Search

Advanced Search

IVFRT Training Programme on C-Form organized in Panaji from 16th to 18th December 2013

N.K Prasad, Delhi nk[dot]prasad[at]nic[dot]in
  |   Dec 30, 2013
Sh. Prabhu Dessai, Police Inspector, FRRO Goa addressing participants
Sh. Prabhu Dessai, Police Inspector, FRRO Goa addressing participants

Representatives of hotels from South Goa attending C-Form training
Representatives of hotels from South Goa attending C-Form training

As a part of C-Form implementation in Goa, second phase of C-FORM training for the hoteliers in Goa was organized from 16.12.2013 to 18.12.2013. The first one in this series was conducted at Hotel Miramar Residency, Panaji, North Goa on 16.12.2013. The second training programme was conducted at Hotel Mapusa Residency, Mapusa, North Goa on 17.12.2013. The third and last training programme was conducted at at Ravindra Bhavan, Margao, South Goa on 18.12.2013.

The programme inaugurated by the Deputy Director of Department of Tourism in Goa followed by the addressing speech by FRRO representative Sh. Prabhu Dessai, Police Inspector. Sh. Prabhu Dessai, Police Inspector welcomed the audience and briefed the project background to the hoteliers.

In addition to representatives from Department of Tourism and FRRO, around 40 hoteliers participated in the first training, 45 hoteliers participated in the second training and 36 hoteliers attended the last training effectively.

IVFRT State Coordinator Sh. Bahuleayn K N explained the background of the IVFRT project and its impact in foreigner facilitation and its security concerns considering the increased threat and global terrorism. He also briefed the necessity of C-Form submission in time regularly and precisely. Steps for registering the hotels in the C-Form system were also explained by the State Coordinator to the hoteliers. Procedures for submitting the C-Forms using the online system were explained to the hoteliers by Sh. Anoop Kumar C, NIC.

The technical queries raised by the hoteliers were also answered by NIC staffs and policy based issues were clarified by FRRO representatives. The training programme was concluded successfully with hearty vote of thanks to all.

Recent Issues

Highlights

Apr. ‘ 25 Issue


Decoding Data Governance & Strategy: Strategies for Data Protection, Compliance, and Optimization

In today digital era, data is the cornerstone of innovation, business growth, and governance. As India witnesses an ...


AI-Based Face Search: Transforming Archives with Facial Search Intelligence

Face search technology uses AI to identify and match faces across large photo collections. It extracts unique facial ...


Puduvai Kalal: Strengthening Governance Through Digital Transformation

The State Excise Department of Puducherry is a key government agency responsible for regulating excise activities within ...

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks: A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...