SlideShare a Scribd company logo
1 of 19
Download to read offline
A Secure Way To Manage
Your Employee Data
According to a World Economic Forum report, the government ID
database, Aadhaar, suffered multiple breaches in 2018 that potentially
compromised the records of 1.1 billion registered citizens.
www.greythr.com
1. Source: The Global Risks Report 2019
Is your data safe?
As India adds over 40 million internet
users every year, concerns regarding data
privacy loom large.
UIDAI has made it mandatory for
companies to store Aadhaar
numbers in a centralized storage
called the Aadhaar Data Vault.
Aadhaar Act, 2016
www.greythr.com
What is Aadhaar Data Vault?
The official circular reads:
Aadhaar Data Vault is a centralized storage for all the Aadhaar
numbers collected by the AUAs/KUAs/Sub-AUAs or any other
agency.2
It is a secure system inside the respective agency’s
infrastructure, accessible only on a need to know basis.
2. The scope of the Aadhaar Act is broad and may include your company as well.
Does it apply to you?
Aadhaar Data Vault applies to your
company if you collect Aadhaar details
from your employees and store them
on-premise in your database
or spreadsheets.
How should you deal with it?
As a business entity, you can either:
1. Buy a third-party Aadhaar Vault.
2. Develop technologies that adhere to the Aadhaar Act. It typically
involves investing in both specialized hardware, servers and
software - the costs for which run into a couple of lacs.
Introducing greytHR PIVault
greytHR PIVault is an advanced security solution that
safeguards sensitive personal information of your employees
through strong encryption and controlled access.
greytHR PIVault is 100% compliant with the Aadhaar Act.
Key Features
Tokenization
Use of UUID reference
tokens instead of SPII data
to prevent dispersion
Masked data
For convenient handling of
application and MIS
reporting
Centralized Storage
Centralized service to encrypt,
decrypt and manage all your
SPII data
Aadhaar Data Vault
Unique storage facility for
storing your employees’
Aadhaar data
Benefits
Data Privacy
Reveals sensitive information
only on a need-to-know basis
Technology
High-grade encryption
technology supported by
AWS KMS
Data Security
Your data is secure both
during transit and at rest
Compliance
Ensures compliance with the
Aadhaar Act
greytHR PIVault
in action
The Aadhaar data is masked throughout the
greytHR platform to ensure there is no
leakage of information.
The data is masked even in downloaded
files and reports.
Document Number
In special cases, you can grant permission to
users to view and modify the data selectively.
Pricing
greytHR PIVault is a free upgrade to a
secure data storage environment.
If you are an existing customer, the system will
automatically migrate your SPII data to greytHR
PIVault’s database.
Get your organization compliant
with Aadhaar Act today
Start Your 30-Day Free Trial
Join the 9000+ companies automating their HR and payroll with greytHR

More Related Content

What's hot

IRDAI Compliance & Data-Centric Security | Seclore
IRDAI Compliance & Data-Centric Security | SecloreIRDAI Compliance & Data-Centric Security | Seclore
IRDAI Compliance & Data-Centric Security | SecloreSeclore
 
CipherCloud Webinar - Cloud Encryption & Tokenization 101
CipherCloud Webinar - Cloud Encryption & Tokenization 101CipherCloud Webinar - Cloud Encryption & Tokenization 101
CipherCloud Webinar - Cloud Encryption & Tokenization 101CipherCloud
 
CipherCloud for Salesforce - Solution Overview
CipherCloud for Salesforce - Solution OverviewCipherCloud for Salesforce - Solution Overview
CipherCloud for Salesforce - Solution OverviewCipherCloud
 
ISC(2) Security Briefing Part 2 - CASBs: Real-world use cases
ISC(2) Security Briefing Part 2 - CASBs: Real-world use casesISC(2) Security Briefing Part 2 - CASBs: Real-world use cases
ISC(2) Security Briefing Part 2 - CASBs: Real-world use casesBitglass
 
