Trust, Data Safety & Security at Edge

At Edge, we understand the critical importance of protecting your data and privacy.

Compliance That Builds Confidence

Over 500 businesses trust Edge with their remote hiring needs.

HIPAA Compliance

We are fully HIPAA-compliant, ensuring all healthcare-related data is handled with the highest confidentiality.

ISO 27001: 9001

We take data security seriously. As an ISO 27001-certified company, we follow globally recognised standards.

SOC 2 Type II

Our SOC 2 Type II certification shows our commitment to top security and data integrity standards.

GDPR Compliance

We fully comply with GDPR, upholding the highest data privacy and security standards.

Implemented Policies & Procedures at Edge

Explore policies providing information on storage, security, privacy, and use of sensitive information & ensuring compliance with regulations for our customers.

People Controls
  • Identity Verification
  • Background Checks
  • Legal contractual bindings in the country of origin
  • Coordination Assistance / Dedicated Accounts Manager
  • Payment Protection (as per contract)
  • HR Training for enhancement of Cyber Hygiene
Physical Controls
  • Dedicated – Fully Equipped Workspace
  • Power / Network Backups
  • 24/7 Surveillance Coverage and On-Duty Guards
  • Tiered Access Control
  • Environmental Hazards Protection
Technological Controls
  • Cloud and Application Security
  • Single Sign-On (SSO)
  • Multi-Factor Authentication (MFA)
  • Role-Based Access Control (RBAC)
  • Secure Tenant Segregation
  • Password Management Implementation
Cloud Infrastructure
  • Amazon Web Services (AWS) as Cloud Provider
  • Business Continuity and Disaster Recovery Plans
  • Multi-Environment with Isolated Production Environment
Security Operations Center
  • Security Information and Events Management (SIEM) Implementation
  • Enhanced Metrics Capture and Logging
  • 24/7 Monitoring
  • Information Security Incident Response Management and Plan
  • Performance Monitoring
Endpoint Security
  • Endpoint Detection and Response (EDR)
  • Anti-Virus/Anti-Malware Protection
  • Full Disk Encryption
  • Mobile Device Management (MDM)
  • CIS Benchmark-Based Hardening
  • Secure Disposal of Hardware and Media
Secure Software Development Lifecycle
  • Change Management
  • Security by Design Architecture
  • Code Reviews
  • Vulnerability and Patch Management
  • Vulnerability Assessment and Penetration Testing (VAPT) Programs
  • Web Application Firewall (WAF)
  • Intrusion Detection and Prevention System (IDS/IPS)
  • Responsible Disclosure (Internal and Partners)
  • Security Audit and Risk Assessment
Data Controls
  • Managed Backups with Recurring Verifications
  • Encryption at Rest
  • Encryption in Transit
  • Secure Data Sharing
  • Network Security
  • Web Filtering
  • Host-Based and Tiered Network Firewall
  • Zero-Trust VPN
HIPAA Controls
  • Business Associate Agreements (BAAs)
  • ePHI Handling Policy for Users and Facilities

Implemented Policies & Procedures at Edge

Explore policies providing information on storage, security, privacy, and use of sensitive information & ensuring compliance with regulations for our customers.

Acceptable Use Policy

Ensures responsible service use, minimizing compliance risks.

Access Control Policy

Protects sensitive data by restricting access to authorized users.

Asset Management Policy

Safeguards assets, ensuring their integrity and availability.

Backup Policy

Ensures business continuity through secure and reliable data backups.

Technological Controls Policy

Safeguards user devices and data, ensuring ISO 27001:2022 compliance.

Usage Terms

Defines guidelines for using our services, ensuring compliance & protecting both parties.