BENEFICIARIES
|
- Entitlement protection; iris cannot be stolen like a card
- Convenience and ease of use; using the iris means no card to lose or forget
- Better quality of service through freedom of choice and reduced travel distance to outlet
|
DONORS / PAYERS
|
- Total elimination of fraud and embezzlement through targeted assistance delivery
- 24/7 customer support with live monitoring and consolidated real-time reports and SMS messages
- Data access without sharing - better protection for beneficiary data
|
SERVICE PROVIDERS
|
- Increase business from a larger donor pool and generate additional service business from beneficiaries
- Eliminate KYC risk
- One-payment reconciliation process
|
We invest in the initial infrastructure and provide flexible charging options including both a CAPEX and OPEX model. Depending on the longevity, size and structure of the project, we work with our customers to establish the most efficient and cost-effective payment model. We aim to minimise set-up costs and run on a pay-as-you-use basis throughout the duration of the operation.
OPEX MODEL
|
CAPEX MODEL
|
- SaaS subscription model with ownership cost spread over time
- Enables deployment without an up-front investment
- Fee per transaction
- Support fee
- Client owns licence and equipment at end of contract
- Data owned and controlled by client at all times
|
- Up front payment for immediate enrolment / database (licence) ownership
- Support fee
- Equipment ownership transfer to client at end of contract
- Data owned and controlled by client at all times
|
ANONYMISED DATA
|
SECURITY STANDARDS AND MEASURES
|
The iris image collected during the onboarding process is transferred into a template and is used for cross-matching purposes, returning an anonymous identifier, controlled and stored by our clients.
Our process is completely anonymised. With a biometric identification system, data is gender and racially neutral, empowering equality and digital inclusion. This also eliminates risks associated with identity theft and safeguards citizens’ privacy.
The devices in our biometric identity systems hold no iris or personal data and therefore pose no risk to any data being lost, stolen or misused in any way.
Our clients retain the ownership and access to all data collected, which is stored on their own servers.
|
We conform to current industry standards and have a number of patents covering encryption of both our hardware and realtime biometric software platforms. This ensures that the data of our clients, as well as beneficiaries, have the highest protection and security. All our EyeCloud® products in their fixable, portable and embedded range, are protected to the highest level and are certified to ISO9001:2015 and ISO 27001 standards.
EyeCloud® packets are protected with an end-to-end encryption scheme, which uses the latest industry-standard cryptographic algorithms.
Our EyePay® Phone has full compliance to PAD (Presentation Attack Detection) ISO 30107-3 Level 1 testing, performed independently by iBeta labs in the USA.
|