Search

Advanced Search

Two day's IVFRT Trainers Training Programme (TTP) was organized at New Delhi

N.K Prasad, Delhi nk[dot]prasad[at]nic[dot]in
  |   Dec 30, 2016
Shri T. V. S. N Prasad, JS (PM), MHA, Dr. Deepak Mittal, JS (CPV), MEA and Dr. B. N. Shetty, CTO, MHA chaired the session
Shri T. V. S. N Prasad, JS (PM), MHA, Dr. Deepak Mittal, JS (CPV), MEA and Dr. B. N. Shetty, CTO, MHA chaired the session

Shri G. K. Gaur (DDG, NIC) & Shri P. K. Bhardwaj (JD, BoI) chaired the session
Shri G. K. Gaur (DDG, NIC) & Shri P. K. Bhardwaj (JD, BoI) chaired the session

A two-day Trainers’ Training Programme (TTP) was organized during 15.12.2016 and 16.12.2016 at IVFRT Centre, 5th floor, DMRC Building, Shastri Park, Delhi. IVFRT is a Central Mission Mode Project (MMP) under the National e-Governance Plan (NeGP) which is conceptualized with an aim to enhance the experience of in-bound and out-bound travellers from and to India by looking into the aspects of Passport, Visa, Immigration, Foreigners Registration and Tracking.

The IVFRT-Mission Mode Project (MMP) has global outreach since the scope of the project includes 178 Indian Missions Abroad, 83 ICPs (Immigration Check Posts), 13 FRROs (Foreigners Regional Registration Offices), and 674 FROs (Foreigners Registration Offices) in the State/ District Headquarters. The project is being implemented in a planned and phased manner. During the training, presentations along with discussions were carried out on new versions of software pertaining to IVFRT for all the NIC/ MHA Officers posted in remote locations for smooth implementation/ functioning of the IVFRT project. More than 65 IVFRT Officials from across the country had participated in TTP.

In the beginning of the first day, Sh. C. L. Sharma (TD, NIC), Dr. R. K. Mishra (TD, NIC) and Sh. NK Prasad (PSA, NIC) briefed about the current status of IVFRT Project and also explained about the other projects like Crime and Criminal Tracking Network & Systems (CCTNS), Online e-Service Portal for verification and attestation of documents of Indian Citizens abroad (eSanad), Nationality Status Verification (NSV) etc. Module leads of IVFRT Project have given Presentation/ Demonstration of their respective modules. Subsequently on first day, Visa Issuance Process, Immigration Control System/ APIS, Indian Citizenship, ICP Networking & FRRO Video Conferencing, Overseas Citizenship of India (OCI), VPN Token Issuance System, Introduction of Antivirus & Webex, Biometric Enrolment and Deportee System and CONSPROM System were made. On second day, Unique Case File (UCF) System, C-FRO System, ICJS, NSV, eSanad, Prior Referral Check (PRC) System, National Data Arms License (NDAL) System, Armed License Issuance System (ALIS), C-Form and S-Form were covered.

Sh. T. V. S. N Prasad, JS (PM), MHA, Dr. Deepak Mittal, JS (CPV), MEA and Dr. B. N. Shetty, CTO, MHA also joined the TTP and highly appreciated the role of NIC in various Ministries/ Stake holders at all over the country. After the Presentation/ Demonstration of various modules, the last day a Q&A session was organized to clarify the doubts of participants. This session was chaired by Sh. G. K. Gaur (DDG, NIC), Sh. P. K. Bhardwaj (JD, BoI) and other bureaucrats. The TTP was concluded with the acknowledgement speech of Sh. G. K. Gaur.

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...