SlideShare a Scribd company logo
A Secure Way To Manage
Your Employee Data
According to a World Economic Forum report, the government ID
database, Aadhaar, suffered multiple breaches in 2018 that potentially
compromised the records of 1.1 billion registered citizens.
www.greythr.com
1. Source: The Global Risks Report 2019
Is your data safe?
As India adds over 40 million internet
users every year, concerns regarding data
privacy loom large.
UIDAI has made it mandatory for
companies to store Aadhaar
numbers in a centralized storage
called the Aadhaar Data Vault.
Aadhaar Act, 2016
www.greythr.com
What is Aadhaar Data Vault?
The official circular reads:
Aadhaar Data Vault is a centralized storage for all the Aadhaar
numbers collected by the AUAs/KUAs/Sub-AUAs or any other
agency.2
It is a secure system inside the respective agency’s
infrastructure, accessible only on a need to know basis.
2. The scope of the Aadhaar Act is broad and may include your company as well.
Does it apply to you?
Aadhaar Data Vault applies to your
company if you collect Aadhaar details
from your employees and store them
on-premise in your database
or spreadsheets.
How should you deal with it?
As a business entity, you can either:
1. Buy a third-party Aadhaar Vault.
2. Develop technologies that adhere to the Aadhaar Act. It typically
involves investing in both specialized hardware, servers and
software - the costs for which run into a couple of lacs.
Introducing greytHR PIVault
greytHR PIVault is an advanced security solution that
safeguards sensitive personal information of your employees
through strong encryption and controlled access.
greytHR PIVault is 100% compliant with the Aadhaar Act.
Key Features
Tokenization
Use of UUID reference
tokens instead of SPII data
to prevent dispersion
Masked data
For convenient handling of
application and MIS
reporting
Centralized Storage
Centralized service to encrypt,
decrypt and manage all your
SPII data
Aadhaar Data Vault
Unique storage facility for
storing your employees’
Aadhaar data
Benefits
Data Privacy
Reveals sensitive information
only on a need-to-know basis
Technology
High-grade encryption
technology supported by
AWS KMS
Data Security
Your data is secure both
during transit and at rest
Compliance
Ensures compliance with the
Aadhaar Act
greytHR PIVault
in action
The Aadhaar data is masked throughout the
greytHR platform to ensure there is no
leakage of information.
The data is masked even in downloaded
files and reports.
Document Number
In special cases, you can grant permission to
users to view and modify the data selectively.
Pricing
greytHR PIVault is a free upgrade to a
secure data storage environment.
If you are an existing customer, the system will
automatically migrate your SPII data to greytHR
PIVault’s database.
Get your organization compliant
with Aadhaar Act today
Start Your 30-Day Free Trial
Join the 9000+ companies automating their HR and payroll with greytHR

More Related Content

What's hot

IRDAI Compliance & Data-Centric Security | Seclore
IRDAI Compliance & Data-Centric Security | SecloreIRDAI Compliance & Data-Centric Security | Seclore
IRDAI Compliance & Data-Centric Security | Seclore
Seclore
 
CipherCloud Webinar - Cloud Encryption & Tokenization 101
CipherCloud Webinar - Cloud Encryption & Tokenization 101CipherCloud Webinar - Cloud Encryption & Tokenization 101
CipherCloud Webinar - Cloud Encryption & Tokenization 101
CipherCloud
 
CipherCloud for Salesforce - Solution Overview
CipherCloud for Salesforce - Solution OverviewCipherCloud for Salesforce - Solution Overview
CipherCloud for Salesforce - Solution Overview
CipherCloud
 
ISC(2) Security Briefing Part 2 - CASBs: Real-world use cases
ISC(2) Security Briefing Part 2 - CASBs: Real-world use casesISC(2) Security Briefing Part 2 - CASBs: Real-world use cases
ISC(2) Security Briefing Part 2 - CASBs: Real-world use cases
Bitglass
 
Understanding Global Data Protection Laws: Webinar
Understanding Global Data Protection Laws: WebinarUnderstanding Global Data Protection Laws: Webinar
Understanding Global Data Protection Laws: Webinar
CipherCloud
 
Mature connections: 6 stages to IoT success
Mature connections: 6 stages to IoT successMature connections: 6 stages to IoT success
Mature connections: 6 stages to IoT success
Singtel
 
information control and Security system
information control and Security systeminformation control and Security system
information control and Security system
bhavesh lande
 
