Claim Your Free Trial Now Limited-Time 6-Month Free Access
No. EDMO processes data solely on behalf of the university and its authorized partners and only for approved academic and administrative purposes required to deliver EDMO’s services. University data is not used for advertising, not sold, and not shared with other customers. Data is processed strictly within the scope defined by institutional agreements and applicable data protection requirements.
Security is built into EDMO’s product design and operational processes. Controls are reviewed periodically, and security practices are updated to address evolving risks, regulatory requirements, and customer expectations.
Data retention follows contractual obligations, institutional requirements, and regulatory expectations. Logs and operational data are retained only as long as necessary for security, compliance, and operational purposes.
No. EDMO’s systems are not open to the public. All access requires authentication, and no anonymous access is permitted.
EDMO maintains a documented Business Continuity and Disaster Recovery (BCDR) plan. Regular backups are performed and tested to ensure systems and data can be restored in the event of an outage or emergency.
Yes. EDMO aligns its security program with industry best practices and SOC 2 Trust Services Criteria, including controls related to access management, encryption, logging, monitoring, and incident response.
Yes. EDMO acts as a service provider processing data on behalf of universities and supports FERPA compliance through strict access controls, data minimization, encryption, monitoring, and contractual safeguards.
EDMO employs a layered security approach, including:
These controls are designed to protect confidentiality, integrity, and availability of university data.
No. Sensitive data such as full transcripts, credentials, or personally identifiable information is never stored in application logs. Logs capture activity metadata only to support security monitoring and auditing.
Yes.
Encryption is enforced across databases, file storage, backups, and network communications.