Security and privacy

Securing our customers’ data is core to impact.com’s DNA and has always remained our top priority. Discover our advanced security and privacy measures to safeguard our users and data.

Our certifications

Our platform's data security certifications provide peace of mind that your information is protected.


Our compliance processes

We understand the importance of earning and maintaining user trust. We are committed to upholding the highest standards of data security and privacy. This section outlines our comprehensive compliance processes designed to safeguard your information.

Consent and opt-out

Recruit participants ethically with impact.com's informed consent management. Our platform empowers researchers to obtain clear consent through customizable forms, while giving participants full control over their data with easy unsubscribe and opt-out options.

Right to be forgotten

At impact.com, we prioritize user privacy and empower you to control your data. We adhere to the "Right to Be Forgotten" principle, allowing you to request the complete removal of your personal information from our systems and those of our subprocessors. For a straightforward data deletion process, simply email our security team at security@impact.com.

Data portability

impact.com offers complete data transparency. Our platform empowers you to easily access and view all information associated with your user profile. This ensures you stay informed and in control of your data.

We never sell any data

impact.com prioritizes data privacy and adheres to the General Data Protection Regulation (GDPR). We never sell user data and have a Data Processing Agreement (DPA) in place for our customers in the European Economic Area (EEA). This ensures your data is protected by the strictest global privacy standards.


Our security features

Secure infrastructure

At impact.com, your data benefits from the utmost protection. We leverage top-tier cloud service providers known for their rigorous security practices. All data centers storing impact.com’s data hold certifications like SOC 1, SOC 2, SOC 3, and ISO 27001. These certifications demonstrate their commitment to comprehensive security controls, data confidentiality, and ongoing system integrity.

Monitoring & alerting

At impact.com, we take a proactive approach to security. Our sophisticated monitoring and alerting systems are constantly on guard, scanning our network for anomalies and suspicious activity. This vigilance allows us to identify and address potential threats before they can escalate, ensuring the continued protection of your data.

Continuous backups

impact.com prioritizes data redundancy for complete peace of mind. We employ a comprehensive backup strategy, including continuous backups for ongoing data capture and weekly full backups. This robust system allows us to restore your data to any point within the past year, minimizing downtime and ensuring business continuity in the event of any unforeseen circumstances.

Data encrypted in transit

We prioritize the security of your information during transit. We leverage industry-standard HTTPS with TLS 1.2 or higher encryption to safeguard all data transmissions between your device and our web application. This robust encryption technology ensures that your sensitive data remains protected from unauthorized access.

Need additional information on security or privacy?

Our security team is always happy to answer any questions you may have about impact.com’s security measures. Whether you have a general enquiry or a specific concern, we’re here to help!

Ready to take your partnership program to the next level?

The impact.com partnership management platform handles the entire life cycle of different partnership types, including affiliates, influencers, media groups, premium publishers, strategic B2B, and more.