To provide a seamless and efficient attendance verification experience within your workplace, your securely encrypted biometric template (i.e., the digital code) may need to be available on multiple authorized attendance devices. We achieve this through a highly secure process that is managed by your employer and always prioritizes your data security.
The core process is as follows:
- Creation of a Secure Template: When you first enroll, the system extracts unique points from your biometric features (such as a fingerprint) and converts them into an irreversible, encrypted, secure template. We reiterate that your original fingerprint image is never stored or transmitted.
- Distribution via Secure Cloud Infrastructure:
- To synchronize your encrypted template to other attendance devices authorized by your employer within your workplace, we transmit it through a secure cloud infrastructure.
- To strictly comply with data protection regulations (like GDPR) and ensure the highest level of security, we use geographically specific cloud services. This means that if you are in Europe, your encrypted template will only be processed and distributed through secure cloud servers located within Europe (for example, Amazon Web Services (AWS) in Europe). Your data will not leave this region.
- Distribution to Authorized Devices Only:
- Your encrypted template will only be distributed to the authorized attendance devices designated by your employer for that specific workplace.
- Which devices and how many devices it is distributed to is entirely determined and controlled by your employer based on the operational needs of the workplace.
How do we ensure the security of this process?
- End-to-End Encryption: From creation to distribution to the final device, your biometric template remains in a strongly encrypted state, ensuring the confidentiality of the data during transmission.
- Minimization Principle: We only transmit and distribute the necessary encrypted template to achieve the purpose of attendance verification.
- Data Sovereignty and Compliance: By using regionalized cloud services, we ensure that data processing activities comply with local data sovereignty and privacy regulation requirements.
In summary, this distribution process is designed to provide you with convenience, allowing you to easily complete verification on any authorized device in your workplace, while ensuring your sensitive information receives the highest level of protection through strict encryption, access control, and a compliant cloud architecture.