Search

Advanced Search

IVFRT Thiruvananthapuram Workshop on C-Form Online Submission for Hoteliers at Kovalam

N.K Prasad, Delhi nk[dot]prasad[at]nic[dot]in
  |   Jun 28, 2013
Inauguration of Workshop
Inauguration of Workshop

Participants in the Workshop
Participants in the Workshop

A district level workshop was organized at Swagath International Resorts, Kovalam on 27th June 2013 to create awareness on online submission of C-Form for Hoteliers. The programme was jointly organized by Kerala Hotel and Restaurant Association along with FRRO Thiruvananthapuram. The participants included representatives of hoteliers and various other organizations providing home stay facilities for foreigners. Altogether 158 hotels represented in the above workshop.

Sh. K. K. Jayamohan, FRRO Thiruvananthapuram while inaugurating the workshop explained the mandatory requirement of on-line submission of C Form for foreigners as per the Govt. of India notification and BoI directions. He ensured that by online submitting of C-form by Hoteliers or approved home stay providers on detail stay of foreigners, fulfills the statutory requirements as per the gazette notification. NIC IVFRT team consisting of Sh. T. R. Vinod Kumar, Sh. K. Sree Kumar, Sh. N. Hari Kumar, Sh. George Abraham K and Sh. A. G. Pradeep Singh demonstrated video presentations on IVFRT project, On-line registration procedure for C-Form submission and the approval process of access to the online system.  In the post tea session, On-line data entry of C-form and report generation was also explained to the participants with the help of video inputs.

Many of the participants were able to register for approved user requirement by accessing website using their mobile phones during the session itself. The overall feedback from the participants on the Software application was that the software and website is well designed for ease of data entry and quite informative in contents.

Sh. Rajan Chenguni, AFRRO Thiruvananthapuram in the feedback session cleared doubts and queries raised by the participants along with the help of NIC officers. The hoteliers suggested that there should be provisions to fetch the details of previously registered foreigners so that registration process will be easier for them as many foreigners are frequent visitors and stay at the same locations. The FRRO insisted that registration will be allotted for home stay providers only on condition that they are approved and authenticated by Tourism Department, Government of Kerala. The entire Workshop was a grand success.

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...