Data Privacy Readiness Test
Data Privacy Readiness TestData Privacy Readiness Test
Data Privacy Readiness Test
Druva
 
UMA as Authorization mechanism for IoT: a healthcare scenario
UMA as Authorization mechanism for IoT: a healthcare scenarioUMA as Authorization mechanism for IoT: a healthcare scenario
UMA as Authorization mechanism for IoT: a healthcare scenario
Domenico Catalano
 
Drivelock modern approach of it security & amp; encryption solution -whitep...
Drivelock   modern approach of it security & amp; encryption solution -whitep...Drivelock   modern approach of it security & amp; encryption solution -whitep...
Drivelock modern approach of it security & amp; encryption solution -whitep...
Arbp Worldwide
 
CipherCloud Technology Overview: Tokenization
CipherCloud Technology Overview: TokenizationCipherCloud Technology Overview: Tokenization
CipherCloud Technology Overview: Tokenization
CipherCloud
 
Protecting customer accounts from cyber attacks
Protecting customer accounts from cyber attacksProtecting customer accounts from cyber attacks
Protecting customer accounts from cyber attacks
Deepak Gupta
 
Five ways io t assists enterprises in asset management min
Five ways io t assists enterprises in  asset management minFive ways io t assists enterprises in  asset management min
Five ways io t assists enterprises in asset management min
Solution Analysts
 
Guardium Triples Bookings and Installed Base in 2006
Guardium Triples Bookings and Installed Base in 2006Guardium Triples Bookings and Installed Base in 2006
Guardium Triples Bookings and Installed Base in 2006pneray
 
Kantara Orientation for CARIN Digital ID Summit
Kantara Orientation for CARIN Digital ID SummitKantara Orientation for CARIN Digital ID Summit
Kantara Orientation for CARIN Digital ID Summit
Noreen Whysel
 
CipherCloud Technology Overview: Encryption
CipherCloud Technology Overview: EncryptionCipherCloud Technology Overview: Encryption
CipherCloud Technology Overview: Encryption
CipherCloud
 
Salesforce Security with Visibility, Control & Data Protection
Salesforce Security with Visibility, Control & Data ProtectionSalesforce Security with Visibility, Control & Data Protection
Salesforce Security with Visibility, Control & Data Protection
CipherCloud
 
Digital Agricultural Services for Insurance - Selim Üçer
Digital Agricultural Services for Insurance - Selim ÜçerDigital Agricultural Services for Insurance - Selim Üçer
Digital Agricultural Services for Insurance - Selim Üçer
sigortatatbikatcilari
 

What's hot (20)

Press Release IDR Redaction
Press Release IDR RedactionPress Release IDR Redaction
Press Release IDR Redaction
 
IRDAI Compliance & Data-Centric Security | Seclore
IRDAI Compliance & Data-Centric Security | SecloreIRDAI Compliance & Data-Centric Security | Seclore
IRDAI Compliance & Data-Centric Security | Seclore
 
CipherCloud Webinar - Cloud Encryption & Tokenization 101
CipherCloud Webinar - Cloud Encryption & Tokenization 101CipherCloud Webinar - Cloud Encryption & Tokenization 101
CipherCloud Webinar - Cloud Encryption & Tokenization 101
 
POS_Slide_Show
POS_Slide_ShowPOS_Slide_Show
POS_Slide_Show
 
CipherCloud for Salesforce - Solution Overview
CipherCloud for Salesforce - Solution OverviewCipherCloud for Salesforce - Solution Overview
CipherCloud for Salesforce - Solution Overview
 
ISC(2) Security Briefing Part 2 - CASBs: Real-world use cases
ISC(2) Security Briefing Part 2 - CASBs: Real-world use casesISC(2) Security Briefing Part 2 - CASBs: Real-world use cases
ISC(2) Security Briefing Part 2 - CASBs: Real-world use cases
 
Understanding Global Data Protection Laws: Webinar
Understanding Global Data Protection Laws: WebinarUnderstanding Global Data Protection Laws: Webinar
Understanding Global Data Protection Laws: Webinar
 
Mature connections: 6 stages to IoT success
Mature connections: 6 stages to IoT successMature connections: 6 stages to IoT success
Mature connections: 6 stages to IoT success
 
information control and Security system
information control and Security systeminformation control and Security system
information control and Security system
 
Data Privacy Readiness Test
Data Privacy Readiness TestData Privacy Readiness Test
Data Privacy Readiness Test
 
UMA as Authorization mechanism for IoT: a healthcare scenario
UMA as Authorization mechanism for IoT: a healthcare scenarioUMA as Authorization mechanism for IoT: a healthcare scenario
UMA as Authorization mechanism for IoT: a healthcare scenario
 
Drivelock modern approach of it security & amp; encryption solution -whitep...
Drivelock   modern approach of it security & amp; encryption solution -whitep...Drivelock   modern approach of it security & amp; encryption solution -whitep...
Drivelock modern approach of it security & amp; encryption solution -whitep...
 
