Insurance documents refer to the documents that provide evidence of insurance coverage. Some examples of insurance documents include:
|Insurance policy||A document that outlines the terms and conditions of the insurance coverage, including the types of risks covered, the limits of coverage, and any exclusions or limitations.|
|Certificate of insurance||A document that summarizes the key terms of an insurance policy and provides proof of coverage.|
|Endorsement||A document that modifies or adds to the coverage provided by an insurance policy.|
|Claim form||A document that is used to report a loss or damage covered by an insurance policy and request payment of a claim.|
|Proof of loss||Documentation that supports a claim, such as a police report or repair estimates.|
|Receipts||Documentation of expenses incurred as a result of a loss, such as medical bills or repair costs.|
Insurance documents are an important resource for individuals and businesses, as they provide evidence of insurance coverage and outline the terms of the coverage. It is important for individuals and businesses to review and understand their insurance documents in order to fully understand their rights and obligations under the policy.
An energy certificate is a document that certifies the energy performance of a building or other facility. Some attributes that may be included in an energy certificate are:
|Building type||The type of building or facility being certified, such as a single-family home, a multi-family apartment building, or a commercial office building.|
|Address||The location of the building or facility being certified.|
|Date of issue||The date on which the energy certificate was issued.|
|Date of validity||The period of time for which the energy certificate is valid.|
|Energy performance||A rating of the energy efficiency of the building or facility, typically expressed on a scale from A (most efficient) to G (least efficient).|
|Energy consumption||The amount of energy consumed by the building or facility, typically measured in kilowatt-hours (kWh) or British thermal units (BTUs).|
|CO2 emissions||The amount of carbon dioxide emissions resulting from the energy consumption of the building or facility.|
|Recommendations||Suggestions for improving the energy performance of the building or facility.|
Energy certificates are often required by law in order to sell or rent a building, and they provide information about the energy efficiency of the building to potential buyers or tenants. They can also be used to qualify for incentives or subsidies related to energy efficiency.
A valuation is an assessment of the value of an asset or a business. A valuation document is a document that outlines the methodology, assumptions, and conclusions of a valuation. Some examples of attributes that may be included in a valuation document are:
|Purpose||The reason for the valuation and the goals it is intended to achieve.|
|Scope||The boundaries and constraints of the valuation, including the assets or businesses being valued and the time period being considered.|
|Valuation date||The date on which the valuation is being performed.|
|Valuation standard||The principles and guidelines being used to perform the valuation, such as the International Valuation Standards or the Generally Accepted Accounting Principles.|
|Valuation method||The specific techniques and approaches being used to determine the value of the assets or businesses.|
|Assumptions||The key assumptions and estimates being made as part of the valuation.|
|Data sources||The sources of information being used to support the valuation.|
|Conclusions||The results of the valuation, including the value of the assets or businesses being considered.|
|Limitations||Any limitations or uncertainties that may affect the accuracy or reliability of the valuation.|
Valuation documents are an important resource for individuals and organizations that need to understand the value of an asset or business. They can be used for a variety of purposes, such as setting the price for a sale or purchase, evaluating investment opportunities, or determining the value of collateral for a loan.
Having a reliable platform like Hypervault for storing valuations will allow you to have peace of mind that your financial data won’t fall into the hands of unauthorized people. The cost of that safety won’t weigh up to the price of thefts.
In any business with multiple employees, the question ‘can I use the company’s credit card to make a payment’ is posed plenty of times. There is even a possibility that your business even has more than one card.
Hypervault lets you store the credit card information in a custom template, so you can easily share or withdraw access with an employee.
|Cardholder Name||The name of the person or entity that owns the credit card.|
|Card Number||The unique numerical identifier assigned to the credit card.|
|Expiration Date||The month and year that the credit card expires.|
|Security Code||The 3 or 4 digit code on the back of the credit card.|
|Pin Code||The 4 digit pin code to approve transactions.|
|Billing Address||The address where the credit card statement is mailed.|
|Zip Code||The postal code associated with the billing address.|
|Country||The country associated with the billing address.|
|Card Type||The brand or type of credit card (e.g. Visa, Mastercard).|
|Issuer||The financial institution that issued the credit card.|
|Credit Limit||The maximum amount that can be charged to the credit card.|
|Transaction History||A record of past transactions made with the credit card.|
|Notes||Any additional notes or comments about the credit card.|
|Tags||Keywords or labels used to categorize or organize the credit card information.|
Keep track of your employees' diplomas, certifications, attestations, and courses. Safely store and share the information with the beneficial owner in a secured encrypted environment.
