Our clients have trusted Edel their data and we prioritize taking it seriously
security and privacy concerns of our users. We try to ensure that
user data is kept secure and we collect only that much personal data
as required to provide our services to users in an efficient and effective manner. Edel
uses some of the most advanced Internet security technologies on the market today. it
The Safety Statement is intended to be transparent about our infrastructure and practices
security, to help ensure that your data is properly protected.
Application and user security

  • All sensitive communications with the Edel.al website, such as user login page,
    are sent via SSL / TLS connections. Secure Sockets Layer (SSL) and Transport Layer technology
    Security (TLS) (the successor technology to SSL) protects communications by encrypting it
    data. This ensures that user data in transit is secure, and available
    only for target recipients.
  • User authentication: User data in our database is logically separated by
    account-based access rules. User accounts have usernames and
    unique passwords that must be entered each time a user logs in. Edel releases a file
    session only to record the coded certificate and status information for the duration of
    a certain session. The session cookie does not include the user password.
  • User Passwords: User application passwords have minimal requirements of
    complexity and are encrypted before being stored in our database.
  • Data portability: Edel enables you to export your data from our system
    in order to reserve them or use them with other applications.
  • Privacy: This Security Statement should be read in conjunction with our privacy policy, which
    explains how we process personal information, with whom we share it and for how long we store it.
  • Third party scans: Standard server penetration testing and application for
    application level vulnerabilities.

Data Center

  • Data centers: Our information systems infrastructure (servers, network equipment, etc.)
    Hosted in Contabo VPS operating SSAE 16 / SOC audited data centers 2. One copy
    of their security, privacy and compliance policies can be found here.
  • Location: All user data is stored on servers located in Germany
    Availability
  • Uptime: We perform continuous monitoring in a timely manner and any downtime e
    identified escalates directly to Edel staff.
    Network Security
  • Third party scans: Network gateway scanning, vulnerability scanning and testing performed
    penetration manual, using OSSTM standards as the basic minimum.
  • Testing: System functionality and design changes are verified in an isolated environment
    “sandbox” and undergo pre-installation testing in active production systems.
  • Upgrade: The latest security updates apply to all operating system files
    and the application to mitigate newly discovered vulnerabilities.
  • Registration and auditing: Central registration systems capture and archive all access to
    server, including any failed authentication attempts.
    Storage security
  • Copy frequency: Both the SQL database and the Linux storage space are self-contained
    fully reserved s. The Linux server makes a full backup twice a day, and backups
    transactional reserve every hour. This data is further backed up by copying and pasting out
    site using Linux Storage
    Organizational and Administrative Security
  • Employee Examination: We perform background screening for our employees, whose main role is
    includes access to sensitive user data.
  • Training: We provide training on safety and use of technology for employees.
  • Service Providers: We control our service providers and oblige them accordingly
    contract with appropriate confidentiality obligations if they relate to any data of
    users.
    Access: Controls access to sensitive data in databases, systems and environments
    ours are placed on the basis of the need to know / at least the necessary privilege.
  • Audit recording: We maintain and monitor audit records in services and systems
    ours.
    Software development practices
  • Coding practices: Our engineers use industry standard secure coding guidelines for
    ensure secure coding.
  • Third party scans: An in-depth review of applicable source code in connection is undertaken
    with the project, looking for security vulnerabilities at both the application level and the e
    configuration.
    Dealing with security breaches
  • Despite the best efforts, no method of transmission via the Internet and no method of
    Electronic storage is not completely secure. We can not guarantee security
    absolute. However, if Edel learns of a material security breach, we will
    Reasonable efforts to notify affected users so that they take steps
    proper protector. We will do this by providing email notifications or posting a notification on
    our website if a material breach occurs. We will also respect all
    applicable data breach notification laws.
    Your responsibilities
    Keeping your data safe also depends on ensuring that you maintain account security
    your own using fairly complex passwords and storing them securely. you
    you also need to make sure that you have enough security on your systems to protect it
    your data.

Questions?

If you have any questions about Edel’s security practices, please email us
info@edel.al
Last update: December 2021