Administrators | ✓ | |
Company Managers | ||
Marketing Managers | ||
Sales Managers | ||
Salespersons | ||
Jr. Salespersons |
Constant Contact routinely audits the application, infrastructure, and security in effort to maintain a safe and secure service. The audits involved are as follows:
Audit Type | Description | |
Application Audits |
Constant Contact goes through a quarterly PCI audit | |
Infrastructure Audits |
Constant Contact infrastructure and development deployments— | |
External Audits |
As both a Salesforce and Google partner, Constant Contact | |
Security Audits |
Constant Contact performs routine security audits on all servers and applies security updates as they are made available. |
Constant Contact makes a point to practice safety in the digital sphere. This safety starts and ends with data security. The ways that Constant Contact practice data safety include:
Data Type | Description | |
Data in Transit |
All sensitive data shared between the application, extranet, | |
Data at Rest |
Credentials are stored in an encrypted on-disk format to | |
Redundant Architecture |
Constant Contact uses a redundant server architecture (which | |
Data Backup |
Constant Contact's backup procedures follow the basic rules of the CIA triad: confidentiality, integrity, and availability. |
Copyright © 2025 · All Rights Reserved · Constant Contact · Privacy Center