Good news for NRIs: Indian govt defers controversial ECNR registration

coastaldigest.com news network
November 28, 2018

Newsroom, Nov 28: The government of India has deferred a decision to make pre-departure registration mandatory for ECNR passport holders flying to 18 countries including the UAE.

In a public notice, India’s top emigration officer who signed the November 14 advisory stated that the decision to make ECNR registration for Indians flying to these countries on employment visa has been deferred due to concerns raised by the community.

“In response to the concerns raised by NRI community, the Government of India has decided to defer mandatory pre-registration for Non-ECR passport holders with employment visa of UAE and other affected countries.”

The advisory regarding registration of non-ECR passport holders has been kept in abeyance until further orders it added.

Many expatriates had questioned the legality of the registration rule under which passengers could be offloaded if they fail to comply.

Comments

Basu
 - 
Thursday, 29 Nov 2018

I came to Saudi in work visa Visa Validity is 6 month multipal entry & duration of Stay 30 days. Before 30 days I have to leave the  countary. Now my question is this rules is applicable for me?

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
May 23,2020

Mangaluru, May 23: Domestic flight services will resume from Mangaluru International Airport (MIA) from May 25 as per the instructions of Union Civil Aviation Ministry. Six Indigo and SpiceJet flights will be operated from Mangaluru to Bengaluru, Mumbai and Chennai.

Air-India is yet to finalise its schedule, airport sources said. Three Indigo flights will depart from Mangaluru to Bengaluru, Mumbai and Chennai and three flights of SpiceJet will leave for Bengaluru and Mumbai on May 25.

SpiceJet flight will take off from Bengaluru to Mangaluru at 8.30 am and7 pm while Indigo will take off from Mangaluru to Bengaluru at 5.55 pm. SpiceJet flight will take off from Mangaluru at 10.20 am and 9.35 pm while Indigo will depart at 7.30 pm.

From Mumbai, Spice Jet flight will take off at 7.05 am and Indigo at 9.30 am. The Mangaluru-Mumbai SpiceJet flight will take off at 9.05 am and Indigo at 11.40 am. Indigo flight will depart from Chennai to Mangaluru at 5.45 pm and from Mangaluru to Chennai at 8.05 am.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
April 25,2020

Mangaluru, Apr 25: The coastal district of Dakshina Kannada today reported another covid-19 case. With this the total number of coronavirus positive case in the district rose to 18 including two deaths. 

The health and family welfare department in its bulletin today announced that a 33-year-old woman from Bantwal tested positive for coronavirus. She is undergoing treatment at Wenlock Hospital which is now converted into covid-19 hospital. 

She is the daughter of 67-year-old woman from Bantwal who was tested positive for the deadly disease last week. Both are the neighbours of the two women from Bantwal who died of covid-19 recently.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
July 18,2020

Days after Twitter accounts of several billionaires were hacked to engineer a crypto scam, Twitter on Saturday said it is embarrassed, disappointed and, more than anything, sorry for what happened with some of its high-profile users as attackers successfully manipulated its employees and used their credentials to access internal systems, including getting through the two-factor protections.

In the first detailed summary of the "social engineering attack" via a crypto scam that hit at least 130 users this week, Twitter said for 45 of those accounts, the attackers were able to initiate a password reset, login to the account and send Tweets.

"We are continuing our forensic review of all of the accounts to confirm all actions that may have been taken. In addition, we believe they may have attempted to sell some of the usernames," the micro-blogging platform said in a statement.

For up to eight of the Twitter accounts involved, the attackers took the additional step of downloading the account's information via "Your Twitter Data" tool.

This is a tool that is meant to provide an account owner with a summary of their Twitter account details and activity.

"We are reaching out directly to any account owner where we know this to be true. None of the eight were verified accounts," said Twitter.

The company said the attackers were not able to view previous account passwords, as those are not stored in plain text or available through the tools used in the attack.

"Attackers were able to view personal information including email addresses and phone numbers, which are displayed to some users of our internal support tools," informed Twitter.

In cases where an account was taken over by the attacker, they may have been able to view additional information, Twitter added, saying its forensic investigation of these activities was still ongoing.

"We are actively working on communicating directly with the account-holders that were impacted".

The company said it will soon restore access for all account owners who may still be locked out as a result of the remediation efforts.

The New York Times reported on Friday that the Twitter crypto scam can be traced back to a group of hackers who congregate online at OGusers.com, a username-swapping community where people buy and sell coveted online handles.

The report said that the Twitter hack is not from Russian, Chinese or North Korean hackers but was done by a group of young people, "one of whom says he lives at home with his mother".

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.