CipherCloud Technology Overview: Tokenization
CipherCloud Technology Overview: TokenizationCipherCloud Technology Overview: Tokenization
CipherCloud Technology Overview: Tokenization
 
Protecting customer accounts from cyber attacks
Protecting customer accounts from cyber attacksProtecting customer accounts from cyber attacks
Protecting customer accounts from cyber attacks
 
Five ways io t assists enterprises in asset management min
Five ways io t assists enterprises in  asset management minFive ways io t assists enterprises in  asset management min
Five ways io t assists enterprises in asset management min
 
Guardium Triples Bookings and Installed Base in 2006
Guardium Triples Bookings and Installed Base in 2006Guardium Triples Bookings and Installed Base in 2006
Guardium Triples Bookings and Installed Base in 2006
 
Kantara Orientation for CARIN Digital ID Summit
Kantara Orientation for CARIN Digital ID SummitKantara Orientation for CARIN Digital ID Summit
Kantara Orientation for CARIN Digital ID Summit
 
CipherCloud Technology Overview: Encryption
CipherCloud Technology Overview: EncryptionCipherCloud Technology Overview: Encryption
CipherCloud Technology Overview: Encryption
 
Salesforce Security with Visibility, Control & Data Protection
Salesforce Security with Visibility, Control & Data ProtectionSalesforce Security with Visibility, Control & Data Protection
Salesforce Security with Visibility, Control & Data Protection
 
Digital Agricultural Services for Insurance - Selim Üçer
Digital Agricultural Services for Insurance - Selim ÜçerDigital Agricultural Services for Insurance - Selim Üçer
Digital Agricultural Services for Insurance - Selim Üçer
 

Similar to PIVault - A secure way to manage your employee data

Aadhaar: Providing proof of identity to millions
Aadhaar: Providing proof of identity to millionsAadhaar: Providing proof of identity to millions
Aadhaar: Providing proof of identity to millions
Hp kushal
 
Future of Aadhaar is "a secure and robust system ensuring complete security a...
Future of Aadhaar is "a secure and robust system ensuring complete security a...Future of Aadhaar is "a secure and robust system ensuring complete security a...
Future of Aadhaar is "a secure and robust system ensuring complete security a...
National Management Olympiad
 
Giving 1.2 billion citizens a unique identity
Giving 1.2 billion citizens a unique identityGiving 1.2 billion citizens a unique identity
Giving 1.2 billion citizens a unique identity
Mindtree Ltd.
 
Mindtree cs government-big data & analytics
Mindtree cs government-big data & analyticsMindtree cs government-big data & analytics
Mindtree cs government-big data & analyticsMindtree Ltd.
 
Streamline Identity Management & Administration on AWS
Streamline Identity Management & Administration on AWSStreamline Identity Management & Administration on AWS
Streamline Identity Management & Administration on AWS
Amazon Web Services
 
IOT in Bangladesh
IOT in BangladeshIOT in Bangladesh
IOT in Bangladesh
Pridesys IT Ltd.
 
practical risks in aadhaar project and measures to overcome them
practical risks in aadhaar project and measures to overcome thempractical risks in aadhaar project and measures to overcome them
practical risks in aadhaar project and measures to overcome them
saipriyadonthula
 
General manager | NMO 2019
General manager | NMO 2019General manager | NMO 2019
General manager | NMO 2019
National Management Olympiad
 
Truzzt whitepaper a4_einzel_20200311
Truzzt whitepaper a4_einzel_20200311Truzzt whitepaper a4_einzel_20200311
Truzzt whitepaper a4_einzel_20200311
h-bauer2014
 
