Security you can verify.
The controls, architecture, and transparency behind eConsent. Every claim on this page is independently verifiable.
How we protect your data
Plain-language descriptions of the controls in production today. No marketing language — just what the system does.
Cryptographic integrity
Every consent certificate is signed with HMAC-SHA256 using a server-held secret. The signature covers the certificate payload, session metadata, and disclosure content. Any downstream modification — to a single byte — invalidates the signature, and verification is publicly exposed so any party can confirm a certificate's authenticity without needing to trust us.
Records are additionally tamper-hashed with SHA-256 at the storage layer, and voice audio is committed to S3 with Object Lock in COMPLIANCE mode — immutable for seven years, even to us.
Tenancy isolation
PostgreSQL LIST partitioning separates every customer's data into a dedicated partition keyed on company_id. Every query path additionally scopes by api_key_id, making cross-tenant data access a structural impossibility rather than an application-layer check.
SQL is executed exclusively through parameterized queries (Knex on the Node tier, sqlx on the Rust tier). String concatenation into queries is not part of the codebase.
Infrastructure hardening
Services run on AWS Fargate in us-west-2, distributed across 2–4 availability zones depending on service. Secrets are resolved at container start from AWS SSM Parameter Store — credentials are never committed to source control or baked into container images. Deployments use an ECS circuit breaker with automatic rollback, so a failed rollout reverts rather than leaving the cluster in a broken state.
Uptime Kuma performs synthetic health checks against each service. Structured JSON logs stream to CloudWatch with a request ID propagated across every service hop for distributed tracing.
Access controls
API keys are hashed with SHA-256 on creation; the raw key is shown once to the user and never persisted. New API keys enter a gated approval workflow — keys in a pending state cannot be used for production traffic until explicitly approved.
Dashboard access uses role-based permissions with session cookies that are HTTP-only and SameSite=Lax. Rate limiting is applied per-IP and per-company via a Redis sliding window, and Cloudflare Turnstile blocks automated registration attempts. CSRF protection uses a double-submit cookie pattern on dashboard mutations.
Designed to help you comply
We are designed to help you meet the following frameworks. eConsent helps your program meet these requirements — we are not ourselves certified under them.
TCPA — 47 CFR 64.1200
AlignedThe TCPA requires prior express written consent before placing automated calls or sending SMS. Our Voice and SMS compliance chains capture the consent event, the disclosure language, the channel, and the identified seller, and produce a signed certificate that documents the required elements.
FCC — February 2024 Order
AlignedThe FCC's February 2024 declaratory ruling classified AI-generated voices as "artificial" under the TCPA, requiring consent. Our Voice classifier flags AI-generated audio and records that determination on the certificate so you can prove your consent framework accounted for it.
FCC — August 2024 NPRM
AlignedThe FCC's August 2024 NPRM addresses revocation of consent: any reasonable method must be honored and must propagate across channels. Our revocation pipeline accepts inbound revocations via portal, API, and CSV, and updates downstream consent state in real time with an auditable trail.
CTIA Messaging Principles
AlignedCTIA's Messaging Principles and Best Practices define what carriers expect from senders. Our SMS pre-send compliance checks evaluate opt-in provenance, required disclosures (HELP, STOP), and prohibited-content categories prior to handoff to a messaging aggregator.
10DLC Campaign Registry
CompatibleCertificates generated by eConsent capture the fields required to substantiate opt-in for 10DLC campaign registration, including the channel of origin, disclosure text, consumer identifier, and timestamp.
FTC Telemarketing Sales Rule
CompatibleThe FTC TSR imposes additional consent and disclosure requirements on telemarketers. Our certificate schema records seller identity, goods or services offered, and the written consent language the consumer saw — the artifacts an FTC inquiry typically asks for.
Where your data lives and how it's handled
Retention
- 7-year default retention for consent certificates, matching the TCPA statute of limitations with buffer.
- Configurable retention for session recordings from 1 hour up to 7 years, per property.
- Immediate deletion API — customers can purge covered records on request.
- Voice audio retained in S3 Object Lock COMPLIANCE mode — immutable for its retention window, including to eConsent staff.
Where data lives
- Primary region: AWS
us-west-2(Oregon). - Customer scope: US-based customers at this time. Cross-border transfer tooling will accompany any future expansion.
- Edge: CloudFront terminates TLS 1.2+ and fronts API and static assets.
- Phone number handling: stored as SHA-256 hashes in contexts where the raw value is not required.
Subprocessors
Third-party services that process customer data on our behalf.
Our security roadmap
Trust is earned through transparency about what we have and what we're still working on. Here's what's on the path forward.
SOC 2 Type I evaluation & third-party penetration test
Evaluating Vanta for SOC 2 Type I readiness. Third-party penetration testing engagement is being scoped alongside it.
Formal SLA publication & HIPAA BAA availability
Publish a formal uptime and incident-response SLA. Offer HIPAA Business Associate Agreements to qualifying healthcare customers.
SOC 2 Type II
Observation-window audit for SOC 2 Type II, following Type I attestation.
Verify for yourself
Trust is verifiable or it isn't trust. Here's how to check our work.
Live status page
Real-time uptime and incident history for every service, powered by Uptime Kuma synthetic health checks.
Public certificate verification
Paste any eConsent certificate ID and we'll verify its HMAC-SHA256 signature, retention status, and revocation state — without requiring an account.
Responsible disclosure
Report vulnerabilities to security@econsent.org. We acknowledge all reports within 48 hours and provide remediation timelines as part of that response.
Please do not test against other customers' data, do not attempt denial-of-service, and do not publish findings before we've had a chance to remediate.
Questions? Talk to our team.
Security reviews, vendor questionnaires, DPA requests, architecture deep-dives — reach our security team directly.
Review our Privacy Policy · Terms · DPA · Subprocessors