Search

Advanced Search

IVFRT Thiruvananthapuram Workshop on C-Form Online Submission for Hoteliers at Kovalam

N.K Prasad, Delhi nk[dot]prasad[at]nic[dot]in
  |   Jun 28, 2013
Inauguration of Workshop
Inauguration of Workshop

Participants in the Workshop
Participants in the Workshop

A district level workshop was organized at Swagath International Resorts, Kovalam on 27th June 2013 to create awareness on online submission of C-Form for Hoteliers. The programme was jointly organized by Kerala Hotel and Restaurant Association along with FRRO Thiruvananthapuram. The participants included representatives of hoteliers and various other organizations providing home stay facilities for foreigners. Altogether 158 hotels represented in the above workshop.

Sh. K. K. Jayamohan, FRRO Thiruvananthapuram while inaugurating the workshop explained the mandatory requirement of on-line submission of C Form for foreigners as per the Govt. of India notification and BoI directions. He ensured that by online submitting of C-form by Hoteliers or approved home stay providers on detail stay of foreigners, fulfills the statutory requirements as per the gazette notification. NIC IVFRT team consisting of Sh. T. R. Vinod Kumar, Sh. K. Sree Kumar, Sh. N. Hari Kumar, Sh. George Abraham K and Sh. A. G. Pradeep Singh demonstrated video presentations on IVFRT project, On-line registration procedure for C-Form submission and the approval process of access to the online system.  In the post tea session, On-line data entry of C-form and report generation was also explained to the participants with the help of video inputs.

Many of the participants were able to register for approved user requirement by accessing website using their mobile phones during the session itself. The overall feedback from the participants on the Software application was that the software and website is well designed for ease of data entry and quite informative in contents.

Sh. Rajan Chenguni, AFRRO Thiruvananthapuram in the feedback session cleared doubts and queries raised by the participants along with the help of NIC officers. The hoteliers suggested that there should be provisions to fetch the details of previously registered foreigners so that registration process will be easier for them as many foreigners are frequent visitors and stay at the same locations. The FRRO insisted that registration will be allotted for home stay providers only on condition that they are approved and authenticated by Tourism Department, Government of Kerala. The entire Workshop was a grand success.

Recent Issues

Highlights

Apr. ‘ 25 Issue


Decoding Data Governance & Strategy: Strategies for Data Protection, Compliance, and Optimization

In today digital era, data is the cornerstone of innovation, business growth, and governance. As India witnesses an ...


AI-Based Face Search: Transforming Archives with Facial Search Intelligence

Face search technology uses AI to identify and match faces across large photo collections. It extracts unique facial ...


Puduvai Kalal: Strengthening Governance Through Digital Transformation

The State Excise Department of Puducherry is a key government agency responsible for regulating excise activities within ...

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks: A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...