Trust & Security

Security you can verify.

The controls, architecture, and transparency behind eConsent. Every claim on this page is independently verifiable.

AES-256
Encryption at rest
TLS 1.2+
Encryption in transit
HMAC-SHA256
Certificate signing
S3 Object Lock
7-year immutability
Multi-AZ
us-west-2, 2–4 zones
RBAC
Role-based access
Controls

How we protect your data

Plain-language descriptions of the controls in production today. No marketing language — just what the system does.

Cryptographic integrity

Every consent certificate is signed with HMAC-SHA256 using a server-held secret. The signature covers the certificate payload, session metadata, and disclosure content. Any downstream modification — to a single byte — invalidates the signature, and verification is publicly exposed so any party can confirm a certificate's authenticity without needing to trust us.

Records are additionally tamper-hashed with SHA-256 at the storage layer, and voice audio is committed to S3 with Object Lock in COMPLIANCE mode — immutable for seven years, even to us.

Tenancy isolation

PostgreSQL LIST partitioning separates every customer's data into a dedicated partition keyed on company_id. Every query path additionally scopes by api_key_id, making cross-tenant data access a structural impossibility rather than an application-layer check.

SQL is executed exclusively through parameterized queries (Knex on the Node tier, sqlx on the Rust tier). String concatenation into queries is not part of the codebase.

Infrastructure hardening

Services run on AWS Fargate in us-west-2, distributed across 2–4 availability zones depending on service. Secrets are resolved at container start from AWS SSM Parameter Store — credentials are never committed to source control or baked into container images. Deployments use an ECS circuit breaker with automatic rollback, so a failed rollout reverts rather than leaving the cluster in a broken state.

Uptime Kuma performs synthetic health checks against each service. Structured JSON logs stream to CloudWatch with a request ID propagated across every service hop for distributed tracing.

Access controls

API keys are hashed with SHA-256 on creation; the raw key is shown once to the user and never persisted. New API keys enter a gated approval workflow — keys in a pending state cannot be used for production traffic until explicitly approved.

Dashboard access uses role-based permissions with session cookies that are HTTP-only and SameSite=Lax. Rate limiting is applied per-IP and per-company via a Redis sliding window, and Cloudflare Turnstile blocks automated registration attempts. CSRF protection uses a double-submit cookie pattern on dashboard mutations.

Compliance alignment

Designed to help you comply

We are designed to help you meet the following frameworks. eConsent helps your program meet these requirements — we are not ourselves certified under them.

TCPA — 47 CFR 64.1200

Aligned

The TCPA requires prior express written consent before placing automated calls or sending SMS. Our Voice and SMS compliance chains capture the consent event, the disclosure language, the channel, and the identified seller, and produce a signed certificate that documents the required elements.

FCC — February 2024 Order

Aligned

The FCC's February 2024 declaratory ruling classified AI-generated voices as "artificial" under the TCPA, requiring consent. Our Voice classifier flags AI-generated audio and records that determination on the certificate so you can prove your consent framework accounted for it.

FCC — August 2024 NPRM

Aligned

The FCC's August 2024 NPRM addresses revocation of consent: any reasonable method must be honored and must propagate across channels. Our revocation pipeline accepts inbound revocations via portal, API, and CSV, and updates downstream consent state in real time with an auditable trail.

CTIA Messaging Principles

Aligned

CTIA's Messaging Principles and Best Practices define what carriers expect from senders. Our SMS pre-send compliance checks evaluate opt-in provenance, required disclosures (HELP, STOP), and prohibited-content categories prior to handoff to a messaging aggregator.

10DLC Campaign Registry

Compatible

Certificates generated by eConsent capture the fields required to substantiate opt-in for 10DLC campaign registration, including the channel of origin, disclosure text, consumer identifier, and timestamp.

FTC Telemarketing Sales Rule

Compatible

The FTC TSR imposes additional consent and disclosure requirements on telemarketers. Our certificate schema records seller identity, goods or services offered, and the written consent language the consumer saw — the artifacts an FTC inquiry typically asks for.

A note on language. "Aligned with" and "compatible with" are intentional. eConsent is not itself certified under any of the frameworks on this page. What we provide is tooling designed to help your program meet the requirements of these frameworks. Certification, where it exists for your organization, remains your responsibility.
Data handling & privacy

Where your data lives and how it's handled

Retention

  • 7-year default retention for consent certificates, matching the TCPA statute of limitations with buffer.
  • Configurable retention for session recordings from 1 hour up to 7 years, per property.
  • Immediate deletion API — customers can purge covered records on request.
  • Voice audio retained in S3 Object Lock COMPLIANCE mode — immutable for its retention window, including to eConsent staff.

Where data lives

  • Primary region: AWS us-west-2 (Oregon).
  • Customer scope: US-based customers at this time. Cross-border transfer tooling will accompany any future expansion.
  • Edge: CloudFront terminates TLS 1.2+ and fronts API and static assets.
  • Phone number handling: stored as SHA-256 hashes in contexts where the raw value is not required.

Subprocessors

Third-party services that process customer data on our behalf.

AWS
Infrastructure
MongoDB Atlas
Audit logs, sessions
Redis Cloud
Cache, rate limits
Stripe
Billing
SendGrid
Transactional email
Sentry
Error tracking
PostHog
Product analytics
Privacy Policy → Full subprocessors list → DPA available on request to enterprise customers — security@econsent.org
Roadmap

Our security roadmap

Trust is earned through transparency about what we have and what we're still working on. Here's what's on the path forward.

In progress

SOC 2 Type I evaluation & third-party penetration test

Evaluating Vanta for SOC 2 Type I readiness. Third-party penetration testing engagement is being scoped alongside it.

Q3 2026

Formal SLA publication & HIPAA BAA availability

Publish a formal uptime and incident-response SLA. Offer HIPAA Business Associate Agreements to qualifying healthcare customers.

2027

SOC 2 Type II

Observation-window audit for SOC 2 Type II, following Type I attestation.

Transparency

Verify for yourself

Trust is verifiable or it isn't trust. Here's how to check our work.

Live status page

Real-time uptime and incident history for every service, powered by Uptime Kuma synthetic health checks.

status.econsent.org

Public certificate verification

Paste any eConsent certificate ID and we'll verify its HMAC-SHA256 signature, retention status, and revocation state — without requiring an account.

econsent.org/certificate

Responsible disclosure

Report vulnerabilities to security@econsent.org. We acknowledge all reports within 48 hours and provide remediation timelines as part of that response.

Please do not test against other customers' data, do not attempt denial-of-service, and do not publish findings before we've had a chance to remediate.

Questions? Talk to our team.

Security reviews, vendor questionnaires, DPA requests, architecture deep-dives — reach our security team directly.

Review our Privacy Policy · Terms · DPA · Subprocessors

See eConsent in action. Schedule a live demo
Schedule a demo