Compliance
The list of compliant data privacy & data protection regulations given hereafter is not exhaustive. Please contact OneVisage to query more information.
Americas
-
USA / CCPA
-
Brazil / LPPD
Africa & Middle East
-
Saudi Arabia / PDPL
-
South Africa / POPI
Asia
-
India / DPDP
-
Indonesia / PDP
CNIL Data Protection Directive 2019-001
Article 4 - Personal data
-
No personal data are collected by OneVisage Premier solutions; personal data remain under the management of enterprise information systems
-
User's photo might be stored by the legacy access control system to compute a biometric, encrypted mathematical model. Once sent, biometric model is deleted from the information system.
-
In case of no photo can be used in information systems, an identity document reader can be used to verify locally the identity of the user and perform a local 3D facial enrolment.
-
Logs file created at onboarding or authentication contains only identifiers, no personal data information
Article 5 - Biometric Data
-
3D facial biometry is used to provide the highest level of security for the user (as opposed to fingerprint, iris, voice, 2D facial biometry, palm ID)
Article 6 - Authorized Persons to User's Data
-
IT administrator or System Supervisor manages access rights, authorizations and may delete the user's biometric template.
-
User controls her biometric template and can delete it immediately, at any time
Article 7 - Biometric Template Storage
-
Type 1: 3D facial biometric token is exclusively hold and controlled by the User
Article 8 - Storage Methods and Duration
-
Portrait picture is exclusively processed during the enrolment step
-
Biometric template created is sent by email to User, which is then destroyed once email is sent
-
Biometric template is an encrypted, irreversible mathematical model
-
Upon account deactivation, biometric template is immediately removed in case of mobile application
Article 9 - Information of Users
-
Company is in charge of informing Users about the use of a 3D facial verification system
Article 10 - Data Security
-
All measures to secure data, hardware, software and communication channels are supported
Article 11 - Data Protection Impact Assessment (DPIA) - GDPR art. 35
-
A data protection impact assessment (DPIA) is available on demand & acceptation by OneVisage

Digital Operational Resilience Act - EU 2022/2554
ICT Risk Management
-
Secure control of physical and logical access to systems
-
Strong authentication for users, administrators, and operators
-
Segregation of access rights based on roles
Identity & Access Management (IAM)
-
Centralized and consistent identity verification across services
-
Strong authentication for critical systems and operations
-
Lifecycle management (onboarding, changes, revocation)
Operational Resilience & Availability
-
Reliable authentication even under stress or high load (unlimited scalability by design)
-
Reduced dependency on manual processes and human intervention
-
Support for on-premise and controlled environments
Incident Prevention & Detection
-
Reduction of identity-based attacks (credential theft, impersonation)
-
Protection against social engineering and account takeover
-
Early detection of abnormal authentication behaviour
Logging, Monitoring & Evidence
-
Event (JSON) logs suitable for incident analysis and regulatory reporting
-
Proof of authentication and access decisions
-
Support for audits and supervisory inspections
Third-Party & Supply-Chain Risk Control
-
Controlled physical and logical access for external users, contractors, and partners
-
Strong identity verification before granting system access
-
Reduction of shared credentials and unmanaged access paths

General Data Protection Regulation - EU 2018/1725
Lawfulness, Fairness & Transparency
-
Lawful basis for processing (consent / contract / legal obligation)
-
Explicit consent for biometric data
-
Clear privacy notices comprising purpose, storage duration and rights
-
Transparent information at onboarding through kiosk
-
Records of processing activities (ROPA)
Purpose Limitation
-
Biometric data used only for Identity verification, Access Control and Secure Authentication
-
No secondary use without additional lawful basis
-
Defined processing purposes in internal documentation
Data Minimisation
-
Collection limited to strictly necessary data: biometric mathematical template (not raw image storage)
-
Identity attributes required for service, not by biometric solution
-
No central biometric database: user-controlled template model
-
No storage of raw biometric images
Accuracy
-
Identity verification against HR/registration system or official ID documents
-
Per-session biometric verification (always verify, never trust)
-
>99.999% biometric authentication confidence level
Storage Limitation
-
Defined retention policies directly linked to Access Control, HR or Registration system
-
Automatic deletion after End of employment, Event closure or Expiry of access rights
-
Configurable retention periods
-
Secure deletion mechanisms
Data Integrity & Confidentiality
-
Encryption of data at rest and in transit
-
Secure registration or enrolled QR codes with encrypted biometric token
-
No reversible biometric templates
-
Photo/video deep-fake presentation attack detection with IAPAR <0.1%
-
Access control to systems (role-based access control)
-
Authentication logs & audit trails
Biometric Data Enhanced Protection (article 10)
-
Explicit consent or strong legal basis
-
Privacy-by-design architecture
-
No biometric database
-
Biometric template irreversibility: encrypted mathematical model only
-
Technical & organisational safeguards
Data Subject Rights
-
Right of access, to rectification, to restriction of processing and to object through service
-
Right to erasure through service or by instant deletion (mobile application deletion, QR destruction...)
-
Audit logging of requests
Privacy by Design
-
Total anonymisation: no direct link between personal data and biometric template
-
Biometric token stored under user control, but relying upon the company registration workflow
-
Secure system architecture (zero-trust design)
-
Configurable processing rules
-
Default highest privacy settings
Data Protection Impact Assessment (DPIA)
-
Risk assessment of biometric authentication
-
Assessment of fraud risks and mitigations
-
Evaluation of proportionality and necessity
-
Documentation of safeguards
-
Pre-filled DPIA document available for Data Protection Officer (DPO)
Data Breach Management, Governance & Accountability
-
Under the responsibility of the company or service provider

