manage Google Chat and classic Hangouts chat settings from one place in the Admin console

What’s changing

You’ll soon be able to manage all Google Chat and classic Hangouts chat-related settings from a single page in the Admin console. This follows the update we made last year to combine several settings for Google Chat and classic Hangouts.

On July 6, 2020, we’ll start mapping your existing service status (e.g. Google Chat on, classic Hangouts on, Chat preferred off) to the new setting that matches your current user experience. You don’t need to take any action.

Most end users will not see any change. In domains where Google Chat is turned ON but classic Hangouts and Chat preferred are turned OFF, however, users will begin seeing Chat in Gmail over the next few weeks.

Visit the Help Center to learn more about the different settings options for chat.

New chat service settings in the Admin console


Who’s impacted

Admins and end users

Why it matters

With all your chat settings in one place, including on / off controls for different chat services, you can now view your organization’s chat configuration holistically and more easily tailor it to your needs.

Additional details

We recommend the “Chat preferred” setting for admins who would like to transition their entire organization from classic Hangouts to Google Chat. With this launch, Chat preferred is now configurable at the organizational unit (OU) level.

While these changes are rolling out, admins may temporarily see the “Chat clients” tab as well as the new service page. They should only change the new service status page to make changes for their domain.

Please note that while the experience for most end users will not change with these new settings, in the coming weeks we’ll launch Chat in Gmail to domains that have the “Chat only” setting selected. This means that any user in a domain where Chat is turned ON and Classic Hangouts and Chat Preferred are turned OFF will start seeing Chat in Gmail. This feature was previously only available to domains with the Chat preferred setting selected. End users will have the option to turn Chat in Gmail off at the individual level.

Getting started

Admins: No action is required, as we’ll automatically align your existing settings to the new setting that matches your current user experience. Visit the Help Center to learn more about choosing a chat service for your organization.

New combined service on / off setting row in the Admin console

End users: Visit the Help Center to learn more about how to turn Chat in Gmail on or off for your account.

Rollout pace

New chat settings and page

Chat in Gmail to “Chat only” domains

Availability

  • Available to all G Suite customers

Resources

[ad_2]

Net Universe offers all Google devices with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/google.
You can visit our Shop Online

 

Ideal steps to the ideal deal « Zoho Blog

This is a guest post by iQuoteXpress (IQX).

Guided selling may sound like a buzzword, but we proactively assure you—with every paradigm shift in our heart—that it’s not.

Surprisingly, guided selling is exactly what it sounds like: tools, technology, or even just techniques that guide a buyer or seller to the perfect purchase or sale.

B2C guided selling  

In a nutshell, B2C guided selling is The E-Commerce Experience: the software guides the consumer towards products that fit any data the seller may have on them.

Then, the entire purchase is guided to both ensure the customer’s satisfaction and optimize the seller’s revenue. For example, guiding a shopper to an ideal upsell or cross-sell is a win-win: maybe they didn’t know those flowers would look majestic in a porcelain vase (win for them!) that concurrently drives average order value up by 20% (win for the seller!).

Most e-commerce websites are, in fact, guided selling machines (think of every step Amazon shows you on your path to the cart). We simply take guided selling for granted in the online B2C experience. It’s in B2B where guided selling “jumps ship” and presents the right steps for the seller instead of the buyer.

B2B guided selling (where CRM and CPQ flourish)  

The steps to automate for B2C guided selling simply don’t apply to the B2B world. B2B customers are typically looking for a long-term strategic fit (via a purchase of business technology) rather than to satisfy a short-term need. Sellers must contend with longer sales cycles, more specific requirements, requests for proposals (RFPs), RFP replies, sales proposals, meetings, follow-ups, and so on. It’s simply not a fit for e-commerce styled guided selling.

However, there is a fit for guided selling in the B2B space, and you are in the right place for it. It’s using the lead capturing and relationship building tools of your Zoho CRM system with the deal-closing tools of a configure, price, quote solution (CPQ), such as iQuoteXpress.

In this definition of guided selling, it’s not the purchaser who is being guided, but the seller. All a B2B sales rep needs to nurture a lead into an opportunity is presented in CRM. A rep is guided by tasks and forecasts, and presented with next steps at every turn. These components of the guided selling process in B2B are taken to even greater heights when you add lead nurturing and targeting tools.