|Personal information||Name, date of birth, place of birth, photograph, and any other identifying information|
|Educational information||Institution name, degree or diploma type, major or field of study, grades or academic performance, and graduation date|
|Confidential information||Any other confidential information related to the individual's education or academic record|
Subsidies, grants, and funding are financial assistance provided by governments, foundations, and other organizations to support specific projects or initiatives. Some examples of attributes that may be included in subsidies, grants, and funding are:
|Name||The name of the subsidy, grant, or funding program.|
|Purpose||The reason for the subsidy, grant, or funding and the goals it is intended to achieve.|
|Eligibility||The criteria that must be met in order to be eligible for the subsidy, grant, or funding.|
|Amount||The amount of money being provided through the subsidy, grant, or funding.|
|Duration||The length of time over which the subsidy, grant, or funding will be provided.|
|Reporting requirements||The obligations of the recipient to report on the use and impact of the subsidy, grant, or funding.|
|Reimbursement||The process for receiving payment for expenses incurred as part of the project or initiative.|
|Renewal||The conditions under which the subsidy, grant, or funding may be renewed.|
|Termination||The conditions under which the subsidy, grant, or funding may be terminated.|
Subsidies, grants, and funding can be an important source of financial support for projects and initiatives, and they often come with specific requirements and obligations. It is important for organizations to carefully review and understand the terms of any subsidies, grants, or funding they receive in order to ensure compliance and maximize the benefits of the assistance.
Security procedures are the processes and protocols that are put in place to protect against threats and ensure the security of an organization or system. Some examples of attributes that may be included in security procedures are:
|Scope||The individuals or groups who are subject to the security procedure.|
|Responsibilities||The roles and responsibilities of the individuals or groups involved in the security procedure.|
|Procedures||The specific actions or tasks that must be performed as part of the security procedure.|
|Access controls||Measures to restrict access to authorized individuals or groups.|
|Authentication||Procedures for verifying the identity of individuals or devices.|
|Encryption||Techniques for protecting data from unauthorized access by encoding it.|
|Backup and recovery||Procedures for protecting and recovering data in the event of a disaster or data loss.|
|Monitoring and reporting||Techniques for monitoring the system for security breaches and reporting any incidents.|
Security procedures are an important consideration for organizations, as they help to protect against threats and ensure the confidentiality, integrity, and availability of the organization's systems and data. It is important for organizations to regularly review and update their security procedures in order to stay current with best practices and evolving threats.
Hypervault also encrypts your security procedures, just to make sure the data can only be seen by the appropriate user.
Non-disclosure agreements (NDAs) are legal contracts used to protect sensitive information shared between parties, such as trade secrets, proprietary information, and confidential business strategies. NDAs are often used in business partnerships, employment agreements, and other situations where the disclosure of confidential information could be harmful to one or more parties. Due to the sensitive nature of the information contained in NDAs, it is important to store them securely in a vault to prevent unauthorized access, theft, or loss. Hypervault encrypts your NDAs for maximum protection.
|Parties||The names and contact information of the parties involved in the NDA agreement.|
|Definition of Confidential Information||A clear definition of the types of information that are considered confidential and protected under the NDA.|
|Obligations of the Recipient||The specific obligations and restrictions placed on the recipient of the confidential information, including the prohibition against disclosure to third parties.|
|Duration||The length of time during which the NDA remains in effect and the confidential information must be kept confidential.|
|Remedies||The legal remedies available to the disclosing party in the event of a breach of the NDA, such as injunctive relief or monetary damages.|
|Governing Law and Jurisdiction||The laws and jurisdiction that govern the NDA and any disputes that may arise under it.|
|Signatures and Dates||The signatures of all parties involved in the NDA and the dates on which the NDA was executed.|
Hypervault has a built-in password manager, made to collaborate between your teams... or your clients. Use the folders in your vault to bring structure to your passwords.
The password template consists of the following fields:
|Label||A descriptive name for the credential|
|URL||The URL associated with the credential|
|Username||The primary username for the credential|
|Secondary Username||An optional secondary username for the credential|
|Password||The password associated with the credential|
|File Upload||An optional file upload, such as a private key or certificate, associated with the credential|
|Notes||Any additional notes or details related to the credential|
|Tags||Optional tags for categorizing and organizing credentials|
Each template has the ability to add custom sections and custom fields. You can extend the password template to your own needs with these attributes, for example:
|The email address associated with the credential|
|Account Number||The account number associated with the credential|
|Account Type||The type of account associated with the credential|
|Account Status||The current status of the account, such as active or closed|
|Security Question||An optional security question associated with the credential|
|Security Answer||The answer to the security question, if applicable|
|Phone Number||The phone number associated with the credential|
Manage all information from your devices in one place.
Add warranty documents, manuals, work instructions, … and share the information with your co-workers or clients.
|Label||A unique identifier for the device.|
|Type||The general category of the device, such as a laptop or smartphone.|
|Model||The specific model of the device, such as a MacBook Pro or iPhone 12.|
|User||The person who is assigned to use the device.|
|Serial number||A unique identifier assigned to the device by the manufacturer.|
|Date of reception||The date on which the device was received.|
|Password||The password or passcode required to access the device.|
|Server/IP address||The IP address or domain name of the server that the device connects to.|
|OS||The operating system that is installed on the device, such as Windows or iOS.|
|Mac address||A unique identifier assigned to the device's network interface controller.|
|File upload||A place to attach any relevant files, such as a manual or receipt.|
|Notes||Any additional information or notes about the device.|
|Tags||Labels or keywords that can be used to categorize or search for the device.|