Where data security and value of data meet in the cloud brighttalk webinar ...
Where data security and value of data meet in the cloud   brighttalk webinar ...Where data security and value of data meet in the cloud   brighttalk webinar ...
Where data security and value of data meet in the cloud brighttalk webinar ...
Ulf Mattsson
 
Extract the Analyzed Information from Dark Data
Extract the Analyzed Information from Dark DataExtract the Analyzed Information from Dark Data
Extract the Analyzed Information from Dark Data
ijtsrd
 
PCI Compliance Report
PCI Compliance ReportPCI Compliance Report
PCI Compliance Report
Holly Vega
 
BigID PII & PI Discovery for GDPR Data Sheet
BigID PII & PI Discovery for GDPR Data SheetBigID PII & PI Discovery for GDPR Data Sheet
BigID PII & PI Discovery for GDPR Data Sheet
Dimitri Sirota
 
Data Security.pdf
Data Security.pdfData Security.pdf
Data Security.pdf
FujifilmFbsg
 
Enabling Distributed Trust in Agriculture data spaces
Enabling Distributed Trust in Agriculture data spacesEnabling Distributed Trust in Agriculture data spaces
Enabling Distributed Trust in Agriculture data spaces
Gerard van der Hoeven
 
Ping Identity
Ping IdentityPing Identity
Ping Identity
Ping Identity
 
Azure Forensics & Incident Response
Azure Forensics & Incident ResponseAzure Forensics & Incident Response
Azure Forensics & Incident Response
Christopher Doman
 
#GDPR Compliance - Data Minimization via ArchivePod
#GDPR Compliance - Data Minimization via ArchivePod#GDPR Compliance - Data Minimization via ArchivePod
#GDPR Compliance - Data Minimization via ArchivePod
Garet Keller
 
INTERPLAY OF ARTIFICIAL INTELLIGENCE ON TRADE SECRETS
INTERPLAY OF ARTIFICIAL INTELLIGENCE ON TRADE SECRETSINTERPLAY OF ARTIFICIAL INTELLIGENCE ON TRADE SECRETS
INTERPLAY OF ARTIFICIAL INTELLIGENCE ON TRADE SECRETS
IRJET Journal
 
News letter march 12
News letter march 12News letter march 12
News letter march 12
Capt SB Tyagi, COAC'CC*,FISM,CSC,
 

Similar to PIVault - A secure way to manage your employee data (20)

Aadhaar: Providing proof of identity to millions
Aadhaar: Providing proof of identity to millionsAadhaar: Providing proof of identity to millions
Aadhaar: Providing proof of identity to millions
 
Future of Aadhaar is "a secure and robust system ensuring complete security a...
Future of Aadhaar is "a secure and robust system ensuring complete security a...Future of Aadhaar is "a secure and robust system ensuring complete security a...
Future of Aadhaar is "a secure and robust system ensuring complete security a...
 
Giving 1.2 billion citizens a unique identity
Giving 1.2 billion citizens a unique identityGiving 1.2 billion citizens a unique identity
Giving 1.2 billion citizens a unique identity
 
Mindtree cs government-big data & analytics
Mindtree cs government-big data & analyticsMindtree cs government-big data & analytics
Mindtree cs government-big data & analytics
 
Streamline Identity Management & Administration on AWS
Streamline Identity Management & Administration on AWSStreamline Identity Management & Administration on AWS
Streamline Identity Management & Administration on AWS
 
IOT in Bangladesh
IOT in BangladeshIOT in Bangladesh
IOT in Bangladesh
 
practical risks in aadhaar project and measures to overcome them
practical risks in aadhaar project and measures to overcome thempractical risks in aadhaar project and measures to overcome them
practical risks in aadhaar project and measures to overcome them
 
General manager | NMO 2019
General manager | NMO 2019General manager | NMO 2019
General manager | NMO 2019
 
Truzzt whitepaper a4_einzel_20200311
Truzzt whitepaper a4_einzel_20200311Truzzt whitepaper a4_einzel_20200311
Truzzt whitepaper a4_einzel_20200311
 
Where data security and value of data meet in the cloud brighttalk webinar ...
Where data security and value of data meet in the cloud   brighttalk webinar ...Where data security and value of data meet in the cloud   brighttalk webinar ...
Where data security and value of data meet in the cloud brighttalk webinar ...
 