Once the rep reaches a point where the prospect is ready for a sales quote, the CPQ system guides them from “RFP reply” to “closed deal.”

Built-in to the CPQ system are professionally designed sales proposals that a rep only needs to populate with products and pricing. And how do they know which products and pricing to use? The system guides them to the right ones with a dynamic product and pricing configuration engine that only presents optimal offers.

Following the guided creation and delivery of the perfect proposal, the CPQ system then guides the rep through the next steps. This is a “nurturing process” not unlike moving a prospect from Lead to Opportunity, except in this case you’re moving a quote from “sent” to “signed”.

To sum up, in B2B, guided selling is as much a platform as a process. Yes, you could simply write down on an index card the steps you want a rep to take to close deals. Or you could build a system that has every guided selling step baked in.

 Try iQuoteXpress for Zoho CRM

Work smarter by adding new capabilities to Zoho CRM with business solutions from Zoho Marketplace.

Net Universe offers all Zoho subscritpions and consultant services with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/zoho.

Glupteba malware hides in plain sight – Sophos News

This morning, SophosLabs is publishing a report on a malware family whose infection numbers have been steadily growing since the beginning of the year. This malware, with its hard-to-pronounce name, has been getting regular updates and feature enhancements that seem to be focused on its ability to conceal itself from detection on infected computers.

In our report, we’ve taken a deep dive into what makes the Glupteba malware distinctive. The core malware is, in essence, a dropper with extensive backdoor functionality, but it is a dropper that goes to great efforts to keep itself, and its various components, hidden from view by the human operator of an infected computer, or the security software charged with its protection.

To accomplish these tasks, the creators of Glupteba have opted to take a modular approach to their malware, which can download and execute payloads intended to extend the functionality of the bot. Many of these payloads are exploit scripts and binaries that originate in open source tool repositories, like Github, and have been lifted whole-cloth from their archives to be leveraged against the victim’s computer.

One of the ways Glupteba uses these exploits is for privilege escalation, primarily so it can install a kernel driver the bot uses as a rootkit, and make other changes that weaken the security posture of an infected host. The rootkit renders filesystem behavior invisible to the computer’s end user, and also protects any other file the malware decides to store in its application directory. A watcher process then monitors the rootkit and other components for any sign of failure or a crash, and can reinitialize the rootkit driver or restart a buggy component.

That watcher process also gets used to deliver a surprising amount of bug reporting telemetry back to Glupteba’s creator(s). After all, an application crash is a very noticeable event, and if the goal of the malware is to maintain its stealth, then avoiding crashes is of paramount importance.

The malware also uses the Windows Registry to its advantage, storing many of its configuration options under unobtrusive Registry key names. The names of some of these configuration values also provide a clue about Glupteba’s overall goals. For instance, the bot stores the name(s) of its command-and-control server(s) under a key labeled “CDN” – a term of art in the hosting industry that refers to a Content Delivery Network, a type of business that caches frequently-requested data so it can be retrieved more rapidly by a large population.

We can infer from the bot’s propensity to self-protection and stealth, and this CDN label, that Glupteba’s creators intend this malware to be part of a service offering to other malware publishers, giving them a pay-per-install business model for malware delivery.

Where does Glupteba come from?

We found Glupteba in a large number of downloads that claimed to be installers of pirated, commercial software, but these are not likely to be the only sources of this malware.

The Glupteba installers we found all share certain distinctive characteristics. Their filenames, for example contained one of two unique strings of text, either -rtmd- or -fmld- in the middle of the filename. These strings turned out to be indicators the malware used to set certain parameters when first launched on the victim’s computer.

These installers were technically droppers, which dropped then executed other components of the infection into specific directories on the infected system. The malware then protected these directories using the rootkit driver, which it installs to the DRIVERS folder under %system% on Windows computers. These drivers, under Windows 10, are usually named winmon.sys, winmonfs.sys, and winmonprocessmonitor.sys, but the dropper contains other versions that run on older Windows operating systems as well.

The dropper component also sets up Registry keys where it stores configuration data. These are located under the Registry path HKEY_USERS<SID>SoftwareMicrosoftTestApp (in which SID represents the user account SID that executed the malware). The malware then profiles the infected system, produces a small report about the configuration of the system, and connects to a command-and-control server to upload the data and “register” the bot within the Glupteba botnet.

