Uncategorised

Past Presidents

Past President


 
 
Late. Surya Narayan Piya

(2016-2019, 2020-2022)


 
 

 
 
Late. Krishna Bandhu Piya

(2022-2026,2028-2036, 2041-2044)


 
 
K. L. Bhusan

(2026-2028)


 
 

 
 
Mahendra Lal Pradhan

(2044-2047, 2049-2052)


 
 

 
 
Deshi Ram Pradhan

(2052-2054)


 
 

 
 

 
 
Ramesh Kumar Piya

(2058-2060)


 
 
Madan Lal Joshi

(2060-2062)


 
 
Udhaya Kumar Shrestha

(2062-2064)


 
 
Mitra Raj Dawadi

(2064-2066)


 
 
Utham Lal Chuke

(2066-2068)


 
 

 
 
Kalyan Joshi

(2070-2072)

Rajan Gautam
Rajan Gautam

(2072-2074)


Sahan Lal Pradhan

(2074-2076)

Quality Policy

Quality Policy

CCIC is committed to develop as an effective institution being an umbrella of industries and enterprises of Chitwan by providing quality services through skilled human resources complying with statutory and regulatory norms, continual improvements in its process to satisfy its customer and reviewing the quality objectives.

Certificate of Origin

Certificate of Origin

Search a Job

Search a Job

Working Hours:

Working Hours:

Baishak 1 - Kartik 15 office opens at 10 O'Clock and closes at 5 O'Clock

Kartik 16 - Magh 15 office opens at 10 O'Clock and closes at 4 O'Clock

Magh 16 - Chaitra 31 office opens at 10 O'Clock and closes at 5 O'Clock

Legal Advice

Legal Advice

Information Technology Advice

Information Technology Advice

 

Here are some pieces of advice from our IT Officer. If you need more guidance, feel free to visit our office for a face-to-face conversation with our IT Officer. If necessary, we can also facilitate connections with other IT experts.

  1. Cybersecurity is Non-Negotiable:

    • Invest in robust cybersecurity measures to protect your business data and sensitive information.
    • Regularly update and patch your software and systems to address vulnerabilities.
    • Train your employees on cybersecurity best practices to minimize the risk of human error.
  2. Cloud Adoption and Data Backup:

    • Consider migrating to cloud-based services for increased flexibility, scalability, and accessibility.
    • Implement regular data backups to prevent data loss in case of system failures, cyber-attacks, or other unforeseen events.
  3. Mobile Device Management (MDM):

    • If your employees use mobile devices for work, implement Mobile Device Management solutions to secure and manage these devices.
    • Enforce strong security policies, including encryption and remote wipe capabilities, to protect sensitive business data.
  4. Stay Current with Technology Trends:

    • Keep abreast of emerging technologies relevant to your industry.
    • Regularly update your IT infrastructure to take advantage of new features and improvements.
  5. Employee Training and Awareness:

    • Provide regular training sessions for employees to enhance their IT skills and knowledge.
    • Foster a culture of cybersecurity awareness to reduce the risk of social engineering attacks.
  6. Scalable IT Infrastructure:

    • Plan and implement an IT infrastructure that can scale with your business growth.
    • Consider virtualization and containerization to optimize resource utilization and flexibility.
  7. Collaboration and Communication Tools:

    • Invest in reliable collaboration and communication tools to enhance productivity, especially if your workforce is distributed.
    • Ensure these tools comply with security standards and regulations.
  8. Regulatory Compliance:

    • Understand and adhere to relevant data protection and privacy regulations (e.g., GDPR, HIPAA) to avoid legal consequences.
    • Regularly audit and assess your IT systems for compliance.
  9. IT Support and Helpdesk:

    • Establish a responsive IT support system or helpdesk to address issues promptly.
    • Provide clear channels for employees to report IT-related problems and ensure timely resolutions.
  10. Budgeting for IT:

    • Allocate a realistic budget for IT that covers hardware, software, cybersecurity measures, and training.
    • Prioritize IT investments based on the specific needs and goals of your business.
  11. Regular Audits and Assessments:

    • Conduct regular IT audits and security assessments to identify vulnerabilities and areas for improvement.
    • Use the insights gained to refine your IT strategy and enhance overall security.

Our Participation

The chamber has represented itself on the following capacity at the government and local administration level:

1. Member, Nepal Government, Town Development Committee.
2. Member, Nepal Government, Land & Building Valuation Committee.
3. Member, Nepal Government, District Fund Raising Committees for Natural Disaster Relief.
4. Coordinator, Nepal Government, One Village one Product Execution Committee, Chitwan
5. Coordinator, Youth Self-employment and small enterprise development committee, Chitwan
6. Member, Management Committee, Bal Kumari College (Public College) Narayangarh.
7. Member, Management Committee SaptaGandaki Multiple Campus (Public College), Bharatpur.
8. Chairman, Management Committee, BalKumari English School.
9. Member, Management Committee, Girls Campus, Bharatpur.
10. Member, National Sport Council, District Branch, Chitwan.
11. Member, Devghat Area Development Committee.
12. Member, District Agriculture Committee.
13. Member, Tourism Board, Chitwan.
14. Member, Bharatpur Hospital Management Committee, Chitwan.
15. Member, Cancer Sewa Samaj, BPKMCH
16. Member, Bharatpur Drinking Water Management Board
17. Member, Observation and supervision Committee, District Administration Office.
18. Member, Nepal NetraJyoti Sangh, Chitwan
19. Member, Child Welfare Committee, Chitwan
20. Member, Community service Centre, Chitwan
21. Member, Agri-Enterprise Centre, Chitwan

Representation In FNCCI central committee and FNCCI Province 3 Committee:

1. Dr. Til Chandra Bhattrai, Executive Board Member, FNCCI
2. Mr. Kalyan Joshi, Executive Board Member, FNCCI
3. Mr. Rajan Gautam, Vice-President, FNCCI Province 3 Executive Committee