Skip to main content
Edvise logo markEdvise wordmark

Privacy and Security You Can Trust

An overview of Edvise's security and privacy program, including governance, technical safeguards, and operational practices that protect institutional data.

Program Highlights

Key pillars of our commitment to data protection and compliance.

Role-Based Access

Least-privilege access with role-based access control (RBAC), multi-factor authentication (MFA), and quarterly access reviews for administrative users.

Data Life Cycle

You define retention policies, and we securely delete production data within 60 days of contract end with documented destruction workflows.

Incident Response

We target incident verification within 24 hours and provide notification within 72 hours of verification, or sooner when required.

Secure Development

Our secure development lifecycle includes continuous integration and deployment checks, software composition analysis (SCA), and software bills of materials (SBOM).

Student Rights

Students can access, correct, or request deletion of their records through their institution in line with applicable privacy law.

Hosting Locale

Production data remains in the Google Cloud region you select, and cross-region replication is enabled only for approved disaster recovery configurations.

Deep-Dive Details

Comprehensive information on our data practices and compliance.

Academic and Demographic Records

Course enrollments, majors, advising notes, and related education records are processed under the Family Educational Rights and Privacy Act (FERPA).

Combined External Datasets

Industry codes and career profile data are used for enrichment and do not introduce new personally identifiable information (PII).

User-Provided Files

Uploaded documents are scanned, stored, and retained under the same controls as core production data.

Telemetry and Security Signals

Internet Protocol (IP) addresses and device metadata support security monitoring and reliability. We do not use telemetry for advertising.

Frequently Asked Questions

Answers to common questions about our security measures.