Search

Advanced Search

IVFRT-MMP Sensitization programme on C-Form & S-Form held at Puducherry

N.K Prasad, Delhi nk[dot]prasad[at]nic[dot]in
  |   Aug 1, 2013
Sh. Ravi Kumar, SP, Puducherry addressing the gathering
Sh. Ravi Kumar, SP, Puducherry addressing the gathering

Participants in the Event
Participants in the Event

One day sensitization program on C-Form and S-Form was organized at Hotel Ram International, Puducherry on 29.07.2013 for the hoteliers, hospitals and educational institutions of Puducherry Union Territory. The event was inaugurated by FRRO, Chennai. The eRegistration software which was used to register the participants is the first of its kind. FRO, Puducherry appreciated NIC’s support in computerizing the registration process.

District FRO’s portal was inaugurated by Sh. Ravikumar, Superintendent of Police, Special Branch, Puducherry. This portal will facilitate all the IVFRT services in single window. Sh. Ravikumar emphasized the importance of online submission of C-FORM and S-FORM. He also briefed about the roles and responsibilities of hoteliers and institutions.

Sh. V. Suresh, Technical Director and IVFRT State Coordinator for Tamilnadu & Puducherry highlighted the key modules of IVFRT project. He also explained the implementation strategies to the participants and clarified their queries. FRRO, Chennai emphasized the hoteliers, institutions and hospitals for their contribution by performing their duty of furnishing foreigner’s information electronically as the main concern is our National Security. He stressed that all hotels, institutions and hospitals should comply with the legal requirement and should register with RRO/ FRO for online C-FORM submission immediately. He appreciated NIC for the continuous and effective support.

Theme address was delivered by Sh. S Manivannan, STD & Additional SIO, NIC, Chennai explaining NIC’s role in contributing through the development and implementation of National eGovernance projects to the various ministries/ department. During the event, general procedures and regulations to be followed for the smooth functioning of C-FORM and S-FORM applications were also briefed. NIC-IVFRT team members Sh. S.A. Vijayakumar, SSA, Sh. K. Ravi, SSA and Sh. K. Anandan, SA demonstrated various IVFRT modules and their detailed features. Regional Registration Officer, Puducherry welcomed the gathering of dignitaries and participants.

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...