Platform Security Overview
At Udyamo, security is paramount. The HRMS is designed with multiple layers of protection to safeguard sensitive employee and company data.
- Encryption: Data transmission is protected using SSL/TLS encryption. Sensitive data at rest is encrypted using industry-standard protocols.
- Infrastructure: Hosted on secure cloud servers with regular backups and disaster recovery protocols.
User Roles and Access Levels
Access to data is strictly governed by Roles:
- Super Admin: Full access to all modules, settings, and data.
- HR Admin: Access to manage employees, payroll, and reports, but restricted from system-wide billing or advanced configuration settings.
- Manager: Read-only access to their team’s data; edit access for approvals.
- Employee: Restricted to own personal data (My Profile, My Leaves, My Payslips).
Data Access Control
Administrators can finely tune permissions:
- Go to Settings > Roles & Permissions.
- Create custom roles if the default ones do not fit.
- Check/Uncheck permissions for specific modules (e.g., “View Salary”, “Edit Personal Details”).
- Assign these roles to specific employees.
Login and Authentication Basics
- Password Policy: The system enforces strong passwords (minimum length, complexity).
- Session Timeout: Users are automatically logged out after a period of inactivity to prevent unauthorized access on unattended screens.
- Multi-Factor Authentication (MFA): (If enabled) Users must verify their identity via an OTP sent to their email or mobile app in addition to their password.
Activity Logs (Admins Only)
To monitor system usage and security:
- Navigate to Settings > Audit Logs.
- View a chronological list of actions taken within the system.
- Who: Which user performed the action.
- What: The action taken (e.g., “Modified Salary for Employee X”).
- When: Timestamp of the action.
- IP Address: Source of the request.
This transparency ensures accountability for all critical changes.
Data Privacy
Udyamo HRMS is built with privacy in mind.
- Personal Data: Only authorized personnel (HR/Admin) can view sensitive personal details like bank account numbers or government IDs.
- Consent: The system is designed to support compliance with data privacy regulations (like GDPR) by allowing for data portability and the “right to be forgotten” where applicable.
Last updated: 3/30/2026 Edit this page