The bot also spends a significant amount of effort attempting to shut down various protective measures built into Windows, and also attempts to terminate the processes of a long list of security or analysis tools that might otherwise alert a user to the infection, or prevent it from taking hold. As to how much success the bot achieves killing its adversarial processes, we don’t have all the data to know.

Who watches the watchers?

Once the bot is set up and configured, it initializes a process we call the “watcher” that, basically, continuously polls each of the other installed components to ensure they’re still running. If the watcher process (windefender.exe) finds that a driver or component has crashed, it will attempt to reinitialize/execute the payload.

Shellcode embedded in the Glupteba dropper that the bot injects into other processes

There are watcher components that monitor the core dropper and its own service entry, the state of Windows Defender (which the bot attempts to halt), a network proxy component the bot uses to communicate to the outside world, and the XMRig cryptocurrency miners it (currently) delivers as a payload.

The watcher components keep an eye on the dropper for another reason: The dropper’s secondary function is to use the initial infected machine as a foothold from which it will scan the internal network wherever it is installed in search of vulnerable machines to which it can launch an EternalBlue exploit against, spreading the dropper laterally across the network to any other machines it can find.

The Glupteba bot will try to use two different implementations of EternalBlue to spread itself around the network

The dropper actually contains both the “original” leaked implementation of EternalBlue as released by the Shadow Brokers hacker group, as well as an alternate implementation it will attempt to use if the first one fails.

Once all the setup, spreading, and initial communication with the C2 is complete, the bot relaxes into a mode where it continuously polls the C2 server for instructions, and periodically sends telemetry about the functioning state of the Glupteba dropper and its components. The bot also begins scanning the public internet for routers made by MikroTik, and attempts to exploit any it finds using scripts embedded into the dropper.

If any of the watcher components detect a crash, they retrieve the crash dump and, periodically, upload those dumps as well as a count of the number of crashes (labeled in the submission with the Russian text Количестводампов, which translates to “number of dumps”).

Updating the C2 from the blockchain

One of Glupteba’s more intriguing features is the way that it retrieves an updated list of the servers where it downloads payloads (which it refers to as a “CDN,” or content delivery network). It does this by querying one or more bitcoin transaction IDs hardcoded into the binary.

The JSON response to Glupteba’s blockchain queries includes the encoded string (“hex”) that updates the C2 server addresses.

Inside the specific wallets it reads, the transaction data contains a long string of letters and numbers. The servers it queries return a JSON-formatted file that contains a field labeled OP_RETURN. The bot parses and decrypts the contents of this OP_RETURN field, which translates into one or more domain names, which the bot then adds to the Registry keys where it stores its configuration data.

For a malware that delivers a cryptocurrency miner, it’s an interesting choice. After all, the bot’s payload is already communicating with bitcoin wallets and the blockchain, so perhaps the bot’s creators thought they would be able to sneak one additional connection past that nobody would notice.

All the details about how the bots parse and decode the domain names out of these blockchain transaction logs are in the report.

Preventing or detecting Glupteba

The Glupteba installers we’ve seen appear to be pirated software installers. End users may prevent infection by obtaining properly licensed software from official sources, rather than pirated copies of unknown provenance.

Glupteba and its components, including the rootkit driver, are detected by Sophos endpoint products. The EDR team has build a list of queries that users of Sophos EDR 3.0 can use to perform proactive threat hunts against machines on their network. Those queries can be found on the Sophos Community forum.

Indicators of compromise for the samples associated with this analysis can be found on the SophosLabs Github.

Acknowledgments

SophosLabs acknowledges the work of Luca Nagy, assisted by Gábor Szappanos, Ferenc László Nagy, Vikas Singh, and Ronny Tyink, to produce this research.

Net Universe offers all Sophos Devices and subscritpions also consultant services with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/sophos.

Spanish grammar suggestions now available in Google Docs and Gmail

Quick launch summary 

We’re expanding our advanced assistive writing features in Google Docs and Gmail to Spanish. Last year, we introduced grammar suggestions powered by neural-networks for the English language. Now, we’re using the same technology to provide grammar suggestions as you type in Spanish.