Extract the Analyzed Information from Dark Data
Extract the Analyzed Information from Dark DataExtract the Analyzed Information from Dark Data
Extract the Analyzed Information from Dark Data
 
PCI Compliance Report
PCI Compliance ReportPCI Compliance Report
PCI Compliance Report
 
BigID PII & PI Discovery for GDPR Data Sheet
BigID PII & PI Discovery for GDPR Data SheetBigID PII & PI Discovery for GDPR Data Sheet
BigID PII & PI Discovery for GDPR Data Sheet
 
Data Security.pdf
Data Security.pdfData Security.pdf
Data Security.pdf
 
Enabling Distributed Trust in Agriculture data spaces
Enabling Distributed Trust in Agriculture data spacesEnabling Distributed Trust in Agriculture data spaces
Enabling Distributed Trust in Agriculture data spaces
 
Ping Identity
Ping IdentityPing Identity
Ping Identity
 
Azure Forensics & Incident Response
Azure Forensics & Incident ResponseAzure Forensics & Incident Response
Azure Forensics & Incident Response
 
#GDPR Compliance - Data Minimization via ArchivePod
#GDPR Compliance - Data Minimization via ArchivePod#GDPR Compliance - Data Minimization via ArchivePod
#GDPR Compliance - Data Minimization via ArchivePod
 
INTERPLAY OF ARTIFICIAL INTELLIGENCE ON TRADE SECRETS
INTERPLAY OF ARTIFICIAL INTELLIGENCE ON TRADE SECRETSINTERPLAY OF ARTIFICIAL INTELLIGENCE ON TRADE SECRETS
INTERPLAY OF ARTIFICIAL INTELLIGENCE ON TRADE SECRETS
 
News letter march 12
News letter march 12News letter march 12
News letter march 12
 

More from Greytip Software

Recent changes in Personal Income Tax
Recent changes in Personal Income TaxRecent changes in Personal Income Tax
Recent changes in Personal Income Tax
Greytip Software
 
Decoding The Economics Package For MSMES
Decoding The Economics Package For MSMESDecoding The Economics Package For MSMES
Decoding The Economics Package For MSMES
Greytip Software
 
Decoding Labour Law Changes During Lockdown
Decoding Labour Law Changes During LockdownDecoding Labour Law Changes During Lockdown
Decoding Labour Law Changes During Lockdown
Greytip Software
 
Legal Implication of Labour Laws due to COVID 19 and Interpretation thereof
Legal Implication of Labour Laws due to COVID 19 and Interpretation thereofLegal Implication of Labour Laws due to COVID 19 and Interpretation thereof
Legal Implication of Labour Laws due to COVID 19 and Interpretation thereof
Greytip Software
 
The Importance of Organisational Effectiveness and Way Forward
The Importance of Organisational Effectiveness and Way ForwardThe Importance of Organisational Effectiveness and Way Forward
The Importance of Organisational Effectiveness and Way Forward
Greytip Software
 
How to Increase Productivity with Minimum Employees during COVID 19
How to Increase Productivity with Minimum Employees during COVID 19How to Increase Productivity with Minimum Employees during COVID 19
How to Increase Productivity with Minimum Employees during COVID 19
Greytip Software
 
Generation of Form 16 using greytHR
Generation of Form 16 using greytHRGeneration of Form 16 using greytHR
Generation of Form 16 using greytHR
Greytip Software
 
Proof of Investments
Proof of InvestmentsProof of Investments
Proof of Investments
Greytip Software
 
Best tax saving investments
Best tax saving investmentsBest tax saving investments
Best tax saving investments
Greytip Software
 
Shops & Establishment Act
Shops & Establishment ActShops & Establishment Act
Shops & Establishment Act
Greytip Software
 
Labour Law Compliance for Contract Employees
Labour Law Compliance for Contract EmployeesLabour Law Compliance for Contract Employees
Labour Law Compliance for Contract Employees
Greytip Software
 
greytHR webinar POSH Act
greytHR webinar POSH ActgreytHR webinar POSH Act
greytHR webinar POSH Act
Greytip Software
 
greytHR Webinar Maternity Benefit
greytHR Webinar Maternity BenefitgreytHR Webinar Maternity Benefit
greytHR Webinar Maternity Benefit
Greytip Software
 
Product update v5.3.6
Product update v5.3.6  Product update v5.3.6
Product update v5.3.6
Greytip Software
 
PF ECR v2.0.pptx
PF ECR v2.0.pptxPF ECR v2.0.pptx
PF ECR v2.0.pptx
Greytip Software
 
