Search

Advanced Search

Launch of Online Issue of C and F Forms for Commercial Taxes Department, Tamilnadu

R.Gayatri, Tamil Nadu r[dot]gayatri[at]nic[dot]in
  |   Dec 6, 2012

Objectives


The system facilitates the authorized dealers to file online application and generation of C and F form by logging into the Web Site of Department of Commercial Taxes, Tamil Nadu. C and F Forms are generated based on the Monthly Returns filed with Annexures by the Dealers. For this purpose, a separate Annexure I-A has been introduced in e-Return with necessary amendment in the Act. Dealer should file Monthly Returns with Annexure I-A which consists of transactions Inter-State purchase and Inter-State transfer of goods in the prescribed format.  The C Form is for Inter-State purchase transaction and F Form is for Inter-State stock transfer of Goods. The Dealer can generate C and F Form online without visiting to the Circle Office.


Features of Online issuance of C and F Forms

• Filing of e-Return with Annexure I-A.
• Form Generation is based on Monthly e-Returns.
• Seller TIN Verification against TINXSYS online.
• Commodity Code filtering based on CST Registration Certificate.
• Printing of Online Forms with Unique C and F Form Number.
• No Approval or Signature is required for generation of Online Forms.
• Cancellation and Re-generation of Online Forms with the approval from Commercial Tax Officer.
•  24 * 7 online generations of online Forms.
• 2D Bar Code for security and verification of online Forms.
• Water Mark for Online Forms.
• Various MIS Reports for Department Officials for effective monitoring 

Implementation Status


• Government has issued GO’s for Annexure I-A submission Vide G.O. No.110 Dated 10.08.2012.
• The service launched on 01/11/2012.
• More than 7586 C Forms and 270 F Forms generated since Launch.

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...