Legal

Security & Compliance

This agreement is between eConsent LLC and the client with regard to access and use of econsent.org and related services. Contact us with questions.

Last Updated: April 1, 2026

Our Commitment

eConsent is a TCPA compliance platform that processes sensitive consent data on behalf of our customers. Security is foundational to our product — not an afterthought. This page describes the technical and organizational measures we implement to protect your data.

Infrastructure

Cloud Hosting

eConsent runs on Amazon Web Services (AWS) in the US-West-2 (Oregon) region. Our infrastructure leverages:

  • AWS Fargate (ECS) — Serverless container orchestration for our API services. No persistent servers to patch or maintain. Containers are ephemeral and rebuilt on every deployment.
  • Amazon S3 — Long-term certificate storage with Object Lock in COMPLIANCE mode. Once a certificate is archived, it cannot be modified or deleted for the duration of the retention period (up to 7 years).
  • Amazon EFS — Encrypted file storage for active session recordings with automatic replication.
  • Amazon CloudFront — Content delivery network with TLS termination for our client-side recording script and WASM processing module.
  • Amazon RDS / PostgreSQL — Managed relational database for session and certificate data with automated backups and encryption at rest.

Isolation

Each customer’s data is logically isolated at the database level using company-scoped partitioning. Customer data is never commingled in shared tables without partition boundaries. API authentication enforces tenant isolation on every request.

Encryption

In Transit

All data transmitted between clients, our APIs, and our infrastructure is encrypted using TLS 1.2 or higher. This includes:

  • Browser to API communication
  • Internal service-to-service communication
  • Database connections
  • Redis connections
  • Webhook delivery to customer endpoints

At Rest

  • Certificate archives: Stored in S3 with server-side encryption (AES-256)
  • Access tokens: Encrypted using AES-256-GCM with per-token random initialization vectors before storage
  • Database: PostgreSQL and MongoDB instances use encrypted storage volumes
  • Session recordings: Stored on encrypted EFS volumes

Integrity Verification

Every consent certificate includes a SHA-256 cryptographic hash of its canonical payload. This hash provides tamper detection — any modification to the certificate data after issuance will produce a different hash, making tampering evident.

Outbound webhook payloads are signed with HMAC-SHA256 using a per-endpoint secret key, allowing recipients to verify that payloads originate from eConsent and have not been altered in transit.

Authentication and Access Control

Customer Access

  • Session-based authentication with secure, HTTP-only cookies
  • Password hashing using industry-standard algorithms
  • Role-based access control (RBAC) with configurable permissions per user
  • Organization-level isolation — users can only access data within their own organization

Internal Access

  • Access to production systems is restricted to authorized personnel
  • Infrastructure management uses AWS IAM with least-privilege policies
  • No customer data is stored on employee workstations

Session Recording Privacy

eConsent’s session recording technology captures consumer interactions with web forms for consent verification purposes. We implement the following privacy controls:

  • Password fields are automatically masked in all recordings
  • Custom field masking allows customers to designate any form input as sensitive — masked fields appear as asterisks in replays and are never stored in plaintext
  • Selective field capture — by default, only core PII fields necessary for TCPA verification are captured. Additional fields require explicit whitelisting by the customer.
  • Minimal browser storage — the recording script stores only session identifiers and timestamps in cookies and localStorage on the Customer’s domain. No PII is persisted on the consumer’s device. See our Cookie Policy for details.

Data Retention

Data TypeDefault RetentionMaximum
Session recordings (active)Per customer planConfigurable
Certificate archives (S3 Object Lock)Up to 7 years7 years (COMPLIANCE mode)
Session metadataPer customer planConfigurable
API and access logs90 days90 days
Account dataDuration of accountUntil deletion requested

Customers may configure retention periods through their dashboard. When data expires, it is permanently deleted and cannot be recovered.

Incident Response

Breach Notification

In the event of a data breach affecting customer data, eConsent will:

  • Notify affected customers within 72 hours of confirmed discovery
  • Provide details of the nature and scope of the breach
  • Describe the measures taken to contain and remediate the incident
  • Cooperate with customers’ own notification obligations under applicable law

Our breach notification procedures are detailed in our Data Processing Agreement.

Monitoring and Availability

Uptime Monitoring

eConsent monitors all critical services continuously with automated health checks:

  • API availability (30-second intervals)
  • Database connectivity
  • Redis connectivity
  • CDN availability
  • Recording pipeline health
  • Certificate generation pipeline health
  • Webhook delivery queue health

Our public status page is available at status.econsent.org.

Logging

All API requests are logged with timestamps, request metadata, and response codes. Logs are retained for 90 days. Logs do not contain consumer PII or form field values.

Compliance

TCPA

eConsent is purpose-built for Telephone Consumer Protection Act compliance. Our platform documents the consent interaction — what was displayed, what the consumer did, and when it happened — providing businesses with defensible records for TCPA litigation.

CCPA / CPRA

eConsent supports California Consumer Privacy Act compliance for our customers. We do not sell consumer personal information. We support data deletion and access requests as described in our Privacy Policy.

GDPR

For customers processing data of EU residents, eConsent offers a Data Processing Agreement that addresses GDPR requirements including data subject rights, processing instructions, subprocessor management, and cross-border transfer mechanisms.

SOC 2

SOC 2 Type II certification is on our roadmap. Our current security controls are designed to align with SOC 2 Trust Service Criteria (Security, Availability, Confidentiality). If you require a detailed security questionnaire or vendor assessment, contact us at security@econsent.org.

Responsible Disclosure

If you discover a security vulnerability, please email security@econsent.org. Do not disclose vulnerabilities publicly before we have had an opportunity to investigate and remediate.

Questions

For security-related inquiries, vendor security assessments, or to request our security questionnaire, contact:

Email: security@econsent.org

See eConsent in action. Schedule a live demo
Schedule a demo