Understanding Global Data Protection Laws: Webinar
Understanding Global Data Protection Laws: WebinarUnderstanding Global Data Protection Laws: Webinar
Understanding Global Data Protection Laws: WebinarCipherCloud
 
Mature connections: 6 stages to IoT success
Mature connections: 6 stages to IoT successMature connections: 6 stages to IoT success
Mature connections: 6 stages to IoT successSingtel
 
information control and Security system
information control and Security systeminformation control and Security system
information control and Security systembhavesh lande
 
Data Privacy Readiness Test
Data Privacy Readiness TestData Privacy Readiness Test
Data Privacy Readiness TestDruva
 
UMA as Authorization mechanism for IoT: a healthcare scenario
UMA as Authorization mechanism for IoT: a healthcare scenarioUMA as Authorization mechanism for IoT: a healthcare scenario
UMA as Authorization mechanism for IoT: a healthcare scenarioDomenico Catalano
 
Drivelock modern approach of it security & amp; encryption solution -whitep...
Drivelock   modern approach of it security & amp; encryption solution -whitep...Drivelock   modern approach of it security & amp; encryption solution -whitep...
Drivelock modern approach of it security & amp; encryption solution -whitep...Arbp Worldwide
 
CipherCloud Technology Overview: Tokenization
CipherCloud Technology Overview: TokenizationCipherCloud Technology Overview: Tokenization
CipherCloud Technology Overview: TokenizationCipherCloud
 
Protecting customer accounts from cyber attacks
Protecting customer accounts from cyber attacksProtecting customer accounts from cyber attacks
Protecting customer accounts from cyber attacksDeepak Gupta
 
Five ways io t assists enterprises in asset management min
Five ways io t assists enterprises in  asset management minFive ways io t assists enterprises in  asset management min
Five ways io t assists enterprises in asset management minSolution Analysts
 
Guardium Triples Bookings and Installed Base in 2006
Guardium Triples Bookings and Installed Base in 2006Guardium Triples Bookings and Installed Base in 2006
Guardium Triples Bookings and Installed Base in 2006pneray
 
Kantara Orientation for CARIN Digital ID Summit
Kantara Orientation for CARIN Digital ID SummitKantara Orientation for CARIN Digital ID Summit
Kantara Orientation for CARIN Digital ID SummitNoreen Whysel
 
CipherCloud Technology Overview: Encryption
CipherCloud Technology Overview: EncryptionCipherCloud Technology Overview: Encryption
CipherCloud Technology Overview: EncryptionCipherCloud
 
Salesforce Security with Visibility, Control & Data Protection
Salesforce Security with Visibility, Control & Data ProtectionSalesforce Security with Visibility, Control & Data Protection
Salesforce Security with Visibility, Control & Data ProtectionCipherCloud
 
Digital Agricultural Services for Insurance - Selim Üçer
Digital Agricultural Services for Insurance - Selim ÜçerDigital Agricultural Services for Insurance - Selim Üçer
Digital Agricultural Services for Insurance - Selim Üçersigortatatbikatcilari
 

What's hot (20)

Press Release IDR Redaction
Press Release IDR RedactionPress Release IDR Redaction
Press Release IDR Redaction
 
IRDAI Compliance & Data-Centric Security | Seclore
IRDAI Compliance & Data-Centric Security | SecloreIRDAI Compliance & Data-Centric Security | Seclore
IRDAI Compliance & Data-Centric Security | Seclore
 
CipherCloud Webinar - Cloud Encryption & Tokenization 101
CipherCloud Webinar - Cloud Encryption & Tokenization 101CipherCloud Webinar - Cloud Encryption & Tokenization 101
CipherCloud Webinar - Cloud Encryption & Tokenization 101
 
POS_Slide_Show
POS_Slide_ShowPOS_Slide_Show
POS_Slide_Show
 
CipherCloud for Salesforce - Solution Overview
CipherCloud for Salesforce - Solution OverviewCipherCloud for Salesforce - Solution Overview
CipherCloud for Salesforce - Solution Overview
 
