Security
Data Management & Security Practices
Security is the foundation of every trusted election. At eBallot, we protect the integrity of your vote through a multi-layered defense strategy—combining an Identity-First security architecture with End-to-End Verifiability (E2E-V).
Our platform is engineered to meet the rigorous demands of government, corporate, and non-profit organizations, ensuring every ballot is tamper-proof and fully compliant with SOC 2 Type II, GDPR, and LMRDA standards. From AES-256 encryption to AWS-backed infrastructure, we provide the technical assurance required for total peace of mind. Explore our core security pillars below.
Data Storage, Management, and Backup
Your data will be safely stored with Amazon Web Services (AWS), our cloud-based data partner.
AWS is considered best in class for their storage, maintenance, monitoring, and data purging technologies. It's used by thousands of prominent organizations all over the world (NFL, Netflix, American Heart Association, and Formula One to name a few).
Security Assessments and Technology Certifications
Third-party assessments and certifications are an integral protection mechanism for any digital business.
Thousands of
-
SSL Domain & Data Encryption
SSL certificates allow for data (like vote responses) to be transmitted and stored securely.
- They provide encrypted communications between our websites and your internet browser.
- Abiding by this protocol is essential for safely submitting sensitive information (e.g. credit card details, passwords) over the internet.
- Our SSL certification is updated yearly.
-
McAfee Secure
To earn the McAfee Secure certification, our network and applications must routinely undergo audits that ensure:
- No malware and malicious links
- No phishing
- No exploitable weaknesses
- A valid SSL certificate
- Shopper identity protection
-
SOC I + II Compliance
This is a customer data management audit. SOC I + II security assessment reports evaluate our information systems as they relate to security, availability, processing integrity, and confidentiality.
-
TrustArc Certified
Particularly relevant to EU nations, Truste provides a thorough review and assessment of our site and applications for vulnerabilities.
Additional Security Items
Disaster Recovery
Our recovery procedures ensure that your data is accessible, even in the event of a disaster.
Custom Data Setups
We're happy to work with clients on an individual basis to meet your data backup requirements. For more information about our standard and custom data setups, contact us.
GDPR Compliance (European Union)
As a data processor, we follow standard GDPR rules & regulations, as mandated by the EU, on how to handle data originating from the EU.
Specifically, we adhere to the Privacy Shield Principles that apply to Swiss and EU resident data.
For more details visit Section 19 of our Terms of Use, Section 3 of our Privacy Policy, or contact us.