Trust Center

Security, privacy, compliance, and data handling documentation for Abundera Sign. We believe transparency builds trust.

🔒 Security Overview

How we protect your documents and data at every layer.

  • Cloudflare Pages + Workers (edge-deployed, no origin server)
  • All data encrypted in transit (TLS 1.3) and at rest
  • 256-bit CSPRNG tokens, SHA-256 hashed (never stored raw)
  • Hash-chained audit trail — tamper detection is automatic
  • AWS KMS (FIPS 140-2 Level 3) for document signing keys
  • JWT + JWKS authentication with product-scoped API keys
  • Rate limiting (IP + user), CORS, body size limits
  • 9 independent verification anchors per envelope

🕵 Privacy & Data Handling

What we collect, why, and how we handle it.

  • Signer email, name, IP, and user agent recorded for evidence
  • Optional features (photo, GPS, audio, video) are opt-in and consent-gated
  • Evidence data stored in sealed WORM buckets — not modifiable after sealing
  • No third-party analytics or tracking on signing pages
  • AI summaries processed via Cloudflare Workers AI (no external LLM calls)
  • Signing pages do not set cookies or use fingerprinting
  • Privacy policy: abundera.ai/privacy

📅 Retention & Deletion

How long we keep documents and how deletion works.

  • Starter: 3-year WORM retention
  • Professional: 7-year WORM retention
  • Business: Configurable up to 99 years
  • WORM (Write Once Read Many) storage — evidence packages immutable after sealing
  • Automated retention cron purges expired packages
  • Archived envelopes excluded by default, recoverable before purge
  • Demo envelopes: 90-day retention in separate WORM bucket

🌐 Subprocessors

Third-party services that process data on our behalf.

  • Cloudflare — hosting, CDN, D1 database, KV storage, R2 object storage, Workers AI
  • ZeptoMail (Zoho) — transactional email delivery (primary)
  • Resend — transactional email delivery (fallback)
  • Twilio — SMS OTP delivery
  • SSL.com + DigiCert — RFC 3161 timestamp authorities
  • Veriff — government ID verification (optional)
  • AWS KMS — hardware security module for signing keys
  • GitHub — evidence anchoring (public commit)

Availability & Incident Response

How we keep the service running and handle incidents.

  • Deployed on Cloudflare's global edge network (300+ cities)
  • Business plan: 99.9% SLA
  • Health endpoint: /api/v1/health (checks D1, KV, R2)
  • Dual email provider failover (ZeptoMail → Resend)
  • Email retry queue with automatic re-delivery (up to 3 attempts)
  • Dual RFC 3161 TSA redundancy (SSL.com + DigiCert)
  • Graceful degradation — optional anchors fail independently

Legal & Compliance

Regulatory framework and legal standards we support.

  • ESIGN Act (15 U.S.C. § 7001) compliant
  • UETA (Uniform Electronic Transactions Act) compliant
  • PAdES-LTA digital signatures (ETSI EN 319 142)
  • RFC 3161 trusted timestamps (IETF standard)
  • Court-ready Declaration of Custodian of Records (FRE 803(6), 901(b)(9), 902(11), 902(14))
  • WORM storage for evidence immutability
  • Terms of service: abundera.ai/terms

📨 Contact Security / Report Vulnerability

Found a security issue? We take responsible disclosure seriously.

Security contact: security@abundera.ai

General support: support@abundera.ai

Abundera Sign provides technical and evidentiary records. Admissibility, sufficiency, and litigation strategy depend on jurisdiction, facts, and counsel.