Tell us a bit about yourself








    By submitting this form you accept our privacy policy

    Our website uses cookies that help us and third-party partners remember you and improve your experience browsing our site. You agree to the use of all cookies or you can change your settings.

    Cookie settings

    We use cookies on this website to enhance your browsing experience. Necessary cookies are essential for basic website functionalities and are stored on your browser. We also use third-party cookies to analyse and improve website usage. You can opt-out of these cookies, but it may affect your browsing experience.

    Security

    edays uses outstanding technology and processes to safeguard our customers’ data in line with global compliance.

    Information Security

    You trust us to keep all your employees' data safe and secure, which is exactly what we do. Security is a top priority for us, with constant penetration tests, data backups, and a 99% uptime service level agreement. On this page, you will find all information about security at edays, including links to security documents that you can download and take away with you.

    Application development.

    edays uses an agile development methodology with 2-week sprints involving regular backlog refinement meetings, sprint planning meetings, and a sprint review and retrospective at the end. Testing is performed within the sprint, so code updates and developments can be released on a regular basis.

    Access control.

    edays uses a roles-based access control system throughout all aspects of the company. Using a combination of Active Directory and Azure Active Directory to enable permissions for users throughout the organization. This allows edays to control access to sensitive data and resources.

    Encryption.

    edays utilizes a range of cryptographic controls to keep your data secure. Encryption is used throughout the edays solution, both for data at rest and data encryption in transit.

    Employee screening.

    Employees working in roles that have access to customer or sensitive data are required to undergo a credit and criminal records check. This will be undertaken before the employee starts in the role, but edays reserves the right to re-check individuals over the course of their employment.

    Penetration testing and vulnerability scanning.

    Application security is crucial to keep customer data security. That is why edays conducts annual third-party penetration testing and weekly vulnerability scans to make sure the edays code is secured against the latest threats.

    ISO 27001.

    At edays, the security of our customers data is a top priority and on 5th November 2019 edays was issued the certificate to confirm the company’s compliance with the ISO 27001 standard.

    ISO 27001 is the international standard that helps businesses to manage their information security in line with industry-recognized best practices. It offers a set of specifications for businesses to adhere to that will ensure they have strong information security management.

    Hosting provider.

    edays chose Microsoft to host the edays application due to their commitment to security and compliance offerings. Microsoft has an extensive number of certifications that are within the PDF which you can download below. If you would like more information on Microsoft’s compliance offerings, you can visit their website and read all their compliance offerings here.