Language will be detected automatically, and even if you switch between writing in Spanish and English, we will provide the appropriate grammar suggestions. These capabilities can help you write faster, more accurately, and with more confidence.

Later this year, we’re also planning to make spelling autocorrect and Smart Compose available to Spanish language users. Keep an eye on the G Suite Updates blog to know when those features become available. Learn more about the expansion of our Spanish language assistive writing features on our Cloud Blog.

Getting started 

Rollout pace 

Availability 

  • Available to G Suite Basic, G Suite Business, G Suite Essentials, G Suite Enterprise Essentials, and G Suite Enterprise customers. 
  • Not yet available to G Suite for Education, G Suite Enterprise for Education, and G Suite for Nonprofits customers, as well as users with personal Google accounts. 

Resources 

[ad_2]

Net Universe offers all Google devices with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/google.
You can visit our Shop Online

 

Update Calendar Interop authentication with OAuth 2.0 to continue Microsoft 365 interop

Quick launch summary 

We’re enabling OAuth 2.0 authentication support for Google Calendar Interop with Microsoft Exchange Online (Microsoft 365). Calendar Interop is a feature that lets you sync events and availability between Google Calendar and Exchange Online.

Currently, interoperability is available via Basic Authentication. Microsoft plans to stop supporting the use of Basic Authentication to access Exchange Online on October 13, 2020. This only impacts Microsoft Exchange Online (Microsoft 365), not on-premise Exchange implementations. If you use Exchange Online, you should update your authentication to use OAuth 2.0 by October 13 to ensure interoperability is not disrupted.

Getting started 

  • Admins: If you’re currently using Basic Authentication, you must set up OAuth 2.0. You will not be transitioned automatically. You can set it up at Admin console > Apps > G Suite > Settings for Calendar > Calendar Interop Management. Use our Help Center to learn more about how to set up Calendar interop. 
  • End users: No change in end user functionality. 

Calendar OAuth 2.0 setup in the Admin console 

Rollout pace 

Availability 

  • Available to all G Suite customers 

Resources 

[ad_2]

Net Universe offers all Google devices with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/google.
You can visit our Shop Online

 

3 Factors to Consider on the Path to Digital Transformation





3 Factors to Consider on the Path to Digital Transformation | Yubico




3 Factors to Consider on the Path to Digital Transformation | Yubico


























Yubico Privacy and Cookies Policy



Scroll to top

Net Universe offers all Yubikeys with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/yubikey.
You can visit our Shop Online

 

How to upgrade to XG Firewall v18 – Sophos News

XG Firewall v18 got off to a tremendous start with thousands of customers upgrading on launch day to take advantage of the new Xstream Architecture and other great enhancements.

Today, the product team is pleased to announce a new release of XG Firewall v18, maintenance release 1 (MR1), that is now available for all XG Firewall devices.

This latest release includes all security hotfixes as well as over fifty performance, reliability and stability enhancements and support for our new SD-RED devices.

Upgrading to v18 MR1 is seamless from v17.5 MR6 and above and from any other v18 release version. You will soon start seeing the new release appear in your console with a firmware upgrade notification, but you don’t need to wait, you can grab the new release anytime from the MySophos Licensing Portal: Upgrade Today!

What’s new and in it for you

Watch this brief 5-minute overview of what’s new in XG Firewall v18:

Here are the top new enhancements:

  • Xstream Architecture: A new streaming DPI engine, high-performance TLS 1.3 inspection, AI-powered threat intelligence with in-depth reporting, and FastPath application acceleration.
  • Sophos Central: Group firewall management and cloud reporting make management easier and provide deeper insights into network activity with flexible report customization tools and a new license for extending your firewall data storage in the cloud.
  • Synchronized SD-WAN: brings the power of Synchronized Security to reliably and accurately route application and user-based traffic over preferred WAN links.
  • Plug-and-Play High Availability (HA): makes it easy to enable business continuity and adds peace-of-mind – simply connect two XG Series appliances together and you’ll be up and running in no time and now Sophos Central also supports HA pairs.
  • Real-time flow monitoring: Get at-a-glance insights into active bandwidth consuming hosts, applications, and users – a fan favorite feature from our UTM 9 platform.
  • Expanded notifications and alerts: You will never miss an important network security event whether it’s related to a threat, service, or important performance metric.
  • New SD-RED Model Support: With MR1, take advantage of our all-new SD-RED 20 and SD-RED 60 models that provide added performance, modular connectivity, and redundant power for the ultimate solution to remote branch or device connectivity.

