Constant Contact considers data security of the utmost importance and takes many steps to maintain data integrity.
This article will detail how Constant Contact protects data.
Article Contents
Trial | ✓ | |
Essential | ✓ | |
Advanced | ✓ | |
Ultimate | ✓ |
Administrators | ✓ | |
Company Managers | ||
Marketing Managers | ||
Sales Managers | ||
Salespersons | ||
Jr. Salespersons |
Audits
Constant Contact routinely audits the application, infrastructure, and security in effort to maintain a safe and secure service. The audits involved are as follows:
Audit Type | Description | |
Application Audits |
Constant Contact goes through a quarterly PCI audit |
|
Infrastructure Audits |
Constant Contact infrastructure and development deployments— |
|
External Audits |
As both a Salesforce and Google partner, Constant Contact |
|
Security Audits |
Constant Contact performs routine security audits on all servers and applies security updates as they are made available. |
Data
Constant Contact makes a point to practice safety in the digital sphere. This safety starts and ends with data security. The ways that Constant Contact practice data safety include:
Data Type | Description | |
Data in Transit |
All sensitive data shared between the application, extranet, |
|
Data at Rest |
Credentials are stored in an encrypted on-disk format to |
|
Redundant Architecture |
Constant Contact uses a redundant server architecture (which |
|
Data Backup |
Constant Contact's backup procedures follow the basic rules of the CIA triad: confidentiality, integrity, and availability. |