Security and privacy
Securing our customers’ data is core to impact.com’s DNA and has always remained our top priority. Discover our advanced security and privacy measures to safeguard our users and data.
Our certifications
Our platform's data security certifications provide peace of mind that your information is protected.
SOC 1 type II
impact.com prioritizes data security with SOC 1 type II certification. This independent verification assures clients of the effectiveness of our internal controls over financial reporting.
ISO 27001:2022
Your data is secure at impact.com. We maintain ISO/IEC 27001:2022 certification, an internationally recognized standard for information security management. This means we have robust security practices in place to protect your data when you use our SaaS subscriptions.
PCI-DSS Level 4
impact.com is a PCI-DSS Level 4 Merchant and maintains its certifications through annual SAQ completion. This standard is designed to protect payment card information from unauthorized access, use, or disclosure.
Our security features
Recurring penetration testing
We prioritize user data security. We leverage independent, third-party experts to conduct comprehensive penetration testing of our web applications, mobile apps (Android/iOS), and underlying APIs. This rigorous testing process identifies and addresses potential vulnerabilities before they can be exploited.
Data encryption at rest
We safeguard your information with industry-leading encryption. All databases and backups are encrypted at rest using AES-256, the strongest block-level storage encryption standard available. This advanced technology ensures your data remains protected even in the event of a security breach.
Secure development process
Adhering to a secure development process is crucial for safeguarding digital assets. Our commitment to robust security includes a meticulous focus on addressing the OWASP Top 10 security risks. This ensures the highest standards of security in our software.
Audit trail and logging
For enhanced security, impact.com.com maintains a central logging platform that meticulously tracks all user access and actions within the system. These detailed logs are securely stored for a minimum of one year, allowing us to thoroughly investigate any potential security incidents and ensure ongoing accountability.
Secure infrastructure
At impact.com, your data benefits from the utmost protection. We leverage top-tier cloud service providers known for their rigorous security practices. All data centers storing impact.com’s data hold certifications like SOC 1, SOC 2, SOC 3, and ISO 27001. These certifications demonstrate their commitment to comprehensive security controls, data confidentiality, and ongoing system integrity.
Monitoring & alerting
At impact.com, we take a proactive approach to security. Our sophisticated monitoring and alerting systems are constantly on guard, scanning our network for anomalies and suspicious activity. This vigilance allows us to identify and address potential threats before they can escalate, ensuring the continued protection of your data.
Continuous backups
impact.com prioritizes data redundancy for complete peace of mind. We employ a comprehensive backup strategy, including continuous backups for ongoing data capture and weekly full backups. This robust system allows us to restore your data to any point within the past year, minimizing downtime and ensuring business continuity in the event of any unforeseen circumstances.
Data encrypted in transit
We prioritize the security of your information during transit. We leverage industry-standard HTTPS with TLS 1.2 or higher encryption to safeguard all data transmissions between your device and our web application. This robust encryption technology ensures that your sensitive data remains protected from unauthorized access.
Data segregation & security
Ironclad Data Segregation: We prioritize the strongest data security practices. We implement strict coding standards and rigorous code reviews to ensure customer data is logically separated within our system. Additionally, each customer record has a unique identifier, further enhancing data security and preventing any potential mix-ups.
Access management & controls
Strict Access Controls for Enhanced Security: At impact.com, we take your data privacy seriously. We adhere to the ‘principle of least privilege,’ ensuring that access to customer data is limited to authorized employees who require it for their specific job duties. Additionally, all system access is meticulously logged, providing an extra layer of accountability and security.
Thorough system management
At impact.com, we prioritize a smooth user experience. We have comprehensive change management controls in place, ensuring all system changes that directly impact our customers undergo rigorous planning and clear communication. This proactive approach keeps you informed and minimizes disruption to your workflow.
Mandatory training
Empowering a security-conscious c culture: At impact.com, we prioritize data security. All new employees undergo comprehensive security awareness training within their first month, equipping them with the knowledge to protect user data.
