Support & Downloads

Get The App Now & Enjoy! We are available on the browser as well if you wish to use it.

Do You Have Any Question?

Security and Privacy

PRIVACY POLICY #

KUSHI’s Privacy Policy outlines how we collect and handle user information. We collect data that users provide during account sign-up, event registration, subscriptions, and more, primarily for HR-related purposes. We securely store payment information. We may include personal information in testimonials with user consent. We analyze interactions with KUSHI to improve services. They may collect mobile device information but allow users to manage location services. The policy also covers data collected from browsers, cookies, application logs, and third-party sources. KUSHI shares information with affiliated businesses and third-party service providers, but not for commercial purposes. It addresses information security measures, data retention, and user rights. It explains the usage of face attendance data and requires user consent. The policy also mentions compliance with applicable laws, providing a comprehensive overview of their data practices. KUSHI encourages users to regularly check for updates in both the Privacy Policy and Terms of Use & Service.

CLOUD SECURITY #

KUSHI employs AWS cloud security, which has a significant impact on our data protection strategy. By utilizing AWS, we can leverage their robust security features and certifications, such as SOC-6 (Service Organization Control 6), to ensure the security, availability, and confidentiality of our customer data. This partnership enables us to enhance our overall data security posture, providing our users with a trustworthy and compliant platform for their HR needs.

USER ACCESS ROLE #

The User Access Roles (UAR) module within KUSHI intricately manages employee access privileges, enabling tailored interaction with modules and functionalities based on designated roles. Administrators define roles aligned with organizational hierarchies and functions, endowing each role with specific access rights that permit authorized users to utilize pertinent system features. This ensures a streamlined user experience, optimizing task efficiency. Moreover, the UAR module acts as a safeguard, restricting unauthorized access and enhancing data security by limiting exposure to sensitive information. Its adaptability to evolving organizational dynamics ensures that employee access rights remain aligned with changing responsibilities. In essence, the UAR module not only enhances operational efficiency but also fortifies data privacy, embodying a pivotal element in KUSHI’s comprehensive HR and payroll management framework.

DOMAIN BASED ARCHITECTURE #

Domain-based architecture security in KUSHI is a pivotal element of our data protection strategy. Our architecture is designed around distinct domains, each serving a specific purpose and housing related functionalities. This approach enhances security by isolating and compartmentalizing data and services, limiting access only to authorized users and processes. It allows us to implement tailored security measures, such as role-based access controls, encryption, and monitoring, at the domain level. By compartmentalizing data and functions, we can more effectively protect sensitive HR information and reduce the risk of unauthorized access or data breaches. This domain-based security model not only fortifies the confidentiality and integrity of HR data but also enhances the overall resilience and scalability of our platform, ensuring that our users can trust their HR information is secure.

SENSITIVE INFORMATION #

Safeguarding sensitive information, including financial data, within KUSHI is of paramount importance. We employ rigorous security protocols and measures to ensure the confidentiality and integrity of such information. While KUSHI does not handle credit card information, operate physical data centers, utilize payment gateways, or employ role-based access controls, we are committed to maintaining the highest standards of data protection. We secure sensitive data through encryption and stringent access controls, limiting access to authorized personnel only. Regular security audits and compliance checks help us stay vigilant and adapt our security practices to emerging threats, ensuring that sensitive financial information remains safe and confidential for our users, providing them with the peace of mind they need to manage their HR operations effectively.