ISC(2) Security Briefing Part 2 - CASBs: Real-world use cases
ISC(2) Security Briefing Part 2 - CASBs: Real-world use casesISC(2) Security Briefing Part 2 - CASBs: Real-world use cases
ISC(2) Security Briefing Part 2 - CASBs: Real-world use cases
 
Understanding Global Data Protection Laws: Webinar
Understanding Global Data Protection Laws: WebinarUnderstanding Global Data Protection Laws: Webinar
Understanding Global Data Protection Laws: Webinar
 
Mature connections: 6 stages to IoT success
Mature connections: 6 stages to IoT successMature connections: 6 stages to IoT success
Mature connections: 6 stages to IoT success
 
information control and Security system
information control and Security systeminformation control and Security system
information control and Security system
 
Data Privacy Readiness Test
Data Privacy Readiness TestData Privacy Readiness Test
Data Privacy Readiness Test
 
UMA as Authorization mechanism for IoT: a healthcare scenario
UMA as Authorization mechanism for IoT: a healthcare scenarioUMA as Authorization mechanism for IoT: a healthcare scenario
UMA as Authorization mechanism for IoT: a healthcare scenario
 
Drivelock modern approach of it security & amp; encryption solution -whitep...
Drivelock   modern approach of it security & amp; encryption solution -whitep...Drivelock   modern approach of it security & amp; encryption solution -whitep...
Drivelock modern approach of it security & amp; encryption solution -whitep...
 
CipherCloud Technology Overview: Tokenization
CipherCloud Technology Overview: TokenizationCipherCloud Technology Overview: Tokenization
CipherCloud Technology Overview: Tokenization
 
Protecting customer accounts from cyber attacks
Protecting customer accounts from cyber attacksProtecting customer accounts from cyber attacks
Protecting customer accounts from cyber attacks
 
Five ways io t assists enterprises in asset management min
Five ways io t assists enterprises in  asset management minFive ways io t assists enterprises in  asset management min
Five ways io t assists enterprises in asset management min
 
Guardium Triples Bookings and Installed Base in 2006
Guardium Triples Bookings and Installed Base in 2006Guardium Triples Bookings and Installed Base in 2006
Guardium Triples Bookings and Installed Base in 2006
 
Kantara Orientation for CARIN Digital ID Summit
Kantara Orientation for CARIN Digital ID SummitKantara Orientation for CARIN Digital ID Summit
Kantara Orientation for CARIN Digital ID Summit
 
CipherCloud Technology Overview: Encryption
CipherCloud Technology Overview: EncryptionCipherCloud Technology Overview: Encryption
CipherCloud Technology Overview: Encryption
 
Salesforce Security with Visibility, Control & Data Protection
Salesforce Security with Visibility, Control & Data ProtectionSalesforce Security with Visibility, Control & Data Protection
Salesforce Security with Visibility, Control & Data Protection
 
Digital Agricultural Services for Insurance - Selim Üçer
Digital Agricultural Services for Insurance - Selim ÜçerDigital Agricultural Services for Insurance - Selim Üçer
Digital Agricultural Services for Insurance - Selim Üçer
 

Similar to PIVault - A secure way to manage your employee data

Aadhaar: Providing proof of identity to millions
Aadhaar: Providing proof of identity to millionsAadhaar: Providing proof of identity to millions
Aadhaar: Providing proof of identity to millionsHp kushal
 
Future of Aadhaar is "a secure and robust system ensuring complete security a...
Future of Aadhaar is "a secure and robust system ensuring complete security a...Future of Aadhaar is "a secure and robust system ensuring complete security a...
Future of Aadhaar is "a secure and robust system ensuring complete security a...National Management Olympiad
 
Giving 1.2 billion citizens a unique identity
Giving 1.2 billion citizens a unique identityGiving 1.2 billion citizens a unique identity
Giving 1.2 billion citizens a unique identityMindtree Ltd.
 