Leave year-end process FAQ
Leave year-end process FAQ Leave year-end process FAQ
Leave year-end process FAQ
Greytip Software
 
Leave year-end process
Leave year-end process Leave year-end process
Leave year-end process
Greytip Software
 
Adopt cashless processing- Payroll Processing and Statutory Remittances
Adopt cashless processing- Payroll Processing and Statutory RemittancesAdopt cashless processing- Payroll Processing and Statutory Remittances
Adopt cashless processing- Payroll Processing and Statutory Remittances
Greytip Software
 
Product update v5.3.4
Product update v5.3.4Product update v5.3.4
Product update v5.3.4
Greytip Software
 
Statutory Changes in Employment Laws - greytHR
Statutory Changes in Employment Laws - greytHRStatutory Changes in Employment Laws - greytHR
Statutory Changes in Employment Laws - greytHR
Greytip Software
 

More from Greytip Software (20)

Recent changes in Personal Income Tax
Recent changes in Personal Income TaxRecent changes in Personal Income Tax
Recent changes in Personal Income Tax
 
Decoding The Economics Package For MSMES
Decoding The Economics Package For MSMESDecoding The Economics Package For MSMES
Decoding The Economics Package For MSMES
 
Decoding Labour Law Changes During Lockdown
Decoding Labour Law Changes During LockdownDecoding Labour Law Changes During Lockdown
Decoding Labour Law Changes During Lockdown
 
Legal Implication of Labour Laws due to COVID 19 and Interpretation thereof
Legal Implication of Labour Laws due to COVID 19 and Interpretation thereofLegal Implication of Labour Laws due to COVID 19 and Interpretation thereof
Legal Implication of Labour Laws due to COVID 19 and Interpretation thereof
 
The Importance of Organisational Effectiveness and Way Forward
The Importance of Organisational Effectiveness and Way ForwardThe Importance of Organisational Effectiveness and Way Forward
The Importance of Organisational Effectiveness and Way Forward
 
How to Increase Productivity with Minimum Employees during COVID 19
How to Increase Productivity with Minimum Employees during COVID 19How to Increase Productivity with Minimum Employees during COVID 19
How to Increase Productivity with Minimum Employees during COVID 19
 
Generation of Form 16 using greytHR
Generation of Form 16 using greytHRGeneration of Form 16 using greytHR
Generation of Form 16 using greytHR
 
Proof of Investments
Proof of InvestmentsProof of Investments
Proof of Investments
 
Best tax saving investments
Best tax saving investmentsBest tax saving investments
Best tax saving investments
 
Shops & Establishment Act
Shops & Establishment ActShops & Establishment Act
Shops & Establishment Act
 
Labour Law Compliance for Contract Employees
Labour Law Compliance for Contract EmployeesLabour Law Compliance for Contract Employees
Labour Law Compliance for Contract Employees
 
greytHR webinar POSH Act
greytHR webinar POSH ActgreytHR webinar POSH Act
greytHR webinar POSH Act
 
greytHR Webinar Maternity Benefit
greytHR Webinar Maternity BenefitgreytHR Webinar Maternity Benefit
greytHR Webinar Maternity Benefit
 
Product update v5.3.6
Product update v5.3.6  Product update v5.3.6
Product update v5.3.6
 
PF ECR v2.0.pptx
PF ECR v2.0.pptxPF ECR v2.0.pptx
PF ECR v2.0.pptx
 
Leave year-end process FAQ
Leave year-end process FAQ Leave year-end process FAQ
Leave year-end process FAQ
 
Leave year-end process
Leave year-end process Leave year-end process
Leave year-end process
 
Adopt cashless processing- Payroll Processing and Statutory Remittances
Adopt cashless processing- Payroll Processing and Statutory RemittancesAdopt cashless processing- Payroll Processing and Statutory Remittances
Adopt cashless processing- Payroll Processing and Statutory Remittances
 
Product update v5.3.4
Product update v5.3.4Product update v5.3.4
Product update v5.3.4
 
Statutory Changes in Employment Laws - greytHR
Statutory Changes in Employment Laws - greytHRStatutory Changes in Employment Laws - greytHR
Statutory Changes in Employment Laws - greytHR
 

Recently uploaded

May Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdfMay Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdf
Adele Miller
 
