Architecture, controls, and disclosure policy for enterprise IT teams ยท Last reviewed: 29 March 2026
Session response data is never written to EngageLive's servers. Firebase is used only for transit, with automatic deletion on session end.
Full DPA available. Data processed within EU (Hostinger Lithuania) and Singapore (Firebase). SCCs in place for transfers.
CSP, HSTS, X-Frame-Options, X-Content-Type-Options, Referrer-Policy and Permissions-Policy deployed on all pages.
No Google Analytics, no Facebook Pixel, no session recording, no behavioural profiling. Ads are optional and removable.
All connections enforced over TLS 1.2+. HSTS preload enabled. Firebase uses WSS. Payment pages use provider SSL.
No card data ever touches EngageLive servers. All payments processed by PayPal (PCI DSS Level 1) or PayU (PCI DSS compliant).
Understanding where data travels is essential for IT risk assessment. EngageLive is architecturally simple:
What is stored on EngageLive's servers (Hostinger, Lithuania EU):
What is never stored on any server: poll responses, quiz answers, participant names, Q&A content, word cloud submissions, session codes, branding configuration, activity content created by hosts.
| Control | Status | Details |
|---|---|---|
| TLS / HTTPS | โ Enforced | TLS 1.2+ mandatory, HTTP permanently redirected. HSTS max-age 1 year with preload. |
| Content Security Policy | โ Deployed | Strict CSP restricts script execution to known origins. Inline scripts permitted only for session functionality. |
| X-Frame-Options | โ SAMEORIGIN | Prevents clickjacking via iframe embedding from third-party domains. |
| HSTS | โ 1 year + preload | Strict-Transport-Security: max-age=31536000; includeSubDomains; preload |
| Referrer Policy | โ strict-origin | Only origin (not path) sent in Referer header to third parties. |
| Permissions Policy | โ Minimal | Camera, microphone, geolocation, USB, Bluetooth all disabled. |
| Directory Listing | โ Disabled | Options -Indexes in .htaccess. No server directory browsing. |
| Config File Access | โ Blocked | config.php blocked from web access via .htaccess FilesMatch. |
| SQL Injection | โ N/A | EngageLive uses no SQL database. All storage is JSON files or Firebase. |
| XSS Prevention | โ Escaped | All user input is HTML-escaped via htmlspecialchars() server-side and esc() client-side before rendering. |
| CSRF | โ Token-based | Payment endpoints use HMAC-signed server tokens. Admin panel uses session authentication. |
| Admin Panel | โ Auth required | Admin panel requires password authentication. Session cookie is HttpOnly and Secure. |
| PHP Version | โ PHP 7.4+ | Hosted on Hostinger with current PHP version. display_errors disabled in production. |
| Payment Card Data | โ Never stored | Card data processed directly by PayPal/PayU. EngageLive servers never receive or store card numbers. |
| Cookie Security | โ Secure flags | Admin session cookie: HttpOnly=1, Secure=1, SameSite=Strict. No tracking cookies set. |
| Penetration Testing | โ ๏ธ Planned | External penetration test scheduled for Q3 2026. Results will be published in this section. |
| SOC 2 | โ ๏ธ In progress | SOC 2 Type I audit in preparation. Expected Q4 2026. GDPR DPA available now โ see DPA page. |
In the event of a confirmed security incident affecting personal data:
Security incidents can be reported to security@postlister.com. Response within 24 hours on business days.
We welcome security researchers to responsibly disclose vulnerabilities in EngageLive. We follow coordinated disclosure principles and will not take legal action against researchers who follow these guidelines.
To report a vulnerability: Email security@postlister.com with a description of the issue, steps to reproduce, and potential impact. Use our PGP key for sensitive reports (key available on request).
We commit to: Acknowledge receipt within 48 hours ยท Provide a remediation timeline within 10 business days ยท Credit researchers in our acknowledgments (below) unless they prefer anonymity ยท Not pursue legal action for good-faith research.
Scope: postlister.com, engagelive (all paths), Firebase security rules. Out of scope: third-party services (Firebase, PayPal, Hostinger infrastructure), social engineering.
We thank the following researchers for responsible disclosure (none to date โ this section will be updated as the programme matures).
Common enterprise IT questions about EngageLive:
| Question | Answer |
|---|---|
| Does the app store participant responses on your servers? | No. Responses pass through Firebase in real-time and are auto-deleted at session end. Never stored on EngageLive servers. |
| Can we use EngageLive without exposing employee emails to the vendor? | Yes. Host email is stored only in the host's own browser localStorage. It is sent to EngageLive servers only when purchasing a paid plan (for purchase record). Free sessions: email never leaves the browser. |
| Does EngageLive use cookies for tracking? | No. No analytics or advertising cookies. See Cookie Policy. |
| Is there a signed DPA available? | Yes. Available at engagelive/dpa.html. Counter-signed within 2 business days. |
| Where are servers located? | Application: Hostinger Lithuania (EU). Real-time messaging: Firebase Singapore. See DPA for full sub-processor list. |
| Is the app accessible for users with disabilities? | WCAG 2.1 AA target. Accessibility statement at engagelive/accessibility.html. |
| Can we whitelist the domains needed? | Yes. Required: postlister.com, *.firebaseio.com, *.googleapis.com, fonts.gstatic.com. Optional (payments): paypal.com, secure.payu.in. Optional (ads, removable): pagead2.googlesyndication.com. |
| Is there an SSO / SAML integration? | Not currently. Enterprise SSO integration (Azure AD, Okta, Google Workspace) is on the roadmap. Contact support@postlister.com. |
| What is your uptime SLA? | EngageLive depends on Hostinger's uptime (99.9% SLA) and Firebase's uptime (99.95% SLA). Enterprise SLA agreements available on request. |
| Do you have SOC 2 / ISO 27001? | SOC 2 Type I audit in preparation (target Q4 2026). GDPR DPA and this security documentation are available now. Contact security@postlister.com for our security questionnaire response. |
For IT department queries, vendor assessment questionnaires, or enterprise deployment support: support@postlister.com