Upgrading XG Firewall firmware is easy. Watch this video for a refresher.

Start enjoying the benefits of added visibility, protection and performance with XG Firewall v18 MR1 today!

Migrating from SG UTM

Sophos SG UTM customers interested in taking advantage of all the great new enhancements in XG Firewall can do so for free – anytime. A valid license can be transferred over at no extra charge and Sophos Professional Services is happy to help with migration if desired.  Existing SG Series hardware is fully supported (except for the SG 105 which lacks the minimum required 4 GB of RAM). However, you may want to take this opportunity to consider refreshing your hardware to take full advantage of all the new capabilities such as TLS inspection. Check out this recent article for full details.

Migrating from Cyberoam

Migrating from Cyberoam to XG Firewall v18 is strongly encouraged to get all the added usability, security and performance benefits of XG Firewall. Contact your preferred Sophos partner to inquire about upgrading to the latest high-performance XG Series appliance hardware.

New to XG Firewall

If you’re new to XG Firewall, see why it offers the world’s best visibility, protection and response.

 

Net Universe offers all Sophos Devices and subscritpions also consultant services with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/sophos.

Introducing SIEM integrations in Zoho Vault « Zoho Blog

The number of apps used by the average business is skyrocketing now due to the ongoing transformation of our digital work culture and rapid rise in remote work. Today, most companies rely on at least a dozen applications to manage their day-to-day operations and keep their business up and running.

Zoho Vault, Zoho’s password management application, helps businesses securely store, share, and manage passwords from anywhere. Users can simply log in to their Vault once and access all their favorite apps from there in a single click. However, in this current backdrop of safety-mandated work from home, we understand it is important for businesses to gain real-time insights on what is happening in their IT environment to keep cybercriminals at bay.

Vault already offers comprehensive audit trails and live reports to help IT teams easily track user activities. Today, we are happy to introduce integrations with many popular SIEM tools, including Loggly, Logz, Rapid7, Sematext, Sumo Logic, and Timber.

What is SIEM?

A Security Information and Event Management (SIEM) solution is a set of tools and services that offers a holistic view of a company’s information security. With a SIEM solution, companies can:

  • Collect security logs from numerous sources, such as routers, databases, web servers, firewalls, servers, and business apps
  • Correlate log data from different sources to gain insights
  • Configure if-then rules based on log data to automatically trigger security workflows
  • Set up instant alerts to IT administrators on important security issues
  • Conduct in-depth auditing and AI-based threat-intelligence

How Zoho Vault’s SIEM integrations can help you

With this integration, IT administrators can:

  • Push all password-related logs from Zoho Vault to their SIEM service
  • Correlate user activities from different sources, compare them with password-based actions, and gain security insights
  • Automate security workflows based on pre-defined conditions
  • Help IT administrators get a clear picture of potential threats and secure the company’s confidential data
  • Receive instant or periodic notifications on malicious insiders and cybercriminals
  • Easily comply with regulatory mandates such as PCI DSS, HIPAA, FISMA, GDPR, SOX, and ISO 27001

How do I start using Zoho Vault’s SIEM integration?

This integration is immediately available for all Zoho Vault Enterprise Edition users. We have comprehensive help documentation to configure this SIEM integration.

 We also are giving a free webinar session covering this integration on June 30, 2020. You can register for the session here: https://meeting.zoho.com/meeting/register?sessionId=1051508231

If you are currently not a Zoho Vault user, you can head over to zoho.com/vault and sign up for a free 14-day Enterprise trial. If you have any feedback or questions, feel free to write to us at support(at)zohovault(dot)com, or leave a comment below.

Net Universe offers all Zoho subscritpions and consultant services with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/zoho.

define and customize user privileges « Zoho Blog

Businesses are constantly evolving and there’s always a need for tools that can scale along with them. Given the business world’s diverse structure of teams, team sizes, and management styles, customization is an integral requirement of any project management tool. That’s what we aim to achieve with Zoho Sprints. We took our customization features and raised them to a whole new standard. You can now create custom roles, profiles, and user groups to define user privileges for your team.

