Search

Advanced Search

Training-cum-Awareness Programme on C-Form organised at UT of Lakshadweep on 10-10-2013

N.K Prasad, Delhi nk[dot]prasad[at]nic[dot]in
  |   Oct 15, 2013
Address to Participants
Address to Participants

Participants in the Training Programme
Participants in the Training Programme

Training-cum-awareness programme on C-FORM under the IVFRT-MMP was conducted at Police Head Quarters, Kavarathi – the Capital of UT of Lakshadweep on 10-10-2013. Above Prgramme was organized by FRRO Cochin, Superintendent of Police, Lakshadweep and NIC-IVFRT Cochin. The participants were all senior police officials from UT of Lakshadweep and officials from SPORTS (Society for Promotion of Nature Tourism & Sports).

In Lakshadweep, the foreigners are allowed to stay in Agathi, Kadamath, Bangaram, Anthroth and Minicoy Islands. The accommodation and other facilities are arranged by SPORTS, Lakshadweep.

The function was presided over by Sh. Paramadhitya, IPS, Supdt. of Police, UT of Lakshadweep. In the welcome address Sh. Basheer Ahammed P K, State Informatics Officer, NIC Lakshadweep explained the national importance of IVFRT project and its time bounded implementation. Sh. K. Sethuraman, IPS, FRRO, Cochin emphasised the mandatory requirement of on-line submission of C-FORM for foreigners as per the Govt. of India notification and BoI directions. The NIC IVFRT State Co-ordinator Shri. PV Raju has given detailed description of IVFRT project and demonstrated On-line registration procedure for C-Form submission & the approval process of user registration by accessing the online system. In the post lunch session, On-line C-form entry and report generation was also explained to the participants with the help of video inputs.

The interactive session was handled by Shri PV Raju, State Co-ordinator, IVFRT. He cleared the doubts of officials and explained the legal aspects of complying and non-complying of the required procedure. Programme ended with hearty vote of thanks to all concerned.

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...