Constant Contact considers data security of the utmost importance and takes many steps to maintain data integrity.
This article will detail how Constant Contact protects data.
Constant Contact routinely audits the application, infrastructure, and security in effort to maintain a safe and secure service. The audits involved are as follows:
Constant Contact goes through a quarterly PCI audit
Constant Contact infrastructure and development deployments—
As both a Salesforce and Google partner, Constant Contact
Constant Contact performs routine security audits on all servers and applies security updates as they are made available.
Constant Contact makes a point to practice safety in the digital sphere. This safety starts and ends with data security. The ways that Constant Contact practice data safety include:
|Data in Transit||
All sensitive data shared between the application, extranet,
|Data at Rest||
Credentials are stored in an encrypted on-disk format to
Constant Contact uses a redundant server architecture (which
Constant Contact's backup procedures follow the basic rules of the CIA triad: confidentiality, integrity, and availability.