Search

Advanced Search

Fourth TTP on IVFRT-MMP organized in Delhi

N.K Prasad, Delhi nk[dot]prasad[at]nic[dot]in
  |   May 28, 2013

A 2-days’ Trainers’ Training Programme (TTP) was organized on Immigration, Visa, Foreigners’ Registration & Tracking-Mission Mode Project (IVFRT-MMP) on 23rd and 24th May 2013 at the Central IVFRT Office, 3rd Floor, DMRC Building, Shastri Park, Delhi. It was the 4th TTP for participants involved in the implementation of IVFRT-MMP in the various state and district locations. The 4th TTP was started with a formal inauguration by Dr. B. N. Shetty, DDG, NIC. In his inaugural speech, he reiterated the time targets of the IVFRT-MMP and also appealed all the IVFRT State Coordinators and concerned NIC Officers to meet the deadline of project implementation as per the time schedule. He also briefed the objective of conducting series of TTPs for NIC IVFRT State Coordinators and concerned Officers. In the above TTP, participants were from all states including officers from NIC(HQ). The entire TTP was customized in such a fashion that every module and session was exclusively targeted to the need of state level applications and its implementation.   

Sh. P. K. Bhardwaj, JD (I), BoI and Sh. Ashutosh Kumar Sinha, Director (I & C), MHA as Special Guests interacted with the IVFRT State Coordinators of NIC and other participants. Further, various issues pertaining to project implementation at states were discussed elaborately.

Dr. R. K. Mishra, TD, NIC in his speech introduced the overall scenario of IVFRT-MMP to the participants and emphasized the need of Capacity Building Programme (CBP) at the state level for proper and speedy implementation of the project. He also sensitized all participants with the new emerging issues in the IVFRT-MMP.

Technical sessions for the Day-one started with Sh. N. S. Rawat, PSA NIC who took a very important session on PRC and explained the entire process with live demonstration to the participants.

Subsequently, sessions were conducted on Immigration Control System (ICP) and APIS, LOC and ICP Networking by Sh. Madhvendra Singh, PSA NIC and Sh. Alok Roy Chaudhary, SSA NIC with their team. Biometric Enrollment and Verification System along with Deportee Management System was covered by Ms. Disha Jain and Ms. Deepika Agarwal with a live demonstration. Further, sessions on Indian Citizenship (IC) and National Database on Arms License (NDAL) were presented by Sh. D. P. M. Reddy, SSA NIC with his team and Sh. S. P. Sharma, TD, NIC with his team respectively.

Last two sessions on UCF System and VPN Policy & Usage, Antivirus were covered by Sh. Shambhu Kumar, SSA NIC, Ms. Arpita Burman, TD, NIC and Sh. S. Hasan Mahmood, Scientific Officer.

Technical Sessions on Day-two of TTP was fully dedicated to the important modules of C-FRO, C-Form, S-Form and Q & A & Feedback sessions. C-FRO module was covered in detail by Sh. A. Ravikumar, TD, NIC and his team. Likewise, other two modules on C-Form and S-Form were covered by Sh. K. Ramasubramanian, STD, NIC Sh. Pradip Kumar, PSA, NIC and Sh. K. Lakshmanan, SSA, NIC respectively. Two days’ TTP was ended with concluding words and a hearty vote of thanks to all concerned by Sh. N. K. Prasad, PSA and Training Coordinator, IVFRT, NIC.

Recent Issues

Highlights

Apr. ‘ 25 Issue


Decoding Data Governance & Strategy: Strategies for Data Protection, Compliance, and Optimization

In today digital era, data is the cornerstone of innovation, business growth, and governance. As India witnesses an ...


AI-Based Face Search: Transforming Archives with Facial Search Intelligence

Face search technology uses AI to identify and match faces across large photo collections. It extracts unique facial ...


Puduvai Kalal: Strengthening Governance Through Digital Transformation

The State Excise Department of Puducherry is a key government agency responsible for regulating excise activities within ...

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks: A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...