Employee background checks
Building trust from day one: At impact.com, we prioritize user trust and security. All new employees undergo a thorough background check before their first day, ensuring a reliable and trustworthy team environment for protecting your data.
Responsible disclosure
At impact.com, we take security very seriously. We believe in working together to maintain a secure environment for everyone. If you believe you’ve identified a potential vulnerability in our systems, we encourage you to disclose it responsibly through our dedicated program.
By visiting our responsible disclosure page, you can report the issue directly to our security team.
Our employees will only contact you through official company channels. We do not use platforms like WhatsApp or Telegram for official communications. Please use the information below to verify websites, platform URLs, support centers, and social media accounts.
impact.com
- Website: https://www.impact.com
- Platform URL(s): https://app.impact.com, https://api.impact.com, https://go.impact.com, https://pc.impact.com, https://pxa.impact.com, https://talent.impact.com/
- Support: https://help.impact.com, https://tshelp.impact.com
- Social Media:
LinkedIn: https://www.linkedin.com/company/impactdotcom,
Instagram: https://www.instagram.com/impactdotcom,
Facebook: https://www.facebook.com/impactdotcom1,
YouTube: https://www.youtube.com/c/impactdotcom,
TikTok: https://www.tiktok.com/@impactdotcom
Trackonomics
- Website: https://trackonomics.net/
- Platform URL(s): https://app.trackonomics.net/
- Support: Via Main Website
- Social Media: LinkedIn: https://www.linkedin.com/company/trackonomics, X (Twitter): https://x.com/TrackonomicsLtd, Facebook: https://www.facebook.com/Trackonomics-Ltd-189823258626928
SaaSquatch
- Website: https://www.saasquatch.com/
- Platform URL(s): https://app.saasquatch.com/
- Support: https://docs.saasquatch.com/
- Social Media: LinkedIn: https://www.linkedin.com/company/saasquatch
Pressboard
- Website: https://www.pressboardmedia.com/
- Platform URL(s): https://manage.studiostack.com/
- Support: https://help.pressboardmedia.com/
- Social Media: LinkedIn (Via Main Website)
Affluent
- Website: https://www.affluent.io/
- Platform URL(s): https://learn.affluent.io/
- Support: Via Main Website
- Social Media: LinkedIn, X (Twitter), and Facebook accounts are open but not active.
Activate by impact.com
- Website: N/A
- Platform URL(s): N/A
- Support: N/A
- Social Media: X (Twitter): https://x.com/activatesocial_ (Account is open with no activity). Facebook, Instagram, and LinkedIn accounts are closed.
Bloglovin
- Website: https://www.bloglovin.com/
- Platform URL(s): N/A
- Support: https://bloglovin.freshdesk.com/
- Social Media: Instagram: https://www.instagram.com/bloglovin/, Pinterest: https://www.pinterest.com/bloglovin/ (Accounts are open but not run by the impact.com social team).
This scam involves fraudsters impersonating impact.com or affiliate marketing companies to offer enticing part-time “jobs.”
How the Scam Unfolds:
- Initial Contact: Scammers contact you on WhatsApp, Telegram, or social media with an offer for simple online tasks (e.g., liking content, writing reviews).
- Building Trust: They give you small tasks and make small payments ($5 – $50) to appear legitimate, often collecting personal information under the guise of payment formalities.
- Escalation: They introduce higher-paying tasks that require you to “invest” your own money upfront, promising high returns (e.g., 20% or more).
- The Investment: You are directed to a fake platform where you make investments. Fake profits are shown to encourage you to invest more.
- The Loss: Your funds are suddenly frozen for fake reasons (e.g., “taxes” or “penalties”), and the scammers demand more money. Eventually, they cut off all communication, and your funds are lost.
Red Flags to Watch For:
- Unsolicited job offers via messaging apps from unknown contacts.
- Promises of unusually high returns with little to no risk.
- Any requirement to pay upfront for an earning opportunity.
- Pressure to act urgently on an investment.
- Directions to use unknown platforms for tasks.