Mindtree cs government-big data & analytics
Mindtree cs government-big data & analyticsMindtree cs government-big data & analytics
Mindtree cs government-big data & analyticsMindtree Ltd.
 
Streamline Identity Management & Administration on AWS
Streamline Identity Management & Administration on AWSStreamline Identity Management & Administration on AWS
Streamline Identity Management & Administration on AWSAmazon Web Services
 
practical risks in aadhaar project and measures to overcome them
practical risks in aadhaar project and measures to overcome thempractical risks in aadhaar project and measures to overcome them
practical risks in aadhaar project and measures to overcome themsaipriyadonthula
 
Truzzt whitepaper a4_einzel_20200311
Truzzt whitepaper a4_einzel_20200311Truzzt whitepaper a4_einzel_20200311
Truzzt whitepaper a4_einzel_20200311h-bauer2014
 
Where data security and value of data meet in the cloud brighttalk webinar ...
Where data security and value of data meet in the cloud   brighttalk webinar ...Where data security and value of data meet in the cloud   brighttalk webinar ...
Where data security and value of data meet in the cloud brighttalk webinar ...Ulf Mattsson
 
Extract the Analyzed Information from Dark Data
Extract the Analyzed Information from Dark DataExtract the Analyzed Information from Dark Data
Extract the Analyzed Information from Dark Dataijtsrd
 
PCI Compliance Report
PCI Compliance ReportPCI Compliance Report
PCI Compliance ReportHolly Vega
 
BigID PII & PI Discovery for GDPR Data Sheet
BigID PII & PI Discovery for GDPR Data SheetBigID PII & PI Discovery for GDPR Data Sheet
BigID PII & PI Discovery for GDPR Data SheetDimitri Sirota
 
Enabling Distributed Trust in Agriculture data spaces
Enabling Distributed Trust in Agriculture data spacesEnabling Distributed Trust in Agriculture data spaces
Enabling Distributed Trust in Agriculture data spacesGerard van der Hoeven
 
Azure Forensics & Incident Response
Azure Forensics & Incident ResponseAzure Forensics & Incident Response
Azure Forensics & Incident ResponseChristopher Doman
 
#GDPR Compliance - Data Minimization via ArchivePod
#GDPR Compliance - Data Minimization via ArchivePod#GDPR Compliance - Data Minimization via ArchivePod
#GDPR Compliance - Data Minimization via ArchivePodGaret Keller
 
INTERPLAY OF ARTIFICIAL INTELLIGENCE ON TRADE SECRETS
INTERPLAY OF ARTIFICIAL INTELLIGENCE ON TRADE SECRETSINTERPLAY OF ARTIFICIAL INTELLIGENCE ON TRADE SECRETS
INTERPLAY OF ARTIFICIAL INTELLIGENCE ON TRADE SECRETSIRJET Journal
 

Similar to PIVault - A secure way to manage your employee data (20)

Aadhaar: Providing proof of identity to millions
Aadhaar: Providing proof of identity to millionsAadhaar: Providing proof of identity to millions
Aadhaar: Providing proof of identity to millions
 
Future of Aadhaar is "a secure and robust system ensuring complete security a...
Future of Aadhaar is "a secure and robust system ensuring complete security a...Future of Aadhaar is "a secure and robust system ensuring complete security a...
Future of Aadhaar is "a secure and robust system ensuring complete security a...
 
