Security and privacy

Securing our customers’ data is core to impact.com’s DNA and has always remained our top priority. Discover our advanced security and privacy measures to safeguard our users and data.


Our compliance processes

We understand the importance of earning and maintaining user trust. We are committed to upholding the highest standards of data security and privacy. This section outlines our comprehensive compliance processes designed to safeguard your information.

A check mark inside a square checkbox, symbolizing task completion or approval.
Consent and opt-out

Recruit participants ethically with impact.com's informed consent management. Our platform empowers researchers to obtain clear consent through customizable forms, while giving participants full control over their data with easy unsubscribe and opt-out options.

A shield icon displayed prominently against a clean white background, symbolizing protection and security.
Right to be forgotten

At impact.com, we prioritize user privacy and empower you to control your data. We adhere to the "Right to Be Forgotten" principle, allowing you to request the complete removal of your personal information from our systems and those of our subprocessors. To request that your data be deleted, or modified, please log a ticket on our support portal.

A user icon representing a person, displayed on a clean white background.
Data portability

impact.com offers complete data transparency. Our platform empowers you to easily access and view all information associated with your user profile. This ensures you stay informed and in control of your data.

A black and white image of a padlock, symbolizing security and protection, depicted as a simple lock icon.
Privacy Commitment & GDPR Compliance

At impact.com, we process your personal data in strict compliance with (General Data Protection Regulation) GDPR standards. We collect only what is necessary for our services based on legal basis and never sell your information; data is shared only with essential sub-processors or as required by law under rigorous safeguards. You retain full rights to access, rectify, erase, or object to the processing of your data at any time by contacting compliance@impact.com.

Our security features

Secure infrastructure

At impact.com, your data benefits from the utmost protection. We leverage top-tier cloud service providers known for their rigorous security practices. All data centers storing impact.com’s data hold certifications like SOC 1, SOC 2, SOC 3, and ISO 27001. These certifications demonstrate their commitment to comprehensive security controls, data confidentiality, and ongoing system integrity.

Monitoring & alerting

At impact.com, we take a proactive approach to security. Our sophisticated monitoring and alerting systems are constantly on guard, scanning our network for anomalies and suspicious activity. This vigilance allows us to identify and address potential threats before they can escalate, ensuring the continued protection of your data.

Continuous backups

impact.com prioritizes data redundancy for complete peace of mind. We employ a comprehensive backup strategy, including continuous backups for ongoing data capture and weekly full backups. This robust system allows us to restore your data to any point within the past year, minimizing downtime and ensuring business continuity in the event of any unforeseen circumstances.

Data encrypted in transit

We prioritize the security of your information during transit. We leverage industry-standard HTTPS with TLS 1.2 or higher encryption to safeguard all data transmissions between your device and our web application. This robust encryption technology ensures that your sensitive data remains protected from unauthorized access.

Frequently asked questions: Staying safe from scams

To protect our community, we’ve compiled a comprehensive guide to identifying legitimate communications from our companies and avoiding online scams. Use these answers to verify all official channels, understand common fraud tactics, and learn how to report suspicious activity.

What are the official communication channels for impact.com and its related companies?

Our employees will only contact you through official company channels. We do not use platforms like WhatsApp or Telegram for official communications. Please use the information below to verify websites, platform URLs, support centers, and social media accounts.

impact.com

Trackonomics

SaaSquatch

Pressboard

Affluent

Activate by impact.com

  • Website: N/A
  • Platform URL(s): N/A
  • Support: N/A
  • Social Media: X (Twitter): https://x.com/activatesocial_ (Account is open with no activity). Facebook, Instagram, and LinkedIn accounts are closed.

Bloglovin

Can you explain the common "Prepaid Task" scam?

This scam involves fraudsters impersonating impact.com or affiliate marketing companies to offer enticing part-time “jobs.”

How the Scam Unfolds:

  1. Initial Contact: Scammers contact you on WhatsApp, Telegram, or social media with an offer for simple online tasks (e.g., liking content, writing reviews).
  2. Building Trust: They give you small tasks and make small payments ($5 – $50) to appear legitimate, often collecting personal information under the guise of payment formalities.
  3. Escalation: They introduce higher-paying tasks that require you to “invest” your own money upfront, promising high returns (e.g., 20% or more).
  4. The Investment: You are directed to a fake platform where you make investments. Fake profits are shown to encourage you to invest more.
  5. The Loss: Your funds are suddenly frozen for fake reasons (e.g., “taxes” or “penalties”), and the scammers demand more money. Eventually, they cut off all communication, and your funds are lost.

