Frequently Asked Questions

We define engagement as the level of attention, dedication, effort, participation, and commitment to learning of a student who participates in a university education program, a training course or a conference.

edden collects and processes data on the activity of online course participants in the different systems in which their education takes place. Our Artificial Intelligence algorithms allow us to infer the levels of engagement that each participant shows. For this, we calculate the engagement in live classes (synchronous meetings) through videoconferencing software, and also the engagement in asynchronous learning environments, such as Learning Management Systems or virtual campuses.

Online education can have synchronous and asynchronous instances. The synchronous instances occur in classes or live meetings, when a teacher meets with the participants through Videoconferencing Softwares such as Microsoft Teams, Google Meet, Zoom. Asynchronous instances are usually developed in Learning Management Systems (LMS), where teachers and participants can communicate by messages, interact in forums, provide activities, and take exams.

A student with high engagement has a better chance of successfully completing a course or program than one with low engagement. Our Artificial Intelligence makes predictions regarding the Dropout Risk of each participant based on indicators that consider class participation, academic performance, compliance with assignments and other passing requirements, financial situation and student well-being, among others.

edden delivers insightful recommendations to create short- and long-term solutions. It provides information so instructors can improve their classes, enhance the contents they are teaching and understand the impact they are generating on their students. edden allows institutions to focus on its students well-being, taking into account academic factors, as well as sentiment, financial situations and social factors, a key aspect to prevent dropouts.

edden is extremely user-friendly and does not require specific skills from its users to use it.

edden is a flexible system that adapts to each client's systems. We have a team of analysts who will accompany the implementation of the tool, considering the needs of the institution. They will work closely with the local IT team ensuring synergy between the systems. The team will carry out the necessary integrations to collect the data from the institution systems and prepare it for use in edden. Upon completion of this task, edden can be used continuously by the entire institution with no additional assistance required.

edden is a system designed for multiple users. Instructors, Students, Counselors, Retention Managers, Directors or Administrators of an educational institution can access specific information for their profile.

edden does not require an institution to modify its systems. Its versatile architecture allows integration with the main LMS (Blackboard, Canvas, etc.), videoconferencing software (Microsoft Teams, Zoom, Google Meets, Cisco Webex, etc.) and SIS (Ellucian, Jenzabar, Oracle, etc.). edden integrates with the customer's systems, but does not affect their security or functionality. We offer integration tools that allow us to obtain information from institutional systems and provide academic analytics.

Teachers: they can access information about engagement, activity and alerts about their students, courses and about themselves.

Students: can access boards with information about their own activity and progress in their online courses.

Institution: each client can access panels for directors, administrators, counselors and those responsible for student retention, success or well-being, with information about students, courses and teachers.

edden is a GDPR compliant tool. This is the General Data Protection Regulation (GDPR) that establishes the guidelines for the collection and processing of personal information about individuals in Europe.

edden provides a single consent form for users to agree to. This form explains the purpose of the use and processing of personal and academic data.

edden complies with the GDPR principles to process only accurate and relevant data, and further provides a GDPR compliant method to rectify or erase personal data.

We process and analyze information, academic and personal, that the institution stores, in accordance with the GDPR guidelines.

The academic information that is processed is related to grades, assignments, participation and student activity in the different synchronous and asynchronous learning systems.

The personal information edden processes depends on the context of the user's interactions with institutional systems. Some examples of personal information are: name, age, email, time in the institution, user ID, among others.

Data is collected automatically by edden's integrated architecture, which takes relevant and accurate information from the main systems used by the institution.

The processing of this data is done only if the prior consent of the users to do so is explicitly received, for the subsequent processing of the same. We do not collect personal data, except for the data that is useful for the customer to make a correct and efficient use of the solution.

edden uses basic data on participants, such as name, age, email, so that other users can identify them, just as other cloud tools do such as LMS, videoconferencing software, messaging applications, etc.

Our commitment to respect the guidelines of the GDPR regulation implies using the minimum and necessary data to provide our service and protect the integrity and security of this data.

We use the highest security standards to protect our system and our customers' information.

edden is developed from the ground up following industry standards for platform security, data security, and GDPR. Edden works as a SaaS system, it maintains the connections with the university's native systems in an encrypted and secure way, maintaining usability and speed. In this way it also maintains independence in the event of attacks, intrusions or service outages.