Back to Login Terms & Conditions

Privacy Protocol

Data Integrity & Multi-Tenant Isolation Matrix

Zero-Knowledge Storage
Isolated Tenant Nodes
Dynamic Security Mesh

I. Philosophy of Neutrality

VShield Master Hub operates under the strict legal and technical mandate of Data Sovereignty. We recognize that in the modern digital age, an organization's most valuable asset is its operational logic. Therefore, our infrastructure is designed to be a "Neutral Host"—a system that provides world-class management modules without ever gaining visibility into the data processed within them.

This protocol serves as a legally binding document that defines the boundaries between VShield Infrastructure (The Hub) and Client Operational Data (The Payload). We guarantee that your company environment is a hermetically sealed vault. We provide the vault, the security, and the maintenance, but we do not possess the key to see what is inside.

"Our mandate is absolute: We store identifiers to verify nodes, but we never analyze the work. Not a single character of client information is shared with unauthorized entities, including hub administrators."

Core Promise

No cross-tenant data leakage. No administrative snooping. No metadata harvesting. Total privacy by design.

Isolation Tech

Individual database indexing ensures that queries for Company A can never return data from Company B.

II. Active Identity Node Storage

To maintain a synchronized matrix of users and organizations, VShield Hub stores only the minimal "Metadata Nodes" required for terminal authentication. Beyond these identifiers, the hub remains blind.

Legal Identity

We store the User's Full Name as provided during node registration. This is used solely for personalized dashboard headers and internal audit trails within YOUR company instance.

Route Email

The professional email address is used as a unique authentication identifier and for secure password reset routing. We do not use this for marketing pulses or third-party lists.

Hub Identity

The Company Name is stored to establish your private multi-tenant node. This allows the system to route all module requests to the correct siloed database tables.

III. Restricted Payload Matrix

Our architecture includes hard-coded technical restrictions that prevent VShield Hub Administrators from accessing sensitive "Payload" data. We do not have the capability to view, audt, or export the following components from your hub instance:

Passwords
Documents
Images / Pics
Audit Reports
HR Files
Gate Logs

IV. Specific Module Privacy Specifications

HRMS & Personnel Registry

The Personnel Registry is an encrypted silo. Employee contact details, bank accounts, and sensitive CNIC data are stored in hashes that are unique to your organization. VShield has zero access to view employee contact details or share them with any entity. We do not participate in cross-company employee tracking.

Dispensary & Health Records

Health data is treated with the highest tier of isolation. Medical histories, prescriptions, and health audits are locked behind multi-layered encryption. Even during a technical support request, dispensary data remains obfuscated and inaccessible to hub engineers.

Attendance & Forensic Monitoring

Attendance records are strictly internal organizational data. Pulse-point logs from biometric terminals are routed directly to your company database and are never consolidated into a global analytics pool. Forensic logs used for troubleshooting are limited to system IDs, never user-identifiable data.

Legal & Compliance Repository

All legal documents, policy frameworks, and compliance certificates uploaded to the hub are your exclusive property. VShield Hub does not index the contents of these documents for search or analysis. Your legal strategies and procedural workflows are your confidential secrets.

Asset Tracking & Global Settings

Inventory counts, high-value asset locations, and maintenance inspection schedules are private operational nodes. While we manage the module logic, we have no visibility into the value or nature of the assets registered within your hub.

Testing & Internal Audit Hub

Audit results, inspection scoring, and remediation plans are proprietary intellectual property. We do not provide cross-company benchmarking. Your audit performance remains a private matter between your management team and your auditors.

To provide a truly expansive view of our privacy commitment, we detail the operational status of the remaining modules including: Alerts Manager, Certificates & Memberships, Identity Rights, Module Factory, Report Matrix, Signal Hub, and Training & Development. Each of these modules follows the primary directive of Zero-Knowledge storage.

In the Training & Development module, for example, your internal training materials, curricula, and employee scoring are not shared. We do not know who you are training or what you are training them on. In the Alerts Manager, your internal emergency triggers and signal protocols are siloed. If a "Security Signal" is issued within your hub, it stays within your hub—it does not broadcast your internal emergency to the rest of the VShield Master Matrix.

