Versions Compared
Key
- This line was added.
- This line was removed.
- Formatting was changed.
All data are always encrypted during During the storage process in Danielle Software. You can also increase security by using the symmetric-key algorithm (see https://en.wikipedia.org/wiki/Symmetric-key_algorithm). In this case, you have to download the encoder. When the encoder is started, a file entitled ‘.key’ will be generated.
The file must be stored on every computer so as the encrypted data can be read. The ‘.key’ file has to be uploaded every time you log into the application.
This term is the security key and cannot be changed; it encrypts all data irrevocably.
If a person has registered in the application but the security key is not available, which would be possible if a smartphone is used for access, login is still possible since the person has authorised access. Then all the data that could identify the person cannot be read. The employee can only be identified by means of the internal personnel number. Documents cannot be uploaded or viewed without the security key because texts containing information identifying the person can appear in documents in many different ways.
, all data (see below) are always encrypted automatically in the database with the help of a asymmetric encryption method. At the first login, an access key is automatically generated on an external server for each company/corporate structure.
The data can be read in the application because they are decrypted at the first login. Encryption is a means of preventing data theft.
The following data are encrypted:
- Personal Personal information such as e-mail address, name, postal address, date and place of birth, nationality, marital status, banking details and personal contact details
- Information on Information on employment contracts, working conditions, holiday entitlement and notice of termination
- Information on education
- Details on the on the department as well as business contact details
- Additional contact Additional contact details such as holiday address or address in emergencies
- Events and resubmissions
- and resubmissions
When an employee leaves the company, the access key is irrevocably destroyed and the personal information remains unreadable forever.