Giving 1.2 billion citizens a unique identity
Giving 1.2 billion citizens a unique identityGiving 1.2 billion citizens a unique identity
Giving 1.2 billion citizens a unique identity
 
Mindtree cs government-big data & analytics
Mindtree cs government-big data & analyticsMindtree cs government-big data & analytics
Mindtree cs government-big data & analytics
 
Streamline Identity Management & Administration on AWS
Streamline Identity Management & Administration on AWSStreamline Identity Management & Administration on AWS
Streamline Identity Management & Administration on AWS
 
IOT in Bangladesh
IOT in BangladeshIOT in Bangladesh
IOT in Bangladesh
 
practical risks in aadhaar project and measures to overcome them
practical risks in aadhaar project and measures to overcome thempractical risks in aadhaar project and measures to overcome them
practical risks in aadhaar project and measures to overcome them
 
General manager | NMO 2019
General manager | NMO 2019General manager | NMO 2019
General manager | NMO 2019
 
Truzzt whitepaper a4_einzel_20200311
Truzzt whitepaper a4_einzel_20200311Truzzt whitepaper a4_einzel_20200311
Truzzt whitepaper a4_einzel_20200311
 
Where data security and value of data meet in the cloud brighttalk webinar ...
Where data security and value of data meet in the cloud   brighttalk webinar ...Where data security and value of data meet in the cloud   brighttalk webinar ...
Where data security and value of data meet in the cloud brighttalk webinar ...
 
Extract the Analyzed Information from Dark Data
Extract the Analyzed Information from Dark DataExtract the Analyzed Information from Dark Data
Extract the Analyzed Information from Dark Data
 
PCI Compliance Report
PCI Compliance ReportPCI Compliance Report
PCI Compliance Report
 
BigID PII & PI Discovery for GDPR Data Sheet
BigID PII & PI Discovery for GDPR Data SheetBigID PII & PI Discovery for GDPR Data Sheet
BigID PII & PI Discovery for GDPR Data Sheet
 
Data Security.pdf
Data Security.pdfData Security.pdf
Data Security.pdf
 
Enabling Distributed Trust in Agriculture data spaces
Enabling Distributed Trust in Agriculture data spacesEnabling Distributed Trust in Agriculture data spaces
Enabling Distributed Trust in Agriculture data spaces
 
Ping Identity
Ping IdentityPing Identity
Ping Identity
 
Azure Forensics & Incident Response
Azure Forensics & Incident ResponseAzure Forensics & Incident Response
Azure Forensics & Incident Response
 
#GDPR Compliance - Data Minimization via ArchivePod
#GDPR Compliance - Data Minimization via ArchivePod#GDPR Compliance - Data Minimization via ArchivePod
#GDPR Compliance - Data Minimization via ArchivePod
 
INTERPLAY OF ARTIFICIAL INTELLIGENCE ON TRADE SECRETS
INTERPLAY OF ARTIFICIAL INTELLIGENCE ON TRADE SECRETSINTERPLAY OF ARTIFICIAL INTELLIGENCE ON TRADE SECRETS
INTERPLAY OF ARTIFICIAL INTELLIGENCE ON TRADE SECRETS
 
News letter march 12
News letter march 12News letter march 12
News letter march 12
 

More from Greytip Software

Recent changes in Personal Income Tax
Recent changes in Personal Income TaxRecent changes in Personal Income Tax
Recent changes in Personal Income TaxGreytip Software
 
Decoding The Economics Package For MSMES
Decoding The Economics Package For MSMESDecoding The Economics Package For MSMES
Decoding The Economics Package For MSMESGreytip Software
 
Decoding Labour Law Changes During Lockdown
Decoding Labour Law Changes During LockdownDecoding Labour Law Changes During Lockdown
Decoding Labour Law Changes During LockdownGreytip Software
 
Legal Implication of Labour Laws due to COVID 19 and Interpretation thereof
Legal Implication of Labour Laws due to COVID 19 and Interpretation thereofLegal Implication of Labour Laws due to COVID 19 and Interpretation thereof
Legal Implication of Labour Laws due to COVID 19 and Interpretation thereofGreytip Software
 
The Importance of Organisational Effectiveness and Way Forward
The Importance of Organisational Effectiveness and Way ForwardThe Importance of Organisational Effectiveness and Way Forward
The Importance of Organisational Effectiveness and Way ForwardGreytip Software
 
