Search

Advanced Search

Workshop on C-FORM, S-FORM and cFRO modules of IVFRT-MMP organized in Nagaland

N.K Prasad, Delhi nk[dot]prasad[at]nic[dot]in
  |   Mar 30, 2014
Sh. A L Das, Smt. Bhaswati Duara, Sh. V Z Angami, Sh. Relo T Aye at the Dimapur FRO in the Workshop
Sh. A L Das, Smt. Bhaswati Duara, Sh. V Z Angami, Sh. Relo T Aye at the Dimapur FRO in the Workshop

Hands-on session
Hands-on session

A 3 days workshop on C-FORM, S-FORM and cFRO implementation was held for the district FRO offices of Kohima and Dimapur from 12-14 March 2014. Resource persons for the workshop were Smt. Bhaswati Duara, PSA, NIC, Assam, Dr. Tapas Das, TD, NIC West Bengal and Sh. A. L. Das, SSA, NIC West Bengal. The workshop was coordinated by IVFRT state coordinator for Nagaland Sh. Novotsono Natso, Sc. Officer/ Engineer-SB, NIC, Nagaland State Unit.

On 12th March 2014, token installation and demonstration of the cFRO module was carried out at the FRO Kohima where in, an old case of foreigner registration was input to the system and certificate printed successfully.

On 13th March 2014, a meeting was held with the Special Secretary, Home Department, Government of Nagaland, Sh. EL Singsit, IPS, by the IVFRT Team and the SIO, Nagaland Sh.   Kezungulo Medikhru. The issues related to the collection of the Arms License data with respect to Nagaland State was discussed at length. Thereafter, workshop on the C-FORM and S-FORM implementation was held for the hoteliers and institutions in Kohima district. About 20 participants from various hotels and institutions in Kohima attended the workshop. The session was chaired by SDPO, Kohima Sh. K. Shouka, wherein, he gave an introduction of IVFRT-MMP to the participants and elaborated on the importance of implementation of C-FORM and S-FORM by the participants. Thereafter, the Technical Presentation on C-FORM and S-FORM implementation was given by Sh. A. L. Das followed by a hands-on session by some of the participants.

On 14th March 2014, installation of the token and demonstration of cFRO was carried out at Dimapur FRO office. Later in the afternoon, the workshop on sensitization of C-FORM & S-FORM was held for the hoteliers and institutions under Dimapur District. A total number of 70 participants from various hotels and institutions like colleges, hospital, guest house etc. participated in the workshop. The session was chaired by SDPO, Dimapur Sh. Relo Aye. He gave an introduction of the IVFRT-MMP to the participants and stressed on the importance of the hotels and institutions to register with the FRO and to give the details of the foreigners visiting them. SP Dimapur, Sh. VZ Angami addressed the gathering and stressed on the importance of IVFRT-MMP. The technical demonstration on the C-FORM by Mrs. Bhaswati Duara followed by a hands-on session on filling the C-FORM by hotels and S-FORM by institutions. The session concluded with the successful registration and submission of online C-FORM & S-FORM and clarification of doubts with the resource persons. The workshop was ended successfully with vote of thanks to all.

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...