Enterprise Software Development with No Code Solutions.pptx
Enterprise Software Development with No Code Solutions.pptxEnterprise Software Development with No Code Solutions.pptx
Enterprise Software Development with No Code Solutions.pptx
QuickwayInfoSystems3
 
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdfVitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
Globus
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Globus
 
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing SuiteAI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
Google
 
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdfAutomated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
timtebeek1
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
XfilesPro
 
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Mind IT Systems
 
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
Alina Yurenko
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
Fermin Galan
 
Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
NYGGS Automation Suite
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
Max Andersen
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
Shane Coughlan
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
abdulrafaychaudhry
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
Globus
 
Empowering Growth with Best Software Development Company in Noida - Deuglo
Empowering Growth with Best Software  Development Company in Noida - DeugloEmpowering Growth with Best Software  Development Company in Noida - Deuglo
Empowering Growth with Best Software Development Company in Noida - Deuglo
Deuglo Infosystem Pvt Ltd
 
Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"
Donna Lenk
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Globus
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
Globus
 

Recently uploaded (20)

May Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdfMay Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdf
 
Enterprise Software Development with No Code Solutions.pptx
Enterprise Software Development with No Code Solutions.pptxEnterprise Software Development with No Code Solutions.pptx
Enterprise Software Development with No Code Solutions.pptx
 
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdfVitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdf
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
 
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing SuiteAI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
 
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdfAutomated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
 
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
 
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
 
Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
 
Empowering Growth with Best Software Development Company in Noida - Deuglo
Empowering Growth with Best Software  Development Company in Noida - DeugloEmpowering Growth with Best Software  Development Company in Noida - Deuglo
Empowering Growth with Best Software Development Company in Noida - Deuglo
 
Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
 

PIVault - A secure way to manage your employee data

  • 1. A Secure Way To Manage Your Employee Data
  • 2. According to a World Economic Forum report, the government ID database, Aadhaar, suffered multiple breaches in 2018 that potentially compromised the records of 1.1 billion registered citizens. www.greythr.com 1. Source: The Global Risks Report 2019
  • 3. Is your data safe? As India adds over 40 million internet users every year, concerns regarding data privacy loom large.
  • 4. UIDAI has made it mandatory for companies to store Aadhaar numbers in a centralized storage called the Aadhaar Data Vault. Aadhaar Act, 2016
  • 5. www.greythr.com What is Aadhaar Data Vault? The official circular reads: Aadhaar Data Vault is a centralized storage for all the Aadhaar numbers collected by the AUAs/KUAs/Sub-AUAs or any other agency.2 It is a secure system inside the respective agency’s infrastructure, accessible only on a need to know basis. 2. The scope of the Aadhaar Act is broad and may include your company as well.
  • 6. Does it apply to you? Aadhaar Data Vault applies to your company if you collect Aadhaar details from your employees and store them on-premise in your database or spreadsheets.
  • 7. How should you deal with it? As a business entity, you can either: 1. Buy a third-party Aadhaar Vault. 2. Develop technologies that adhere to the Aadhaar Act. It typically involves investing in both specialized hardware, servers and software - the costs for which run into a couple of lacs.
  • 8. Introducing greytHR PIVault greytHR PIVault is an advanced security solution that safeguards sensitive personal information of your employees through strong encryption and controlled access. greytHR PIVault is 100% compliant with the Aadhaar Act.
  • 9. Key Features Tokenization Use of UUID reference tokens instead of SPII data to prevent dispersion Masked data For convenient handling of application and MIS reporting Centralized Storage Centralized service to encrypt, decrypt and manage all your SPII data Aadhaar Data Vault Unique storage facility for storing your employees’ Aadhaar data
  • 10. Benefits Data Privacy Reveals sensitive information only on a need-to-know basis Technology High-grade encryption technology supported by AWS KMS Data Security Your data is secure both during transit and at rest Compliance Ensures compliance with the Aadhaar Act
  • 12. The Aadhaar data is masked throughout the greytHR platform to ensure there is no leakage of information.
  • 13.
  • 14. The data is masked even in downloaded files and reports.
  • 16. In special cases, you can grant permission to users to view and modify the data selectively.
  • 17.
  • 18. Pricing greytHR PIVault is a free upgrade to a secure data storage environment. If you are an existing customer, the system will automatically migrate your SPII data to greytHR PIVault’s database.
  • 19. Get your organization compliant with Aadhaar Act today Start Your 30-Day Free Trial Join the 9000+ companies automating their HR and payroll with greytHR