header
header
platform-offers
icon1 icon1 icon1

As per the Indian Government's privacy regulation for Aadhaar, of India (UIDAI’s authentication division) dated Jul 25th, 2017, encryption (masking) of Aadhaar Number and any connected data is mandatory before storing images of Aadhaar cards in databases. (circular 11020/205/2017)

The EU has introduced a new set of data rules known as the General Data Protection Regulation (GDPR) applicable from May 25th 2018 that will apply to any business that handles the data of EU nationals (including their staff), with very strict penalties for violation. The requirements include ensuring data usage only as intended and encryption of data with access controls

The EU has introduced a new set of data rules known as the General Data Protection Regulation (GDPR) applicable from May 25th 2018 that will apply to any business that handles the data of EU nationals (including their staff), with very strict penalties for violation. The requirements include ensuring data usage only as intended and encryption of data with access controls

icon1 As per the Indian Government's privacy regulation for Aadhaar, of India (UIDAI’s authentication division) dated Jul 25th, 2017, encryption (masking) of Aadhaar Number and any connected data is mandatory before storing images of Aadhaar cards in databases. (circular 11020/205/2017)

icon1 The EU has introduced a new set of data rules known as the General Data Protection Regulation (GDPR) applicable from May 25th 2018 that will apply to any business that handles the data of EU nationals (including their staff), with very strict penalties for violation. The requirements include ensuring data usage only as intended and encryption of data with access controls

icon1 The EU has introduced a new set of data rules known as the General Data Protection Regulation (GDPR) applicable from May 25th 2018 that will apply to any business that handles the data of EU nationals (including their staff), with very strict penalties for violation. The requirements include ensuring data usage only as intended and encryption of data with access controls

Key Differences: 1. Fine Grained Control 2. Tamper Detection
Key Differences: 1. Fine Grained Control 2. Tamper Detection
How is it done? 1. Imgae Upload 2. Encryption by SM gateway 3. Stored in secure enterprise storage 4. Rights based access
How is it done? 1. Imgae Upload 2. Encryption by SM gateway 3. Stored in secure enterprise storage 4. Rights based access

Frequently Asked Questions (FAQs)


Frequently Asked Questions (FAQs)


above-footer