Search

Advanced Search

Training cum Workshop on CAPA (College Accounting Procedure Automation) Project

A. K. Hota, Odisha ak[dot]hota[at]nic[dot]in
  |   Feb 16, 2016
Guests in Inaugural Session
Guests in Inaugural Session

Participants of the workshop
Participants of the workshop

Week long training cum workshop programme on pilot implementation of CAPA (College Accounting Procedure Automation) project was organized for the Principal, Accountant and Accounts Bursar of Non-Government Aided Colleges under Govt. of Odisha from 30th January 2016 to 9th February 2016 at KOEL Campus of KIIT, Bhubaneswar, Odisha. The workshop was formally inaugurated by Shri G.V.V Sarma, IAS, Principal Secretary, Department of Higher Education (DHE), Govt. of Odisha and Shri S. K Panda, DDG & SIO, NIC, Odisha State Centre in presence of officials from Finance, Directorate of Local Fund Audit and Higher Education Department, Govt. of Odisha.

In his inaugural address Shri S. K Panda, DDG & SIO thanked the Finance & Higher Education Department, Govt. of Odisha for entrusting on NIC to develop the CAPA Portal, which will be useful for colleges to maintain their day to day finical transactions and preparation of accounts related documents to meet audit requisites. This system will bring uniformity in accounting of all the colleges.

Shri G.V.V Sarma, IAS , Principal Secretary , Department of Higher Education, Govt. of Odisha, applauded NIC for making pilot implementation of CAPA in schedule time. He specially thanked NIC for organizing the workshop and advised the participants to make optimum use of this week long training programme.

On morning session of the workshop, general concepts and work flow of CAPA was explained to the participants by Smt. Minati Sahu, TD, Shri Bebin Mishra , SO/E-SB from NIC, Shri S. Sarangi from Directorate of Local Fund Audit along with officials from DHE. The post lunch hands-on sessions were organized in which the participants accessed the CAPA portal with their valid user-id & password to monitor the day to day activities and audit program execution.

The whole training program was carried out by Shri Dillip Kumar Jena, TD, Smt. Minati Sahu, TD along with Shri Bebin Mishra, SO/E-SB from NIC, Bhubaneswar. In the concluding session, the finance team interacted with the participants to get their feedback. The week long workshop concluded with very positive & constructive feedbacks from all the participants.

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...