Security
Data Management & Security Practices
Security is not a feature, it is the foundation of the democratic process.
eBallot employs an Identity-first security architecture with end-to-end verifiability to ensure every election is temper-proof, audited, and compliant with global standards including SOC 1 & SOC 2, GDPR, and LMRDA. Below is a technical breakdown of the protocols we use to protect your organization's data and the integrity of every vote.
Core Infrastructure & Data Protection
Our Infrastructure is hardened via AWS WAF and Shield to mitigate Layer 7 and DDoS attacks, Ensuring 99.9% uptime during high-traffic election windows.
eBallot follows a strict Data Minimization policy. Customer data is encrypted at rest using AES-256 and is purged following the retention period .
We provide a trustworthy ecosystem through End-to-End Verifiability (E2E-V) and rigorous third-party validation. Our E2E-V protocols use verifiable methods that enable each ballot to be independently confirmed as cast, recorded, and tallied as intended, providing transparency and strong assurance that the final results accurately reflect the votes submitted.
Security Quick-Specs:
Encryption: AES-256 (At-Rest), TLS 1.3 (In-Transit).
Auditability: Immutable Administrator Fingerprint Reports & Voter Audit Logs.
Infrastructure: 100% US-Based AWS Data Centers (East/West Redundancy).
Identity: Support for SSO (SAML 2.0) and Multi-Factor Authentication (MFA).
Legal: Compliant with LMRDA (Labor), GDPR (Privacy), & Section 508 (Accessibility).
Third party Audit: Halo Securities Firewall monitoring
Penetration Testing: Regular third-party penetration testing to identify and remediate potential vulnerabilities before they can be exploited.
Security Assessment & Technology Certifications
Third-party assessment and certifications are an integral protection mechanism for any digital business.
Thousands of eBallot customers are protected each day by our cybersecurity partners who monitor our products, services, and practices.
| Certification/Standard | Status | What it Means for You |
|---|---|---|
SOC 1 & SOC 2 |
Certified |
Our internal controls for security, availability, and confidentiality are independently audited annually. |
ISO/IEC 27001 |
Aligned |
Our information security management system (ISMS) follows the highest international best practice. |
GDPR |
Compliant |
We respect "The Right To Be Forgotten" and provide full data probability and provacy protection for global users |
LMRDA (Section 401) |
Supported |
Our platform architecture specifically meets the US Department of Labor's requirements for union officer elections. |
SSL Domain & Data Encryption |
Certified |
SSL certificates allow for data to be transmitted and stored securely. It is essential for safely submitting sensitive information. |
McAfee Secure |
Certified |
To maintain this certification, Our network must routinely undergo audits to ensure no Malware & malicious links, No Phishing, & No weaknesses. |
Data Privacy Framework |
Certified |
Reliable mechanism for personal data transfers to the United States from and fully compliant with EU, UK, and Swiss Law. |
TRUSTe Verified Privacy |
Certified |
Our privacy programs, policies, and practices meet the requirements of EU-US and/or Swiss-U.S. Data Privacy Framework Principles |
Additional Security Items
Disaster Recovery
Our recovery procedures ensure that your data is accessible, even in the event of a disaster.
Custom Data Setups
We're happy to work with clients on an individual basis to meet your data backup requirements. For more information about our standard and custom data setups, contact us.c
GDPR Compliance (European Union)
As a data processor, we follow standard GDPR rules & regulations, as mandated by the EU, on how to handle data originating from the EU.
Specifically, we adhere to the Privacy Shield Principles that apply to Swiss and EU resident data.
For more details visit Section 19 of our Terms of Use, Section 3 of our Privacy Policy, or contact us.