<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=1071242&amp;fmt=gif">
Security

Data Management & Security Practices

Striving to become familiar with the digital practices of each software and service providers you work with is a great practice, but it isn't always easy.

When it comes to entrusting an online voting partner with personal information, such as names, emails, and phone numbers – we believe it’s a must.

We’re here to ensure your organization’s peace of mind. Our multiple levels of security are detailed below.

Data Storage, Management, and Backup

AdobeStock_136283864

Your data will be safely stored with Amazon Web Services (AWS), our cloud-based data partner.

AWS is considered best in class for their storage, maintenance, monitoring, and data purging technologies. It's used by thousands of prominent organizations all over the world (NFL, Netflix, American Heart Association, and Formula One to name a few).

Security Assessments and Technology Certifications

Third-party assessments and certifications are an integral protection mechanism for any digital business.

Thousands of eBallot customers are protected each day by our cybersecurity partners who keep a watchful eye on our products, services, and practices.

lock-icon
SSL Domain & Data Encryption

SSL certificates allow for data (like vote responses) to be transmitted and stored securely.

  • They provide encrypted communications between our websites and your internet browser.
  • Abiding by this protocol is essential for safely submitting sensitive information (e.g. credit card details, passwords) over the internet.
  • Our SSL certification is updated yearly.
McAfee-icon
McAfee Secure

To earn the McAfee Secure certification, our network and applications must routinely undergo audits that ensure:

  • No malware and malicious links
  • No phishing
  • No exploitable weaknesses
  • A valid SSL certificate
  • Shopper identity protection
SOC-icon
SOC I + II Compliance

This is a customer data management audit. SOC I + II security assessment reports evaluate our information systems as they relate to security, availability, processing integrity, and confidentiality.

list-icon

Hyperion Audit

The Hyperion Audit ensures daily network and application scans.

trust-icon
TrustArc Certified

Particularly relevant to EU nations, Truste provides a thorough review and assessment of our site and applications for vulnerabilities.

Additional Security Items

disaster-recovery-custom-data-setups

Disaster Recovery

Our recovery procedures ensure that your data is accessible, even in the event of a disaster.


Custom Data Setups

We're happy to work with clients on an individual basis to meet your data backup requirements. For more information about our standard and custom data setups, contact us.

gdpr-compliance

GDPR Compliance (European Union)

As a data processor, we follow standard GDPR rules & regulations, as mandated by the EU, on how to handle data originating from the EU.

Specifically, we adhere to the Privacy Shield Principles that apply to Swiss and EU resident data.

For more details visit Section 19 of our Terms of Use, Section 3 of our Privacy Policy, or contact us.

Have a question about our security practices?

Let us know.