EDN Security Compliance Program

 

We commit to delivering the highest level of security, reliability, privacy, and compliance for our users. The EDN forges the connection between our company operations and products, making it a one-stop shop for all your security needs.

Get the answers you need

Where is data stored? Is the data encrypted? Who controls users? Find the answers and trust you need to feel secure.

 

EDN Software Security Program

We commit to delivering the highest level of security, reliability, privacy, and compliance for our users.

Our Integrity is your Security – EDN Cloud-based Server Connection

.

What is Security in the Cloud?

Security in the cloud is much like security in your on-premises data centers – only without the costs of maintaining facilities and hardware. In the cloud, you don’t have to manage physical servers or storage devices. Instead, you use software-based security tools to monitor and protect the flow of information into and of out of your cloud resources.

aws security, secure server, cloud-based software, mobile app security server

AWS Cloud Servers

EDN chooses AWS services to adhere to the highest industry compliance standards

If any business could have done it, Amazon wasn’t missing out. Now, one of the most comprehensive and secure options on the market, the AWS Cloud system (Amazon Web Services) is host to some of the world’s largest businesses’ data storage.

The AWS is a secure partner of the U.S. Department of Defence, FDA and Netflix, to name just a few users that trust is their services. The architecture is built to satisfy the security requirements for the military, global banks and other high sensitivity organisations. This is backed with compliance and governance services and features that all offer the ability to encrypt data.

EDN uses multiple layers of security with data hosted by AWS. It is simply one of the most fortified options for businesses that rely on data discretion and security.

Security Practices Statement

We take the security of your data very seriously at EDN. As transparency is one of the principles on which our company is built, we aim to be as clear and open as we can about the way we handle security.

E-Data Now! is committed to protecting the information of its customers and preventing unauthorized disclosure, use, modification, or access to such information stored within E-Data Now! (EDN) services. We recognize the importance of appropriate information security policies and procedures to protect the security of customer data.

EDN protects customer information from loss, misuse, and unauthorized access, disclosure, alteration, or destruction by employing industry standard safeguards to implement the control objectives described in the EDN Security Program. More specifically, EDN Software intends to maintain reasonable and appropriate administrative, physical, and technical safeguards to:

  • Provide assurances of the integrity and confidentiality of customer information
  • Protect against any reasonably anticipated threats or hazards to the security or integrity of customer information, and unauthorized uses or disclosures of customer information
  • Maintain compliance with the legal framework of requirements for the privacy and security of customer information

EDN Customer Server Access

All requests to the EDN Server require Authorization

  1. EDN App: Authorization License / Access Key
  2. Customers’ Data for Business Intelligence: Amazon Access Key for S3 (AWS)
  3. EDN Server: Username and Password

Who Controls Users?

The account administrators from the client side of EDN handle all new users and their role level, which allows access to certain resources and performing actions. Account access for these users is only granted by the client hierarchy admins roles or by the EDN support team if requested by the administration personnel.

This is known as RBAC – a Role-based Access Control Model, by which admin can adjust roles to change the permissions for all users set at that role level.

What are the Permission Role Levels

EDN has five core roles with the flexibility to allow users to access more or less audit information depending on their operational role within the organization or supplier and customer organizations.

EDN Standard User Levels:

  • Administrators – Full Access (Read / Write / Create)
  • Manager – Administrators of their site, shift, or team (Read / Write / Audit)
  • Audit User – An audit user operates EDN for data collection (Read / Audit)
  • Read Only – A user that can only view audit data (Read)
  • Customer /  Supplier – A user that may be required to participate in remote audits or access data for customer insights (Read / Audit – Selected reporting/audit data only)

Best Practice for a Misplaced Device

As business assets, your devices should be equipped with a Mobile Device Management Solution (MDM). Some devices have simple proprietary mdm systems preinstalled or you should choose a providers such as Google, IBM, Cisco Meraki and Microsoft, among a few, to suit your device management requirements.

As general best practice, you should determine if a lost device has been stolen or temporarily misplaced.

Most mdm solutions offer a last or current location search option – just like find my iPhone. EDN can use the device mdm option to locate a lost mobile device (Android or iOS). If it’s determined to be stolen, most mdm solutions also offer the ability to remove all data and app content as well as locking the device from use.

Generally, the next connection to the internet results in the device going through this process of locking down the device. We recommend the contacting your mdm business provider for further investigation and to ensure the device has been locked.

 

Need Support? Submit a Ticket

Quality Inspection and Audit Software Platform Security Compliance

Quality Inspection Client trusts EDN inspection and audit software

Custom API Integration

On a customer-to-customer basis, EDN can support custom the setup of API integrations from our server side for your unique business systems needs.

Comply with audit requirements and share the data with your centralized business tools for all relevant divisions to get the most out of process audit results. Integrate EDN with great systems to improve the lines of communication. Let Us Help You get Started – Request A Demo

Discover More of EDN’s Process Audit Software Tools

Unique Pass/Fail

Capture Pass / Fail and Yes / No audit checklist questions with greater insight and expansion questions to trigger the right corrective action.

LPA Administration

Achieve continuous improvement from scheduled and structured Layered Process Audits across your organisation management levels and locations.

Heat Mapping Defects

Visualize complex data in an easy to consume manner with Heat Maps for defective areas, subjective non-conformance and human movement.

Talk to Us

Get started in your journey to operational excellence and learn how you can drive impressive results in efficiency and cost reduction with mobile quality data collection.