Roles and Profiles

A role refers to the role or designation of a person within a team, whereas a profile dictates the access permissions they have. A role is fixed at the organization level, but your profile can change depending on the project you’re working on. You could be a “Senior developer” in Project A and the “Technical Lead” in Project B. However, your role at the organization level would remain “Senior Software Development Associate.” With this feature, you can get very flexible about the access privileges each member has across projects.

Zoho Sprints has three default roles (Admin, Manager, Member) and five default profiles (Team Owner, Admin, Guest admin, Project owner, Manager, Member) available with predefined permissions. Learn more about how you can clone an existing profile to create your own.

You can also customize profiles in extensive detail, deciding what access a user does and does not have in each module. For medium and large teams who work on multiple projects, establishing separate profiles and access privileges for each project can declutter your experience and security guidelines. Learn more about the different permission sets in Zoho Sprints.

User Groups: One @mention to call them all

Ever wished that you could tag an entire team in a comment or a status instead of tagging them individually? We hear you. With Sprints, you can create a group of profiles and give it a name. Each time you tag the group, all of its members are notified automatically. This feature comes in handy when you aren’t addressing a functional team, but rather a group of people (from different teams) who are working on a project. Learn more about how you can create your own user groups and the different ways you can use them.

While working on our big release of roles, profiles, and user groups, we also decided to introduce a few smaller features. Here’s a quick summary:

Predict cycle time

The sprint process time report shows the cumulative amount of time your work items spend under each status and also calculates the average time a work item spent under each. This can be used to predict the cycle time of a new work item and identify bottlenecks.

Reordering work items within a status

You can now rearrange work items under a status from the default chronological order. A lot of our users have requested this and we’re glad to be rolling it out.

New swimlanes added

We’ve added three new swimlane criteria to our Scrum board. You can now view swimlanes based on item type, tags, and release name.

Quick note: Sprints users who have integrated with other Zoho products need to update their app for our latest release. We’ve also made changes to our API, so please check our API guide to learn more.

These new features are available now: give them a shot today! We’d love to hear how they work for you.

If you’d like a more hands-on demo of all our new features, please register here for our free webinar scheduled for July 2, 2020.

 

Net Universe offers all Zoho subscritpions and consultant services with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/zoho.

Statutory compliance for payroll in India « Zoho Blog

Every business function is governed by a set of rules, and payroll is not an exception. If you’ve been actively doing payroll in India, you would have definitely come across the term statutory compliance. In this guide, we will learn about the statutory rules that govern payroll in India so you get a clear understanding of how to stay compliant. We will be covering:

Let’s get started with the basics.

What is statutory compliance in payroll?

Statutory compliance refers to the legal framework put in place by the central or state government to regulate business operations. In this case, it’s the framework surrounding payroll.

Why is statutory compliance important?

Every country has its set of payroll laws, and for business owners operating in that country, compliance is a must. Maintaining a spotless compliance record can benefit your business in many ways. It can facilitate business expansion within the country because you create trust with the government. It also shows that you know how to treat your employees well by adhering to labor laws.

In cases of non-compliance, there is a lot at stake for the businesses, such as monetary penalties and a tarnished brand reputation.

Therefore, dealing with statutory compliance requires companies to be well-versed with the labor regulations in the country of operation.

What constitutes statutory compliance in India?

Depending on the industry and type of business, there are many labor laws that an organization has to comply with. For example, in order to protect the social security industrial workers, there’s the Shops and Establishments Act and the Factories Act. For easy understanding, we’ll classify the statutory compliances under five broad categories: statutories for social security, employee wages, labor laws, tax liabilities, and benefits.

Statutories on employee wages

Payment of Wages Act, 1936

The Payment of Wages Act ensures that employees from various industries are paid on time by having penalties for wages paid late by a month.

According to this rule, employees should be paid before the 7th of every month for organizations with less than 1,000 employees. If the organization has more than 1,000 employees, they need to be paid by the 10th of every month.

This is not applicable for people earning salaries of more than ₹10,000 every month. The preferred mode of salary payments under the act is cash or cheque. Bank transfers are allowed only after consent from employees. The rules and regulations vary from state to state.