Markets in Crypto-Assets Regulation (MiCA) - EU 2023/1114
Identity, Access & authentication
-
Strong customer authentication (SCA) aligned with EBA / PSD2 directives
-
Secure user access control for staff and administrators
-
Segregation of duties
-
Continuous authentication
-
Protection against phishing, MFA fatigue and credential compromise
Asset Protection
-
Protection against loss, theft or misuse of private keys
-
Incident or identity fraud detection and response mechanisms
-
Full auditability of access to custody systems
Cybersecurity & Resilience
-
Secure authentication mechanisms without reliance on weak credentials
-
Protection against identity spoofing and impersonation
-
Continuous monitoring of access sessions
-
Cyber incident reporting procedures
Data Protection & Privacy
-
GDPR compliance (privacy by design and by default)
-
No centralized biometric databases (biometric template protection)
-
User consent and transparency on authentication methods
-
Data minimization and encryption at rest/in transit

Network & Information Security Directive - EU 2022/2555
Secure Access Control Measures
-
Strong 2FA authentication for access to networks, systems, and services
-
Prevention of unauthorized physical and logical access
-
Elimination of weak credentials and badge sharing
Identity Verification & Trustworthiness
-
Verified identities for employees, visitors, and third parties
-
Assurance that access is granted to the right individual (not a device)
-
Protection against impersonation and forged identities
Risk Management & Secure Policies
-
Identity and access control integrated into security risk management
-
Elimination of human-factor vulnerabilities
-
Full automation to reduce operational errors
Incident Prevention & Impact Reduction
-
Limitation of attack surface through biometric-based access
-
Prevention of credential compromise and misuse
-
Faster containment through precise user identification
Monitoring, Logging & Accountability
-
Traceability of access to critical systems and locations
-
Logs usable for incident investigation and compliance checks
-
Clear accountability for access events
Data Security & Privacy Protection
-
Protection of personal and biometric template
-
Encryption and secure processing of identity attributes
-
Compliance with GDPR principles required by NIS2

Payment Services Directive 2 - EU 2015/2366
Strong Customer Authentication (SCA)
-
Multi-factor authentication (what you have + who you are)
-
Resistance to spoofing and replay attacks (photo-video deep fakes)
KYC and Identity Verification
-
Reliable customer identification and verification against trusted identity documents (passports, ID cards)
-
Secure onboarding process
-
Anti-spoofing, prevention against synthetic or fake identities through "3D live" detection
Data Privacy & Protection
-
Encryption of irreversible biometric mathematical model template
-
Secure storage such as secure mobile application with data vault, Desfire Ev3 badge, encrypted QR code
-
CNIL 2019/01 - type 1 and GDPR strict compliance
-
No biometric database, no personal data
Auditability & Traceability
-
Secure access to payment services
-
Logging of enrolment and authentication events
-
Tamper-resistant audit trails
Fraud & Risk Management
-
Real-time detection of impersonation, spoofing and deep-fake attempts
-
Transaction monitoring with strong authentication of parties

Federal Act on Data Protection - Switzerland 09/2023
Governance & Accountability
-
Under the responsibility of the company or service provider
-
Premier solutions maintain record of processing activities (ROPA)
Lawfulness, Fairness and Proportionality
-
Lawful basis for processing: consent, contract or legal obligation
-
Legal justification driven by strong user or badge holder authentication in high-security environment
Data Minimisation
-
Collection limited to strictly necessary data: biometric mathematical template (not raw image storage)
-
Identity attributes required for service, not by biometric solution
-
No central biometric database: user-controlled template model
-
No storage of raw biometric images
-
Use irreversible biometric template
Data Integrity
-
Encryption of data at rest and in transit
-
Use irreversible biometric templates
-
Access control to systems (role-based access control)
-
Authentication logs & audit trails
Data Protection Impact Assessment (DPIA)
-
Risk assessment of biometric authentication
-
Assessment of fraud risks and mitigations, including spoofing attacks
-
Evaluation of proportionality and necessity
-
Documentation of safeguards
-
Pre-filled DPIA document available for Data Protection Officer (DPO) before deployment
Security of Processing (article 8)
-
Encrypted communications and biometric templates
-
Total anonymisation: no direct link between personal data (managed by service) and biometric template
-
Secure onboarding server architecture (on-premise)
-
Physical security for kiosks: memory processing only, no local storage, blocked USB/Bluetooth ports, encrypted communications, tampered housing
-
Secure software updates: automated release package integrity check, secure remote connection
-
Encrypted biometric QR codes, NFC badges or digital badges
-
Logging & monitoring
Data Retention & Deletion Policy
-
Defined retention policies directly linked to Access Control, HR or Registration system
-
Automatic deletion after End of employment, Event closure or Expiry of access rights
-
Self-deletion at any time for QR-codes or mobile application
-
Configurable retention periods
-
Secure deletion mechanisms
Data Subject Rights
-
Right of access, to rectification, to restriction of processing and to object through service
-
Right to erasure through service or by instant deletion (mobile application deletion, QR destruction...)
-
Audit logging of requests
Automated Decision Making
-
Propose human review as decision backup (if applicable)
-
Decision logic agnostic to skin, lighting conditions, gender or age with FRR as low as 0.0005%
-
Audit logging of requests
Data Breach Management, Governance & Accountability
-
Under the responsibility of the company or service provider
