How We Prove Your Website Is Compliant — The Technology Behind Our Verification
When we tell a client their website is compliant, we don't expect them to take our word for it. We prove it — with the same kind of cryptographic evidence used in digital forensics, financial auditing, and federal court proceedings.
Here's how it works, and why it matters for your business.
The Problem With "Trust Us, You're Compliant"
Most compliance services hand you a report — a PDF, a dashboard screenshot, maybe a badge for your website. But what happens if that report is questioned six months later? What if someone claims the results were altered, the scan was fabricated, or the evidence was manipulated after the fact?
A PDF can be edited. A screenshot can be doctored. A dashboard can show whatever the software is configured to display. None of these prove what your website actually looked like at a specific point in time.
That's why we built our verification system around cryptographic proof instead of trust.
What SHA-256 Actually Does
SHA-256 is a cryptographic hash function — a mathematical process that takes any piece of data and produces a unique 64-character fingerprint. It's part of the SHA-2 family published by the National Institute of Standards and Technology (NIST) under FIPS 180-4, and it's the same algorithm used to secure everything from banking transactions to blockchain networks.
The key properties that make it useful for compliance verification:
It's deterministic. The same input always produces the same hash. If we scan your website today and capture a screenshot, that file will always produce the exact same 64-character string.
It's sensitive to change. Alter a single pixel in a screenshot, change one character in a network log, or modify a timestamp by one second, and the resulting hash is completely different. There's no such thing as a small change — any modification produces an entirely new fingerprint.
It's practically irreversible. You can't work backward from the hash to reconstruct the original data. The hash proves what the data is, but it doesn't expose the data itself.
It's collision-resistant. The odds of two different files producing the same hash are so astronomically small that it's considered computationally impossible. Each hash is effectively unique to the data it represents.
How We Apply It to Your Compliance Monitoring
Every time we scan your website — whether it's the initial audit, a post-remediation verification, or a routine monitoring check — our system captures a comprehensive evidence package. This includes the rendered page content, all network activity during the page load, every cookie and tracker present, screenshot documentation, and the results of our accessibility analysis.
Each file in that package is individually hashed using SHA-256. Those hashes are recorded in a manifest file that becomes part of the sealed evidence archive. Think of it as a digital notary stamp on every piece of evidence we collect.
The manifest works like this: if anyone — including us — were to alter any file in the archive after collection, the stored hash would no longer match the file. The tampering would be immediately and mathematically detectable.
The Chain of Custody
Hashing alone tells you a file hasn't changed. But compliance verification also requires knowing when evidence was collected and how it's been handled since. That's where our chain-of-custody system comes in.
Every scan generates an entry in an append-only audit log. "Append-only" means entries can be added but never modified or deleted. The log records when each scan was conducted, what was collected, and how the evidence has been stored and accessed. This mirrors the evidentiary chain-of-custody practices used in digital forensics and legal proceedings.
The combination of per-file SHA-256 hashing and an append-only chain-of-custody log means that at any point in the future, we can demonstrate exactly what your website looked like on any given date, and prove that the evidence hasn't been tampered with since collection.
Why This Matters for Your Business
There are three scenarios where cryptographically verified compliance records deliver real value:
After remediation. When we fix your website's compliance issues, the verification scan creates a permanent, tamper-proof record showing that the barriers have been resolved. This isn't just a report saying "we fixed it" — it's mathematically verifiable proof that your site was clean on a specific date.
During ongoing monitoring. Every monitoring scan adds to a longitudinal record of your compliance status. Over time, this builds a documented history showing that your website has maintained its compliance posture. If something regresses — a plugin update introduces a new accessibility barrier, or a third-party script starts dropping cookies before consent — the monitoring record catches it and documents when the change occurred.
If your compliance is ever questioned. Whether it's a customer complaint, a regulatory inquiry, or a legal claim, having forensic-grade documentation of your compliance status is qualitatively different from having a report that someone could argue was generated after the fact. The SHA-256 hashes prove the evidence is authentic. The chain of custody proves it hasn't been altered. The timestamps prove when the scans were conducted.
What's in an Evidence Package
Each compliance scan we run produces a sealed archive containing:
- Page content — a complete record of your website as rendered at the time of the scan, including all HTML, CSS, and JavaScript output.
- Network activity log — every connection your website makes during a page load, including which third-party services receive data and when.
- Cookie and tracker inventory — a full listing of all cookies, pixels, and tracking technologies present, with timing data showing whether they activate before or after user consent.
- Visual documentation — screenshots captured at key stages of the page load, providing visual proof of what a visitor would see.
- Accessibility analysis — the results of our WCAG 2.1 Level AA evaluation, identifying any remaining barriers.
- SHA-256 manifest — the cryptographic hash of every file in the archive, enabling tamper detection at any time.
- Chain-of-custody entry — the audit record documenting when this scan was conducted and how the evidence has been handled.
All of this is bundled into a single archive and preserved. For monitoring clients, these archives accumulate over time, building a compliance history that grows more valuable with each scan.
The RCP Certificate
For clients who complete our Full Compliance remediation, the verification scan is what backs the RCP (Remediated Compliance Profile) Certificate. The certificate isn't just a badge — it's anchored to a specific verification scan with its own SHA-256 manifest and chain-of-custody record. The certificate references the scan date and can be independently verified against the evidence archive.
This means the RCP Certificate isn't a marketing claim. It's a verifiable statement backed by cryptographic proof.
Compliance That Stands Up to Scrutiny
We designed our verification system this way because compliance is only meaningful if it can be proven. A report that can't withstand scrutiny isn't worth the paper — or the pixels — it's printed on.
SHA-256 hashing, append-only chain-of-custody logs, and sealed evidence archives aren't the easiest way to document compliance. But they're the most defensible way. And when your business's reputation and legal exposure are on the line, defensibility is what counts.
Learn about our compliance services →
APFCompliant provides website compliance assessment and remediation services. This article is for informational purposes and does not constitute legal advice. Consult with a qualified attorney regarding your specific legal obligations.
Check your compliance status
Request a free compliance assessment to see if you have CIPA, ADA, or VPPA issues on your website.
Request Free Assessment →