Minimum Wages Act, 1948

The Minimum Wages Act is a central legislation designed to prevent the exploitation of labour by fixing a minimum wage rate.

The minimum wage varies from state to state or sector to sector since provincial governments also have a say in this.

Some of the most common factors considered before fixing minimum wages include the cost of living, wage period (hourly, weekly, or monthly), and job type.

Payment of Bonus Act, 1965

The practice of paying a bonus in India appears to have originated during the First World War when certain textile mills granted 10% of wages as a war bonus to their workers in 1917.

The Payment of Bonus Act provides an annual bonus to employees in certain establishments, including factories and organizations that employ more than 20 people. Under the act, a bonus is calculated based on an employee’s salary and the profits of the organization.

Employees that have completed 30 working days and have earned ₹21,000 per month or less (basic + DA, excluding other allowances) are eligible for receiving the bonus from their respective organization.

Statutories on Industrial relations

Employee State Insurance Act, 1948

This act aims to help employees overcome unforeseen circumstances, including medical emergencies, maternity leave, or disability situations related to the workplace. For each paycheck, the employer contributes 3.25% and the employee contributes 0.75%. ESI is mandatory for employers who have employees working in a non-seasonal factory with more than 10 employees, but only for employees who are earning less than ₹21,000 per paycheck.

Because ESI is applied only to employees who earn less than ₹21000, you should always check the appraisal cycle to confirm that the employee has not surpassed ₹21,000. Once the employee earns more than ₹21,000, the contributions towards ESI should continue until the end of the contribution cycle. Each contribution cycle lasts six months, from April to September or October to March.

For example, if an employee is earning ₹20,000 in the month of June, and starts to earn ₹22,000 from July post-appraisal, the deduction towards ESI should still continue until September. Starting in October, they need not contribute to ESI.

Employees Provident Fund Act, 1952

The Employee Provident Fund and Miscellaneous Act is one of the biggest social welfare contributions for an employee. As part of this, both the employer and the employee contribute 12% of basic pay and dearness allowance (DA) to the employee’s retirement chest.

Under Section 80C of the Indian Income Tax Act, an employee’s contribution towards their PF account is deemed eligible for tax exemption, which results in higher take-home pay for employees.

Organizations that have 20 employees or more have to comply with this regulation.

Contribution split

Statutory

Employer

Employee

Provident Fund (PF)

12%

3.67%

Employee Pension Fund

NA

8.33%

Employers who are not adhering to this compliance regulation face severe fines or, in extreme scenarios, imprisonment. (Add an example of non-compliance).

Labour Welfare Fund Act, 1965

The Labour Welfare Fund (LWF) focuses on the welfare of employees working in specific industries. It provides facilities to laborers in order to improve their working conditions, provide social security, and raise their standard of living.

The statutory contributions for LWF are managed by individual state authorities. The state labour welfare board determines the amount and frequency of the contribution, and it differs from state to state. In some states, the contribution is made annually (Andhra Pradesh, Karnataka, Tamil Nadu). In other states, the contributions happen every six months (Madhya Pradesh, Maharashtra).

Since these laws change from state to state, here is a list of all the states that do and do not fall under LWF.

States where LWF is applicable 
  • Tamil Nadu

  • Andhra Pradesh

  • Goa

  • Karnataka

  • Kerala

  • Punjab

  • Chandigarh

  • Gujarat

  • Madhya Pradesh

  • Chattisgarh

  • Haryana

  • Delhi

  • West Bengal

  • Maharashtra

  • Telangana

  • Odisha
States where LWF is not applicable

Payment of Gratuity Act, 1972

Along with EPF, gratuity is one of the biggest factors of an employees’ welfare, and it’s one of the most important statutory regulations for organizations. Gratuity is given by the employer to their employee for the services rendered by him during employment. An employee is applicable to receive gratuity only if they’ve completed a minimum of 5 years of service within an organization.

There is no set percentage stipulated by law for the amount of gratuity an employee is supposed to receive. The employer can use a formula-based approach where gratuity payable depends on two factors.

For calculating gratuity, the Payment of Gratuity Act has divided non-government employees into two categories: employees that are covered under the act and those that aren’t.

