build 2.4.5 · aes-256-gcm / ml-kem-768 · eu/de · ram only
REGULATED · EU 2019/1937 · WHISTLEBLOWER

Whistleblower channel, EU Directive compliant.

EU Directive 2019/1937 requires organisations with 50+ employees to run a confidential internal reporting channel. Most implementations store the submission in a database accessible to IT admins. That is not confidential delivery.

The requirement

What the Directive actually mandates.

Article 9 of EU Directive 2019/1937 requires: (a) a channel that ensures the confidentiality of the identity of the reporting person and any third parties mentioned in the report; (b) written acknowledgment of receipt within seven days; (c) diligent follow-up within three months. Recital 85 is explicit: "confidential" means technical confidentiality — not just a policy statement, but encryption at rest and in transit that prevents unauthorized access.

Most vendor implementations are web forms that write the submission to a database. That database is accessible to the IT team that administers the system, to the vendor under their hosting terms, and potentially to law enforcement through the hosting provider's jurisdiction. None of these satisfy the technical confidentiality requirement in Recital 85.

What Paramant delivers

Technically confidential delivery.

The reporting person uploads their report (a document, a file, a voice recording) via a one-time ParaShare link generated by the compliance officer. Paramant encrypts the upload with ML-KEM-768 + AES-256-GCM. The relay holds only the ciphertext; only the designated compliance officer's account can decrypt. After the officer downloads, the relay wipes the ciphertext from RAM. The ML-DSA-65 receipt records that a delivery occurred — not what was delivered, and not who sent it.

Paramant does not log the identity of senders. The reporting person shares no personal data with Paramant beyond the technical metadata of an HTTPS request. The relay is a zero-knowledge intermediary.

Compliance mapping

EU 2019/1937 article-by-article.

RequirementParamant control
Art. 9(a) — Confidential channelML-KEM-768 end-to-end; relay holds only ciphertext; cannot decrypt
Art. 9(a) — Access limited to authorised personnelOne-time link, burn-on-read; only the designated recipient can download
Art. 9(b) — Written acknowledgment within 7 daysML-DSA-65 signed receipt delivered within seconds of upload completion
Recital 85 — Reporter identity protectedNo sender identity logged; zero-knowledge relay; no PII retained by Paramant
GDPR Art. 32 — Technical security measuresFIPS 203/204 encryption; EU/DE hosting; RAM-only relay; no persistent storage
Workflow

How the channel operates.

01
Compliance officer generates a one-time upload link via ParaShare and distributes it through the internal reporting channel
02
Reporter accesses the link and uploads their report document — no account required, no identity logged
03
Only the compliance officer can decrypt and download the report
04
After download, the relay wipes the ciphertext from RAM — no persistent copy anywhere on the infrastructure
05
ML-DSA-65 receipt is generated automatically, satisfying the 7-day acknowledgment requirement (Art. 9(b))
Honest limits

What Paramant does not replace.

Paramant handles the secure delivery channel. It does not provide the case management workflow required for Article 9(c) follow-up, the policies required for Article 6 (permitted reporting channels), or the legal advice required to assess whether a report constitutes a qualifying disclosure. Those require your legal team and, in most Member States, a designated Whistleblowing Officer with specific legal obligations. Paramant removes the weakest link — the delivery infrastructure — from the compliance picture.

Set up your compliant reporting channel.

Business plan includes multi-recipient delivery and audit log export. No annual contract required.

Create free account → Contact for Enterprise →

EU 2019/1937 · Zero-knowledge · No sender logging · EU/DE