Red Flags to Watch For:

  • Unsolicited job offers via messaging apps from unknown contacts.
  • Promises of unusually high returns with little to no risk.
  • Any requirement to pay upfront for an earning opportunity.
  • Pressure to act urgently on an investment.
  • Directions to use unknown platforms for tasks.
  • Any communication outside of official company channels.
  • Requests for cryptocurrency payments.
What should I do if I suspect a scam and how do I report it?

If you suspect someone is impersonating impact.com or our related companies, please email us immediately at abuse@impact.com so we can investigate. You should also report the crime to the appropriate authorities in your country:

🇺🇸 United States

🇬🇧 United Kingdom

🇪🇺 European Union

🇦🇺 Australia

🇨🇦 Canada

How does impact.com handle governance and oversight for scam prevention?

Our commitment to transparency, ethical communication, and user protection forms part of our broader corporate governance and compliance strategy. Our approach includes:

  • Continuous Monitoring: We actively monitor fraud reports and digital impersonation trends.
  • Policy & Reporting: We maintain fraud prevention policies aligned with ISO/IEC 27001:2022 standards and report activity through our governance committees.
  • Internal Protocols: All employees undergo ongoing security and compliance training, including but not limited to:
    • Identifying and reporting impersonation attempts.
    • Secure handling of external communications.
    • Participation in regular phishing and awareness exercises.
  • External Collaboration: impact.com actively collaborates with regulatory authorities and social media platforms to investigate and remove fraudulent accounts that misuse our brand identity.
What are the key policies I should know to identify a legitimate interaction?

To protect you, we adhere to the following rules without exception:

  1. Our employees will only contact you through the official channels listed in the first FAQ.
  2. We do not use WhatsApp, Telegram, or any other unofficial messaging platforms for official communications.
  3. We will never request confidential information or bank details outside of our secure signup process on our official platform URLs.
  4. We do not accept cryptocurrency payments in any of our companies.
What are the major red flags of a scam?

Be on high alert if you see any of these warning signs:

  • Unsolicited job offers received via messaging apps (WhatsApp, Telegram) from unknown contacts.
  • Requests for personal information early in the communication.
  • Any requirement for you to pay upfront for an earning opportunity.
  • Promises of unusually high returns with little to no risk.
  • Pressure or a sense of urgency to act quickly on an investment.
  • Directions to use specific, unknown platforms for tasks or investments.
  • Any communication happening outside of our official channels.
  • Requests for payment in cryptocurrency or other unusual methods.
How do I report scam accounts directly to Telegram or WhatsApp?

To Report Scams on Telegram:

  • Send screenshots and information to the channel @notoscam.
  • Send email abuse reports to abuse@telegram.org.
  • Use the ‘Report spam’ button within group chats.

To Report Scams on WhatsApp:

  1. Open the chat with the user or group you want to report.
  2. Tap ‘More’ (or the three dots) > Report.
  3. You can check the box to block the user and delete the chat history.
  4. Tap Report to confirm.
What are some additional security resources and best practices?
  • Verify the source before engaging with any job offers or requests for personal information.
  • Be wary of offers that seem too good to be true, especially those received via social media platforms.
  • Never share personal or financial information with unverified parties.
  • Stay informed about the latest scam tactics and educate those around you.
  • Use strong, unique passwords for all your accounts.
  • Enable two-factor authentication wherever possible.
  • Keep your software updated to protect against known vulnerabilities.

For more information about our data security practices, please visit our Privacy Policy and Security Information pages.

impact.com Ecosystem

  • Support Ticket: by logging a ticket to our Support Portal
  • Main Website: www.impact.com
  • Related Companies: Trackonomics | SaaSquatch | Pressboard | Affluent

Last updated: January 2025

© 2025 impact.com and affiliated companies. All rights reserved. This security information is provided to help protect our community from fraudulent activities.

chat icon

Need additional information on security or privacy?

Our security team is always happy to answer any questions you may have about impact.com’s security measures. Whether you have a general enquiry or a specific concern, we’re here to help!

Partnership icon

Ready to take your partnership program to the next level?

The impact.com partnership management platform handles the entire life cycle of different partnership types, including affiliates, influencers, media groups, premium publishers, strategic B2B, and more.