shield-flash-fill
NEW RELEASE
User Provisioning and SSO with Microsoft Azure AD
Read more
chat-2-fill
Start trial
LoginStart your trial
globe

Insurance documents refer to the documents that provide evidence of insurance coverage. Some examples of insurance documents include:

Insurance policyA document that outlines the terms and conditions of the insurance coverage, including the types of risks covered, the limits of coverage, and any exclusions or limitations.
Certificate of insuranceA document that summarizes the key terms of an insurance policy and provides proof of coverage.
EndorsementA document that modifies or adds to the coverage provided by an insurance policy.
Claim formA document that is used to report a loss or damage covered by an insurance policy and request payment of a claim.
Proof of lossDocumentation that supports a claim, such as a police report or repair estimates.
ReceiptsDocumentation of expenses incurred as a result of a loss, such as medical bills or repair costs.

Insurance documents are an important resource for individuals and businesses, as they provide evidence of insurance coverage and outline the terms of the coverage. It is important for individuals and businesses to review and understand their insurance documents in order to fully understand their rights and obligations under the policy.

An energy certificate is a document that certifies the energy performance of a building or other facility. Some attributes that may be included in an energy certificate are:

Building typeThe type of building or facility being certified, such as a single-family home, a multi-family apartment building, or a commercial office building.
AddressThe location of the building or facility being certified.
Date of issueThe date on which the energy certificate was issued.
Date of validityThe period of time for which the energy certificate is valid.
Energy performanceA rating of the energy efficiency of the building or facility, typically expressed on a scale from A (most efficient) to G (least efficient).
Energy consumptionThe amount of energy consumed by the building or facility, typically measured in kilowatt-hours (kWh) or British thermal units (BTUs).
CO2 emissionsThe amount of carbon dioxide emissions resulting from the energy consumption of the building or facility.
RecommendationsSuggestions for improving the energy performance of the building or facility.

Energy certificates are often required by law in order to sell or rent a building, and they provide information about the energy efficiency of the building to potential buyers or tenants. They can also be used to qualify for incentives or subsidies related to energy efficiency.

A valuation is an assessment of the value of an asset or a business. A valuation document is a document that outlines the methodology, assumptions, and conclusions of a valuation. Some examples of attributes that may be included in a valuation document are:

PurposeThe reason for the valuation and the goals it is intended to achieve.
ScopeThe boundaries and constraints of the valuation, including the assets or businesses being valued and the time period being considered.
Valuation dateThe date on which the valuation is being performed.
Valuation standardThe principles and guidelines being used to perform the valuation, such as the International Valuation Standards or the Generally Accepted Accounting Principles.
Valuation methodThe specific techniques and approaches being used to determine the value of the assets or businesses.
AssumptionsThe key assumptions and estimates being made as part of the valuation.
Data sourcesThe sources of information being used to support the valuation.
ConclusionsThe results of the valuation, including the value of the assets or businesses being considered.
LimitationsAny limitations or uncertainties that may affect the accuracy or reliability of the valuation.

Valuation documents are an important resource for individuals and organizations that need to understand the value of an asset or business. They can be used for a variety of purposes, such as setting the price for a sale or purchase, evaluating investment opportunities, or determining the value of collateral for a loan.

Having a reliable platform like Hypervault for storing valuations will allow you to have peace of mind that your financial data won’t fall into the hands of unauthorized people. The cost of that safety won’t weigh up to the price of thefts. 

In any business with multiple employees, the question ‘can I use the company’s credit card to make a payment’ is posed plenty of times. There is even a possibility that your business even has more than one card. 

Hypervault lets you store the credit card information in a custom template, so you can easily share or withdraw access with an employee.

Cardholder NameThe name of the person or entity that owns the credit card.
Card NumberThe unique numerical identifier assigned to the credit card.
Expiration DateThe month and year that the credit card expires.
Security CodeThe 3 or 4 digit code on the back of the credit card.
Pin CodeThe 4 digit pin code to approve transactions.
Billing AddressThe address where the credit card statement is mailed.
Zip CodeThe postal code associated with the billing address.
CountryThe country associated with the billing address.
Card TypeThe brand or type of credit card (e.g. Visa, Mastercard).
IssuerThe financial institution that issued the credit card.
Credit LimitThe maximum amount that can be charged to the credit card.
Transaction HistoryA record of past transactions made with the credit card.
NotesAny additional notes or comments about the credit card.
TagsKeywords or labels used to categorize or organize the credit card information.

Keep track of your employees' diplomas, certifications, attestations, and courses. Safely store and share the information with the beneficial owner in a secured encrypted environment.