How to Increase Productivity with Minimum Employees during COVID 19
How to Increase Productivity with Minimum Employees during COVID 19How to Increase Productivity with Minimum Employees during COVID 19
How to Increase Productivity with Minimum Employees during COVID 19Greytip Software
 
Generation of Form 16 using greytHR
Generation of Form 16 using greytHRGeneration of Form 16 using greytHR
Generation of Form 16 using greytHRGreytip Software
 
Best tax saving investments
Best tax saving investmentsBest tax saving investments
Best tax saving investmentsGreytip Software
 
Labour Law Compliance for Contract Employees
Labour Law Compliance for Contract EmployeesLabour Law Compliance for Contract Employees
Labour Law Compliance for Contract EmployeesGreytip Software
 
greytHR Webinar Maternity Benefit
greytHR Webinar Maternity BenefitgreytHR Webinar Maternity Benefit
greytHR Webinar Maternity BenefitGreytip Software
 
Leave year-end process FAQ
Leave year-end process FAQ Leave year-end process FAQ
Leave year-end process FAQ Greytip Software
 
Adopt cashless processing- Payroll Processing and Statutory Remittances
Adopt cashless processing- Payroll Processing and Statutory RemittancesAdopt cashless processing- Payroll Processing and Statutory Remittances
Adopt cashless processing- Payroll Processing and Statutory RemittancesGreytip Software
 
Statutory Changes in Employment Laws - greytHR
Statutory Changes in Employment Laws - greytHRStatutory Changes in Employment Laws - greytHR
Statutory Changes in Employment Laws - greytHRGreytip Software
 

More from Greytip Software (20)

Recent changes in Personal Income Tax
Recent changes in Personal Income TaxRecent changes in Personal Income Tax
Recent changes in Personal Income Tax
 
Decoding The Economics Package For MSMES
Decoding The Economics Package For MSMESDecoding The Economics Package For MSMES
Decoding The Economics Package For MSMES
 
Decoding Labour Law Changes During Lockdown
Decoding Labour Law Changes During LockdownDecoding Labour Law Changes During Lockdown
Decoding Labour Law Changes During Lockdown
 
Legal Implication of Labour Laws due to COVID 19 and Interpretation thereof
Legal Implication of Labour Laws due to COVID 19 and Interpretation thereofLegal Implication of Labour Laws due to COVID 19 and Interpretation thereof
Legal Implication of Labour Laws due to COVID 19 and Interpretation thereof
 
The Importance of Organisational Effectiveness and Way Forward
The Importance of Organisational Effectiveness and Way ForwardThe Importance of Organisational Effectiveness and Way Forward
The Importance of Organisational Effectiveness and Way Forward
 
How to Increase Productivity with Minimum Employees during COVID 19
How to Increase Productivity with Minimum Employees during COVID 19How to Increase Productivity with Minimum Employees during COVID 19
How to Increase Productivity with Minimum Employees during COVID 19
 
Generation of Form 16 using greytHR
Generation of Form 16 using greytHRGeneration of Form 16 using greytHR
Generation of Form 16 using greytHR
 
Proof of Investments
Proof of InvestmentsProof of Investments
Proof of Investments
 
Best tax saving investments
Best tax saving investmentsBest tax saving investments
Best tax saving investments
 
Shops & Establishment Act
Shops & Establishment ActShops & Establishment Act
Shops & Establishment Act
 
Labour Law Compliance for Contract Employees
Labour Law Compliance for Contract EmployeesLabour Law Compliance for Contract Employees
Labour Law Compliance for Contract Employees
 
greytHR webinar POSH Act
greytHR webinar POSH ActgreytHR webinar POSH Act
greytHR webinar POSH Act
 
greytHR Webinar Maternity Benefit
greytHR Webinar Maternity BenefitgreytHR Webinar Maternity Benefit
greytHR Webinar Maternity Benefit
 
