Search

Advanced Search

Launch of C-FRO and C-Form Modules under IVFRT MMP at Ujjain

N.K Prasad, Delhi nk[dot]prasad[at]nic[dot]in
  |   Sep 20, 2013
Sh. Anurag, IPS, launching the system with the online approval of a hotel
Sh. Anurag, IPS, launching the system with the online approval of a hotel

Representatives of the various hotels of Ujjain attending the workshop
Representatives of the various hotels of Ujjain attending the workshop

A one day Workshop for C-Form (Hotel Arrival Report of Foreigner) Module under the Immigration, Visa, Foreigner’s Registration & Tracking Mission Mode Project (IVFRT-MMP) was organized under able supervision of Sh. Anurag, IPS, Superintendent of Police-Cum-District Foreigners Registration Officer, Ujjain at Police Control Room, Ujjain on 11/09/2013. Also present were Sh. Gourav Tiwari, Addl. S.P. (City), Sh. Pankaj Shrivastava, Addl. S.P. (Rural), Sh. S.C.Dubey, DSP (DSB) and Sh. Dharmendra Singh Yadav, DIO, NIC, Ujjain and other officials of FRO, Ujjain. This workshop was attended by around 20 keepers/ representatives of various hotels, dharmashalas and institutions of the city.

In his keynote address, Sh. Anurag, IPS, stressed on the importance of the IVFRT system and submission of C-Form to the hoteliers. He stressed that as per the guidelines of Ministry of Home Affairs (MHA), it is mandatory for all the hoteliers to get registered into the C-Form system and submit the same online. He directed the participating hoteliers to register and use the new online C-Form submission system at the earliest.

Sh. Koshy John gave a brief introduction to the IVFRT project with emphasize on C-Form module followed by a detailed presentation and practical demonstration of the module to all the participants.

Implementation of the C-FRO, C-Form and S-Form Modules under IVFRT is under progress at pilot locations of Madhya Pradesh. In line with the same, the C-FRO and C-Form Modules have been launched at the Foreigners Registration Office (FRO), Ujjain. The system was formally launched with the online approval of the authorization request of a hotel by Sh. Anurag, IPS.

Subsequently, C-FRO Module was operational in FRO, Ujjain on 12/09/2013 with online registration of 3 foreign nationals into the system. The C-FRO module provides online services to the Foreigner like Registration, Visa Extension, Return Visa, Exit Permit, Visa Conversion, etc. The FRO officials have been trained to work with the module by Sh. Koshy John. With this launch, Ujjain has become the second district in Madhya Pradesh to get connected to the IVFRT system.

The queries raised by the participants were addressed to during the feedback session. This implementation has been made successful with inputs, guidance and active support from the Central IVFRT Team headed by Dr. B. N. Shetty, DDG, NIC and State-level support from Sh. M. Vinayak Rao, State Informatics Officer, NIC Madhya Pradesh State Centre. The workshop ended with hearty vote of thanks to all.

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...