
  • Apply for a new widow identity card to Zila Sainik Board (draft letter).
  • Inform Regional HQ of ECHS and return the deceased pensioner’s ECHS Card (draft letter).
  • Apply to CSD for a new Canteen Smart Card (draft letter).
  • Inform RSAMI, SSTASC and other clubs in which membership held by the veteran for either transfer of membership to widow or for a refund of security deposits.
  • Apply to PMC/PCMC for transfer of property tax payments (application form).
  • Apply to AFNHB / Society as applicable for the transfer of house/flat in the name of the widow and for mutation in the Share Certificate. (AFNHB procedure and forms)
  • Inform the concerned Electricity, Water, Gas and Telephone Authorities for transfer of the connection in the name of the NOK.
  • Inform Rationing Authority for change of name of Head of Family in the Ration Card (form).
  • Inform Regional Transport Office (RTO) to transfer the car/two-wheeler / any other automobile to the NOK (guidelines and forms).
  • Inform Income Tax Authority for finalizing the tax return of the deceased.
  • Inform other banks where the veteran was holding accounts for transmission to joint holder(survivor)/nominee/beneficiary/heir.
  • Inform Licensing Authority of the Police for transfer of Private Fire Arms (procedure).
  • Inform insurance companies for making claims, in respect of any insurance policies held by the deceased as ‘life assured.’
  • If the deceased Ex-Serviceman has made out a Will, contact the executor to apply for the ‘Probate of WILL’ in the appropriate court having jurisdiction for mutation of property, transfer of shares etc. In case there is no Will, the legal heirs (normally the spouse and children) would have to apply for a Succession Certificate from the appropriate court.
  • Inform the concerned Post Office for settlement of deposits of Saving Bank Account, NSS, NSC, PPF etc.