Personal informationName, date of birth, place of birth, photograph, and any other identifying information
Educational informationInstitution name, degree or diploma type, major or field of study, grades or academic performance, and graduation date
Confidential informationAny other confidential information related to the individual's education or academic record

Subsidies, grants, and funding are financial assistance provided by governments, foundations, and other organizations to support specific projects or initiatives. Some examples of attributes that may be included in subsidies, grants, and funding are:

NameThe name of the subsidy, grant, or funding program.
PurposeThe reason for the subsidy, grant, or funding and the goals it is intended to achieve.
EligibilityThe criteria that must be met in order to be eligible for the subsidy, grant, or funding.
AmountThe amount of money being provided through the subsidy, grant, or funding.
DurationThe length of time over which the subsidy, grant, or funding will be provided.
Reporting requirementsThe obligations of the recipient to report on the use and impact of the subsidy, grant, or funding.
ReimbursementThe process for receiving payment for expenses incurred as part of the project or initiative.
RenewalThe conditions under which the subsidy, grant, or funding may be renewed.
TerminationThe conditions under which the subsidy, grant, or funding may be terminated.

Subsidies, grants, and funding can be an important source of financial support for projects and initiatives, and they often come with specific requirements and obligations. It is important for organizations to carefully review and understand the terms of any subsidies, grants, or funding they receive in order to ensure compliance and maximize the benefits of the assistance.

Security procedures are the processes and protocols that are put in place to protect against threats and ensure the security of an organization or system. Some examples of attributes that may be included in security procedures are:

ScopeThe individuals or groups who are subject to the security procedure.
ResponsibilitiesThe roles and responsibilities of the individuals or groups involved in the security procedure.
ProceduresThe specific actions or tasks that must be performed as part of the security procedure.
Access controlsMeasures to restrict access to authorized individuals or groups.
AuthenticationProcedures for verifying the identity of individuals or devices.
EncryptionTechniques for protecting data from unauthorized access by encoding it.
Backup and recoveryProcedures for protecting and recovering data in the event of a disaster or data loss.
Monitoring and reportingTechniques for monitoring the system for security breaches and reporting any incidents.

Security procedures are an important consideration for organizations, as they help to protect against threats and ensure the confidentiality, integrity, and availability of the organization's systems and data. It is important for organizations to regularly review and update their security procedures in order to stay current with best practices and evolving threats.

Hypervault also encrypts your security procedures, just to make sure the data can only be seen by the appropriate user.

Keep your security procedures safe.

Try out Hypervault with a 14-day free trial. Store all your procedures in an encrypted environment. Share it only with the appropriate people.

Send us some feedback

Article feedback
Does this article answers your question?

Vault for passwords

Hypervault has a built-in password manager, made to collaborate between your teams... or your clients. Use the folders in your vault to bring structure to your passwords.

Automatically load credentials in login forms, so you don't have to remember your passwords. You can also generate strong passwords here or in your Chrome or Edge browser with our browser extension.

Password template fields

The password template consists of the following fields:

LabelA descriptive name for the credential
URLThe URL associated with the credential
UsernameThe primary username for the credential
Secondary UsernameAn optional secondary username for the credential
PasswordThe password associated with the credential
File UploadAn optional file upload, such as a private key or certificate, associated with the credential
NotesAny additional notes or details related to the credential
TagsOptional tags for categorizing and organizing credentials

Each template has the ability to add custom sections and custom fields. You can extend the password template to your own needs with these attributes, for example:

EmailThe email address associated with the credential
Account NumberThe account number associated with the credential
Account TypeThe type of account associated with the credential
Account StatusThe current status of the account, such as active or closed
Security QuestionAn optional security question associated with the credential
Security AnswerThe answer to the security question, if applicable
Phone NumberThe phone number associated with the credential

Manage all information from your devices in one place.

Add warranty documents, manuals, work instructions, … and share the information with your co-workers or clients.

LabelA unique identifier for the device.
TypeThe general category of the device, such as a laptop or smartphone.
ModelThe specific model of the device, such as a MacBook Pro or iPhone 12.
UserThe person who is assigned to use the device.
Serial numberA unique identifier assigned to the device by the manufacturer.
Date of receptionThe date on which the device was received.
PasswordThe password or passcode required to access the device.
Server/IP addressThe IP address or domain name of the server that the device connects to.
OSThe operating system that is installed on the device, such as Windows or iOS.
Mac addressA unique identifier assigned to the device's network interface controller.
File uploadA place to attach any relevant files, such as a manual or receipt.
NotesAny additional information or notes about the device.
TagsLabels or keywords that can be used to categorize or search for the device.

Each template has the ability to add custom sections and custom fields.

Being careful with network settings is a must. You don’t want to put everything at stake and let an unauthorized person accesses your network from outside.

LabelA unique identifier for the network information entry.
Network NameThe name of the network.
Wireless SecurityThe type of wireless security used by the network. For example, WEP, WPA, WPA2, or no security.
Network PasswordThe password required to connect to the network.
Server/IP AddressThe IP address or server name associated with the network.
FrequencyThe frequency of the network, such as 2.4 GHz or 5 GHz.
File UploadAny files related to the network, such as configuration files or network maps.
NotesAdditional notes or comments about the network.
TagsKeywords or labels used to categorize or search for the network information entry.