Our clients have trusted Edel their data and we prioritize taking it seriously
security and privacy concerns of our users. We try to ensure that
user data is kept secure and we collect only that much personal data
as required to provide our services to users in an efficient and effective manner. Edel
uses some of the most advanced Internet security technologies on the market today. it
The Safety Statement is intended to be transparent about our infrastructure and practices
security, to help ensure that your data is properly protected.
Application and user security
- All sensitive communications with the Edel.al website, such as user login page,
are sent via SSL / TLS connections. Secure Sockets Layer (SSL) and Transport Layer technology
Security (TLS) (the successor technology to SSL) protects communications by encrypting it
data. This ensures that user data in transit is secure, and available
only for target recipients. - User authentication: User data in our database is logically separated by
account-based access rules. User accounts have usernames and
unique passwords that must be entered each time a user logs in. Edel releases a file
session only to record the coded certificate and status information for the duration of
a certain session. The session cookie does not include the user password. - User Passwords: User application passwords have minimal requirements of
complexity and are encrypted before being stored in our database. - Data portability: Edel enables you to export your data from our system
in order to reserve them or use them with other applications. - Privacy: This Security Statement should be read in conjunction with our privacy policy, which
explains how we process personal information, with whom we share it and for how long we store it. - Third party scans: Standard server penetration testing and application for
application level vulnerabilities.
Data Center
- Data centers: Our information systems infrastructure (servers, network equipment, etc.)
Hosted in Contabo VPS operating SSAE 16 / SOC audited data centers 2. One copy
of their security, privacy and compliance policies can be found here. - Location: All user data is stored on servers located in Germany
Availability - Uptime: We perform continuous monitoring in a timely manner and any downtime e
identified escalates directly to Edel staff.
Network Security - Third party scans: Network gateway scanning, vulnerability scanning and testing performed
penetration manual, using OSSTM standards as the basic minimum. - Testing: System functionality and design changes are verified in an isolated environment
“sandbox” and undergo pre-installation testing in active production systems.
- Upgrade: The latest security updates apply to all operating system files
and the application to mitigate newly discovered vulnerabilities. - Registration and auditing: Central registration systems capture and archive all access to
server, including any failed authentication attempts.
Storage security - Copy frequency: Both the SQL database and the Linux storage space are self-contained
fully reserved s. The Linux server makes a full backup twice a day, and backups
transactional reserve every hour. This data is further backed up by copying and pasting out
site using Linux Storage
Organizational and Administrative Security - Employee Examination: We perform background screening for our employees, whose main role is
includes access to sensitive user data. - Training: We provide training on safety and use of technology for employees.
- Service Providers: We control our service providers and oblige them accordingly
contract with appropriate confidentiality obligations if they relate to any data of
users.
Access: Controls access to sensitive data in databases, systems and environments
ours are placed on the basis of the need to know / at least the necessary privilege. - Audit recording: We maintain and monitor audit records in services and systems
ours.
Software development practices - Coding practices: Our engineers use industry standard secure coding guidelines for
ensure secure coding. - Third party scans: An in-depth review of applicable source code in connection is undertaken
with the project, looking for security vulnerabilities at both the application level and the e
configuration.
Dealing with security breaches - Despite the best efforts, no method of transmission via the Internet and no method of
Electronic storage is not completely secure. We can not guarantee security
absolute. However, if Edel learns of a material security breach, we will
Reasonable efforts to notify affected users so that they take steps
proper protector. We will do this by providing email notifications or posting a notification on
our website if a material breach occurs. We will also respect all
applicable data breach notification laws.
Your responsibilities
Keeping your data safe also depends on ensuring that you maintain account security
your own using fairly complex passwords and storing them securely. you
you also need to make sure that you have enough security on your systems to protect it
your data.
Questions?
If you have any questions about Edel’s security practices, please email us
info@edel.al
Last update: December 2021