Solutions by Regulation

Eliminate Hidden “Wiretap” Risks on Your Website

Recording user sessions or chats is considered illegal wiretapping in some states. Vault provides independent, third-party monitoring that continuously identifies and helps fix these stealth risks. It’s how we ensure you don’t inadvertently violate California’s CIPA, the federal ECPA, or Pennsylvania’s Wiretap Act.

Solutions for CIPA

Old Wiretapping Laws Create New Privacy Risks

A wave of lawsuits is exploiting old wiretapping and eavesdropping laws to target websites that use session replay tools (which record clicks/keystrokes), web trackers, such as Meta Pixel, or even website chat widgets. Claiming these tools intercept user communications without consent, plaintiffs are forcing companies to settle or risk huge statutory damages.

Flo logo

$59.5 Million Settlement

Flo Health agreed to pay $59.5 million to resolve claims that its tracking tools shared sensitive user health data with third parties without consent, highlighting how analytics tools can trigger CIPA violations.

Oracle logo

$115 Million Tracking Settlement

Oracle agreed to a proposed $115 million class action settlement over allegations that it tracked and sold individuals’ online and offline data without proper consent, reinforcing the growing legal risk around web tracking technologies.

Adena Health logo

$17.8 Pixel Lawsuit Settlement

Adena Health agreed to pay $17.8 million to settle claims that its use of Meta Pixel exposed patient data, underscoring how healthcare website tracking can lead to significant liability under privacy and wiretapping laws.

How Vault JS Supports CIPA Compliance

Icon

Understand Vendors

Detects and classifies CIPA risks of third-party vendors on your website.

Icon

Session Replay Detector

Detects high-risk vendors like Hotjar, FullStory, Decibel, and others.

Icon

Consent & Disclosure Coach

Vault checks your site for a proper user consent disclosure.

Icon

Geolocation Rules

Vault adjusts its monitoring based on the user's location.

Icon

Chat & Input Monitoring

Vault monitors keystroke logging, live chat, lead gen verification, and marketing pixels.

Icon

Defense Documentation

Helps you prove good-faith efforts in legal actions.

Key CIPA Compliance Capabilities

How we manage risk in a changing environment

Comprehensive Script Scan

Vault identifies all third-party and embedded scripts on your website and analyzes their runtime behavior to determine whether they capture user communications or transmit data in ways that create CIPA or ECPA exposure.

Interactive Content Analysis

Vault evaluates how interactive elements capture and transmit user input and whether communications are recorded, shared, or intercepted in ways that may trigger CIPA or ECPA consent and disclosure requirements.

Privacy Notice Scanner

Privacy Notice Scanner reviews your website’s disclosures to assess whether tracking, session replay, chat monitoring, and third-party data sharing are clearly and accurately described.

Mitigation Workflow

Mitigation Workflow guides teams from risk detection to resolution with structured remediation steps, ownership tracking, and documentation. It helps maintain defensible records of corrective actions to remain compliant with CIPA and ECPA.

Benchmarking

Benchmarking compares your website’s tracking and communication-capture practices against industry norms and enforcement trends. It helps teams understand how various technologies align with peer organizations and regulatory expectations.

Frequently Asked Questions

CIPA (California Invasion of Privacy Act) is a California wiretapping law that prohibits recording or intercepting communications without consent from all parties. Written decades ago for telephone tapping, plaintiffs now argue it applies to digital interactions on websites and mobile apps. The legal theory asserts that modern tracking technologies that transmit user interactions to third parties in real time without consent are engaging in unlawful interception under CIPA. Because the statute allows significant per-violation damages, it has become a popular basis for class-action lawsuits.

The Electronic Communications Privacy Act (ECPA) is a federal law that prohibits the unauthorized interception, disclosure, or use of electronic communications. It includes the Federal Wiretap Act and applies to communications such as website chats, form submissions, emails, and other online interactions. For businesses, risk arises when tracking tools, session replay software, chat widgets, or analytics scripts capture and transmit user communications to third parties without proper consent. Violations can lead to civil lawsuits, statutory damages, attorneys’ fees, and, in some cases, criminal liability.

Session replay is a technology that records and reconstructs a user’s interactions on a website or app. It captures clicks, scrolls, keystrokes, page changes, and sometimes form inputs, then recreates the session in a visual playback interface for analytics or troubleshooting. It is considered an interception because the data is often transmitted in real time to a third-party vendor. In lawsuits, plaintiffs argue that when a user’s interactions are duplicated and sent to an external service without clear consent, that vendor becomes an eavesdropper rather than a participant.

A website chat feature raises wiretap concerns when user messages are sent to a third party without clear disclosure and consent, and whether the vendor is a direct participant in the conversation or an outside interceptor. Clear disclosure, proper consent, and tight vendor controls are the core safeguards.

To avoid wiretap issues, provide clear notice before the chat begins and obtain affirmative consent where required, especially in two-party consent states like California. Ensure the vendor operates strictly as your service provider under a signed data processing agreement, with no independent use of the data. And limit retention and test the setup to confirm transcripts aren’t shared beyond the intended provider.

Think of two-party consent as all-party consent, since these states require consent from everyone involved before a communication can be recorded or intercepted. As of February 2026, the primary all-party consent states are: California, Florida, Illinois, Maryland, Massachusetts, Michigan (as interpreted by some courts), Montana, Nevada, New Hampshire, Pennsylvania, and Washington.

Plaintiffs in these states have argued that session replay tools, chat transcripts, and certain tracking technologies may constitute unlawful interception if consent is not clearly obtained.

Yes, some session replay cases have been dismissed, particularly at early stages, for lack of standing, insufficient factual allegations, or failure to show that a third party truly intercepted a communication under the statute. Other cases, however, have moved into discovery, and courts have allowed plaintiffs to proceed if there is a plausible allegation of real-time transmission of user interactions to external vendors without clear consent.

The federal Wiretap Act may apply. The statute prohibits intentional interception of electronic communications, and plaintiffs have invoked it in cases involving session replay tools, chat features, and other tracking technologies. However, lawsuits are more likely to rely on state wiretap laws because state statutes may offer clearer private rights of action or statutory damages. State courts have also been more active venues for these claims. But in practice, a single implementation can trigger both federal and state wiretap theories, depending on how data is captured, transmitted, and disclosed.

Vault distinguishes “contents” from metadata by analyzing what’s actually transmitted, not just which domains are contacted. Vault captures and inspects network requests and responses, including URLs, headers, query parameters, and request bodies. If a script sends user-generated text (chat messages, form inputs, typed keystrokes), page content (DOM text/HTML snippets), or detailed interaction streams that reconstruct what a user did or said, Vault can flag it as a potential content capture.

Yes. Disabling session replay does not mean you lose all analytics. Session replay captures detailed interaction streams that can reconstruct individual user sessions. Standard analytics, by contrast, focus on aggregated behavior — page views, referrers, device types, conversion events, bounce rates, and funnel progression. You can still measure traffic, engagement, and performance without recording keystrokes, chat transcripts, or granular interaction playback.

Action can begin immediately. Vault surfaces findings in real time or near real time, depending on how frequently scans are configured. When a serious issue is detected, such as unauthorized transmission of user-generated content, alerts can be routed directly to legal, security, or engineering teams. Because Vault identifies the specific script, endpoint, and data payload involved, remediation can be targeted. Teams can disable a tag, block a domain, adjust consent gating, or modify configuration without waiting for a full audit cycle.

Eliminate Hidden “Wiretap” Risks on Your Website.