- Any communication outside of official company channels.
- Requests for cryptocurrency payments.
If you suspect someone is impersonating impact.com or our related companies, please email us immediately at abuse@impact.com so we can investigate. You should also report the crime to the appropriate authorities in your country:
🇺🇸 United States
- Internet Crime Complaint Center (IC3)
- Report cyber crime to the Internet Crime Complaint Center (IC3)
🇬🇧 United Kingdom
- National Cyber Security Centre
- Action Fraud
- Report scams to the National Cyber Security Centre or to Action Fraud
🇪🇺 European Union
- Europol Cybercrime Reporting
- Find methods to report for your country on the Europol website
🇦🇺 Australia
- Australian Cyber Security Centre
- Report cyber crimes to the Australian Cyber Security Centre
🇨🇦 Canada
- Canadian Anti-Fraud Centre
- Report cyber crimes to the Canadian Anti-Fraud Centre
Our commitment to transparency, ethical communication, and user protection forms part of our broader corporate governance and compliance strategy. Our approach includes:
- Continuous Monitoring: We actively monitor fraud reports and digital impersonation trends.
- Policy & Reporting: We maintain fraud prevention policies aligned with ISO/IEC 27001:2022 standards and report activity through our governance committees.
- Internal Protocols: All employees undergo ongoing security and compliance training, including but not limited to:
- Identifying and reporting impersonation attempts.
- Secure handling of external communications.
- Participation in regular phishing and awareness exercises.
- External Collaboration: impact.com actively collaborates with regulatory authorities and social media platforms to investigate and remove fraudulent accounts that misuse our brand identity.
To protect you, we adhere to the following rules without exception:
- Our employees will only contact you through the official channels listed in the first FAQ.
- We do not use WhatsApp, Telegram, or any other unofficial messaging platforms for official communications.
- We will never request confidential information or bank details outside of our secure signup process on our official platform URLs.
- We do not accept cryptocurrency payments in any of our companies.
Be on high alert if you see any of these warning signs:
- Unsolicited job offers received via messaging apps (WhatsApp, Telegram) from unknown contacts.
- Requests for personal information early in the communication.
- Any requirement for you to pay upfront for an earning opportunity.
- Promises of unusually high returns with little to no risk.
- Pressure or a sense of urgency to act quickly on an investment.
- Directions to use specific, unknown platforms for tasks or investments.
- Any communication happening outside of our official channels.
- Requests for payment in cryptocurrency or other unusual methods.
To Report Scams on Telegram:
- Send screenshots and information to the channel @notoscam.
- Send email abuse reports to abuse@telegram.org.
- Use the ‘Report spam’ button within group chats.
To Report Scams on WhatsApp:
- Open the chat with the user or group you want to report.
- Tap ‘More’ (or the three dots) > Report.
- You can check the box to block the user and delete the chat history.
- Tap Report to confirm.
- Verify the source before engaging with any job offers or requests for personal information.
- Be wary of offers that seem too good to be true, especially those received via social media platforms.
- Never share personal or financial information with unverified parties.
- Stay informed about the latest scam tactics and educate those around you.
- Use strong, unique passwords for all your accounts.
- Enable two-factor authentication wherever possible.
- Keep your software updated to protect against known vulnerabilities.
For more information about our data security practices, please visit our Privacy Policy and Security Information pages.
impact.com Ecosystem
- Support Ticket: by logging a ticket to our Support Portal
- Main Website: www.impact.com
- Related Companies: Trackonomics | SaaSquatch | Pressboard | Affluent
Last updated: January 2025
© 2025 impact.com and affiliated companies. All rights reserved. This security information is provided to help protect our community from fraudulent activities.
Need additional information on security or privacy?
Our security team is always happy to answer any questions you may have about impact.com’s security measures. Whether you have a general enquiry or a specific concern, we’re here to help!
Ready to take your partnership program to the next level?
The impact.com partnership management platform handles the entire life cycle of different partnership types, including affiliates, influencers, media groups, premium publishers, strategic B2B, and more.