How eG Innovations Handles
Information Security and Compliance

Security and privacy controls are critical for any software organization and eG Innovations is no exception. Security practices are integral to everything we do - right from recruitment to billing to customer support.
Our organization follows the Information Security Management System (ISMS) approach which offers a systematic way for establishing, implementing, operating, monitoring, reviewing, maintaining and improving an organization's information security. Confidentiality, integrity, availability, and privacy of our assets and customers’ data is central to our security processes and these processes are audited and checked periodically by internal audit programs and by external mechanisms.

Certifications and Compliance

SOC 2 is an auditing standard focused on organizational controls in five areas: security, availability, processing integrity, confidentiality and privacy, as defined by the American Institute of Certified Public Accountants (AICPA).
Following a rigorous audit of eG Innovations' operational practices, security measures and administration processes for our products and SaaS services, we have passed the Soc 2 Type 2 Audit.

eG Innovations uses Amazon Web Services for some of our SaaS services.
AWS reviewed our processes, methodologies and implementations and rated
us to be AWS Well-Architected.
Built around six pillars—operational excellence, security, reliability, performance efficiency, cost optimization, and sustainability, AWS Well-Architected provides a consistent approach for customers and partners to evaluate architectures and implement scalable designs.