Furthermore, the Module Factory allows you to build custom logic. Any custom logic developed by your team remains your proprietary software configuration. We provide the builder, but you own the architecture you create within it. This extends to the Report Matrix, where custom dashboards and generated analytics are viewable only by authorized users with specific Identity Rights in your company.

V. Collaborative Mitigation Protocol

CNIC-Based Blind Handshake Security

The Logic of Shared Defense

VShield Hub implements a unique model of "Privacy-First Collective Security." Organizations have a legitimate interest in preventing restricted individuals from accessing their premises. To facilitate this without compromising company confidentiality, we use a Blind Handshake Logic.

How it Works:

  • If you block an individual at your Gate Access module, a "Threat Pulse" is emitted into the matrix.
  • This pulse is invisible to other companies by default. It only reveals itself if another tenant enters the exact CNIC of that person.
  • Even when a pulse is detected, the hub never reveals the identity of the blocking organization. Security is maintained, but the source remains anonymous.

Global vs. Internal Isolation

We maintain two distinct tiers of security isolation within the gate access matrix to prevent misuse and ensure node integrity:

Tier I: Global Isolation (Permanent)

If solid forensic evidence of a high-severity threat is provided and verified by our system, that individual is globally blocked at every gate connected to the Master Hub. This is a system-level lockout.

Tier II: Hub Isolation (Private)

All other blocks remain strictly local to your company. This data is not shared, not broadcast, and we do not even have administrative access to view the reason for your internal lockout decisions.

VI. The Single Character Mandate

"Our commitment to your privacy is absolute and granular. We do not share our client information including a single character with any body—not other clients, not government agencies without a warrant, and not our own support staff without your explicit terminal authorization."

Multi-Tenant Boundaries

Every database query is gated by a system-level 'company_id' filter that is hard-coded into our core PHP framework. It is technically impossible for a user of one company to "stumble" upon the data of another company.

Employee Confidentiality

Employee contact details are considered high-value assets. We do not allow any hub-wide indexing. Your personnel registry is yours alone.

TLS 1.3 Encryption

All handshakes between your browser and the Master Hub are protected by high-level TLS encryption, ensuring data is secure in transit.

Table Silos

We use isolated storage logic. Your forensic logs, attendance pulses, and dispensary records never live in the same row as other clients.

Auth Guard

Administrative access to modules is controlled by Identity Rights. Only those you authorize can view your data—we cannot.

Zero Disclosure

We do not sell, rent, or share anonymized data. Your operational metrics are your business, not our product.

VII. Lifecycle of Data & Decommissioning

Organizations have the absolute right to delete their organizational footprint from the VShield Hub. When a company node is decommissioned, the following protocol is triggered:

Active Node Purge

All database entries associated with your company ID across all 24 modules (from HRMS to Signal Hub) are purged from the active matrix. This process is irreversible.

Forensic Log Removal

Internal forensic logs, attendance history, and medical records are permanently erased. We do not keep "ghost backups" of deleted organizations.

Note: Identity nodes (Name, Email) may be retained for 30 days in our security watchdog logs to prevent identity fraud or node collision, after which they are also automatically purged.

Integrity Hub Sign-Off

VShield Data Sovereignty Commitment

"By deploying this hub, we recognize that we are entrusted with the infrastructure of your organization. In honoring that trust, we guarantee that your data is invisible to us. From attendance pulses to forensic audit logs, your privacy is absolute. We do not analyze your work. We do not share your identity. We do not view your secrets. Not a single character, not ever."

Verified Hub Infrastructure

FUSION_MATRIX_SEC_V3

STAMP_ID: 389a6ce1c40cadd14eab5575b5244cf875229093a6abf405124a595115f6640e

Protocol Protocol Date

22-May-2026

This document is digitally signed, timestamped, and binding for all hub operations. Public guest access is authorized for verification purposes.