Edvise logoEdvise

Edvise Trust Center

Edvise is an AI-powered student success platform designed to help colleges and universities improve retention, advising, and student engagement. We are committed to maintaining the highest standards of data security, privacy, and regulatory compliance. Our platform is built with security-by-design principles, role-based access controls, encrypted data handling, and structured incident response procedures. We align with FERPA requirements and are actively advancing our SOC 2 compliance program to ensure institutional trust and long-term reliability.

Resources

Baseline Hardening Policy
Vendor Management Policy
Incident Response Policy
Data Classification Policy
Board of Directors Charter

Controls

Password rules enforced
Source code access restricted and changes logged
Production access keys restricted and key management services
Access control procedures
Least-privilege access strictly enforced for produciton infrastructure
Data encrypted at rest
Secure disposal of electronic media containing sensitive data (PII, ePHI, etc.)
Customer data deleted after termination
Data Retention and Secure Deletion Policies
Documented security & privacy risk management process
Source code changes tested and approved
Outsourced development security requirements managed
Documented secure development and emergency change procedures
Secure connection means utilized
Web application firewalls configuration
Anti-malware monitoring
Intrusion detection tool
Infrastructure firewall
Centralized Log Collection and Monitoring
Automated system capacity and performance monitoring
Incident response procedures documented
Business continuity & disaster recovery plans documented and tested
Security incident logging and review
Business continuity plans ensure emergency functionality
Visitor sign-in, badging, and escort policy
Technology assets inventoried
Documented Vendor Management Program
Annual risk assessments performed
Confidentiality Agreement acknowledged by employees
Background checks performed on employees
Background checks performed on contractors
Security awareness training implemented
Whisteblower mechanism maintained
Multi-availability zones
Documentation available to internal and external users
Customer support channels available
Automatic Session Timeout Enforcement
Information security policies and procedures
Authorized Communication of Material System Changes
Confidentiality Agreement acknowledged by contractors
Patch management process developed

Subprocessors

Twilio
TwilioBusiness Apps & Productivity