Product update v5.3.6
Product update v5.3.6  Product update v5.3.6
Product update v5.3.6
 
PF ECR v2.0.pptx
PF ECR v2.0.pptxPF ECR v2.0.pptx
PF ECR v2.0.pptx
 
Leave year-end process FAQ
Leave year-end process FAQ Leave year-end process FAQ
Leave year-end process FAQ
 
Leave year-end process
Leave year-end process Leave year-end process
Leave year-end process
 
Adopt cashless processing- Payroll Processing and Statutory Remittances
Adopt cashless processing- Payroll Processing and Statutory RemittancesAdopt cashless processing- Payroll Processing and Statutory Remittances
Adopt cashless processing- Payroll Processing and Statutory Remittances
 
Product update v5.3.4
Product update v5.3.4Product update v5.3.4
Product update v5.3.4
 
Statutory Changes in Employment Laws - greytHR
Statutory Changes in Employment Laws - greytHRStatutory Changes in Employment Laws - greytHR
Statutory Changes in Employment Laws - greytHR
 

Recently uploaded

Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 

Recently uploaded (20)

Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
Exploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the ProcessExploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the Process
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 

PIVault - A secure way to manage your employee data

  • 1. A Secure Way To Manage Your Employee Data
  • 2. According to a World Economic Forum report, the government ID database, Aadhaar, suffered multiple breaches in 2018 that potentially compromised the records of 1.1 billion registered citizens. www.greythr.com 1. Source: The Global Risks Report 2019
  • 3. Is your data safe? As India adds over 40 million internet users every year, concerns regarding data privacy loom large.
  • 4. UIDAI has made it mandatory for companies to store Aadhaar numbers in a centralized storage called the Aadhaar Data Vault. Aadhaar Act, 2016
  • 5. www.greythr.com What is Aadhaar Data Vault? The official circular reads: Aadhaar Data Vault is a centralized storage for all the Aadhaar numbers collected by the AUAs/KUAs/Sub-AUAs or any other agency.2 It is a secure system inside the respective agency’s infrastructure, accessible only on a need to know basis. 2. The scope of the Aadhaar Act is broad and may include your company as well.
  • 6. Does it apply to you? Aadhaar Data Vault applies to your company if you collect Aadhaar details from your employees and store them on-premise in your database or spreadsheets.
  • 7. How should you deal with it? As a business entity, you can either: 1. Buy a third-party Aadhaar Vault. 2. Develop technologies that adhere to the Aadhaar Act. It typically involves investing in both specialized hardware, servers and software - the costs for which run into a couple of lacs.
  • 8. Introducing greytHR PIVault greytHR PIVault is an advanced security solution that safeguards sensitive personal information of your employees through strong encryption and controlled access. greytHR PIVault is 100% compliant with the Aadhaar Act.
  • 9. Key Features Tokenization Use of UUID reference tokens instead of SPII data to prevent dispersion Masked data For convenient handling of application and MIS reporting Centralized Storage Centralized service to encrypt, decrypt and manage all your SPII data Aadhaar Data Vault Unique storage facility for storing your employees’ Aadhaar data
  • 10. Benefits Data Privacy Reveals sensitive information only on a need-to-know basis Technology High-grade encryption technology supported by AWS KMS Data Security Your data is secure both during transit and at rest Compliance Ensures compliance with the Aadhaar Act
  • 12. The Aadhaar data is masked throughout the greytHR platform to ensure there is no leakage of information.
  • 13.
  • 14. The data is masked even in downloaded files and reports.
  • 16. In special cases, you can grant permission to users to view and modify the data selectively.
  • 17.
  • 18. Pricing greytHR PIVault is a free upgrade to a secure data storage environment. If you are an existing customer, the system will automatically migrate your SPII data to greytHR PIVault’s database.
  • 19. Get your organization compliant with Aadhaar Act today Start Your 30-Day Free Trial Join the 9000+ companies automating their HR and payroll with greytHR