Skip to main content
Security First

Your data is protected

We take security seriously. EdiMono is built with enterprise-grade security measures to protect your energy data and ensure compliance.

Encryption

  • TLS 1.3 for all data in transit
  • AES-256 encryption for data at rest
  • Database-level column encryption for sensitive fields
  • Encrypted backups with separate key management

Authentication & Access

  • Multi-factor authentication (TOTP)
  • Role-based access control (RBAC) with granular permissions
  • Session management with automatic timeout
  • API key authentication with scope restrictions

Infrastructure

  • Hosted on SOC 2 certified cloud infrastructure
  • Geographic data residency options (Canada, US, EU)
  • Automated daily backups with 30-day retention
  • 99.9% uptime SLA with redundant infrastructure

Monitoring & Logging

  • Real-time intrusion detection and alerting
  • Comprehensive audit logging of all user actions
  • Automated vulnerability scanning (weekly)
  • 24/7 infrastructure monitoring with incident response

Compliance

  • SOC 2 Type II certified
  • PIPEDA compliant (Canadian privacy law)
  • GDPR compliant for EU data subjects
  • Annual third-party penetration testing

Incident Response

  • Documented incident response plan
  • 72-hour breach notification (GDPR/PIPEDA)
  • Post-incident review and public transparency reports
  • Dedicated security team on-call

Trust & Compliance

Certifications & standards

SOC 2
Type II Certified
PIPEDA
Compliant
GDPR
Compliant
ISO 27001
Aligned

Responsible Disclosure

Report a vulnerability

We value the work of security researchers. If you discover a potential security vulnerability, please report it responsibly.

Email: security@edimono.com

PGP Key: Available upon request

Response Time: We acknowledge reports within 24 hours and provide an initial assessment within 72 hours.

Scope: All EdiMono production services and APIs. Please do not test against other users' accounts or data.

Safe Harbor: We will not pursue legal action against researchers who report vulnerabilities in good faith and follow responsible disclosure practices.