Gratuity calculation for employees covered under the act
Formula

Gratuity = (15 * Last drawn salary * tenure of working) / 26

Last drawn salary includes basic pay, dearness allowance, and sales commissions.

Example: Let’s assume the employee’s last drawn salary is ₹70,000, and the employee has worked with the company for 20 years and 8 months. The formula to calculate gratuity will be: (15 * 70,000 * 21) / 26

We are considering the tenure of working to be 21 years because the employee has already worked for more than 6 months into their 21st year of employment. If the employee had worked for 20 years and 5 months, then only 20 years would be considered.

Gratuity calculation for employees not covered under the act
Formula

Gratuity = (15 * Last drawn salary * tenure of working) / 30

Last drawn salary includes basic pay, dearness allowance, and sales commissions.

Example: Let’s assume the employee’s last drawn salary is ₹70,000, and the employee has worked with the company for 20 years and 8 months. The formula to calculate gratuity will be: (15 * 70,000 * 20) / 30

We are considering the tenure of working to be 20 years because, in this scenario, only the number of completed years is taken into consideration.

Statutories on Tax liabilities

TDS (Tax Deducted at Source)

This is one of the most important statutory regulations that every organization has to adhere to. It was introduced to collect tax from the source of an individual’s income. TDS is applicable on various income types such as salaries, interest, and commission.

Every employee is taxed at a different tax rate depending on their salary. With the latest union budget announcements, employees in India can choose between two different tax regimes.

Here’s the classification of tax slabs for employees, based on which the TDS is computed.

Old tax-regime

Income Tax Slab

Tax Rate

Up to ₹2.5L

No tax

₹2.5L to ₹5L

5% *

₹5L to ₹10L

₹12,500 + 20% of total income exceeding ₹5L

Above ₹10L

₹1,12,500 + 30% of total income exceeding ₹10L

New tax-regime

Income Tax Slab for FY 2020-21

New Tax Rate

Up to ₹2.5L

No tax

₹2.5L to ₹5L

5% *

₹5L to ₹7.5L

10%

₹7.5L to ₹10L

15%

₹10L to ₹12.5L

20%

₹12.5L to ₹15L

25%

Above ₹15L

30%

Statutories on benefits

Maternity Benefits Act, 1961

This act protects the employment of women during the time of her maternity and grants her full paid absence from work. This act is applicable for all organizations that have more than 10 employees. It’s also one of the most important statutory regulations that the organizations have to follow.

For a female employee to be eligible for the benefit, they must have been working as an employee in an establishment for a period of at least 80 days within the past 12 months. Payment during the leave period is based on the average daily wage for actual absence.

This act applies to organizations, including factories, mines, plantations, government establishments, shops and establishments under the relevant applicable legislation, or any other establishment dictated by the Central Government.

Maternity benefits according to the latest amendment include the following:

Statutories to ensure social security

Shops and Establishments Act

Similar to statutory compliances like ESI and LWF, the Shops and Establishments Act was introduced to regulate the employment conditions of workers in shops and establishments.

This can include fair work hours, proper rest intervals, allowances for overtime, holidays, and more.

Every organization has to be registered under this act, and the registration needs to be completed within 30 days of the commencement of business.

Shops and Establishments laws vary from state to state. A successfully registered business license lasts for 5 years, after which the business has to renew it. Annual returns have to be filed for this act under Form U before January 31st.

Equal Remuneration Act, 1976

The Equal Remuneration Act provides for the payment of equal remuneration to male and female workers for the same work and prevents discrimination against women in the matter of employment, recruitment, and for matters connected to both. This Act applies to virtually every organization.

The way forward

We’re sure it wasn’t easy to get through this guide, even though we’ve only highlighted the basic information that businesses need to be aware of. Now, imagine if you have to manage all these compliance requirements manually or through outdated systems?

Statutory compliance can make or break a company’s reputation. There’s tons of rules and regulations involved, and these have to be adhered to perfectly, every time. Some are modified by the Central or State government, as well. Historically, payroll administrators did this manually. Today, there are systems that can help reduce the burden on payroll teams. With cloud-based payroll software, you can put statutory compliance on auto-pilot mode and always keep a spotless compliance record.

 

Net Universe offers all Zoho subscritpions and consultant services with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/zoho.