| Administrators | ✓ | |
| Company Managers | ||
| Marketing Managers | ||
| Sales Managers | ||
| Salespersons | ||
| Jr. Salespersons |
Constant Contact routinely audits the application, infrastructure, and security in effort to maintain a safe and secure service. The audits involved are as follows:
| Audit Type | Description | |
| Application Audits |
Constant Contact goes through a quarterly PCI audit | |
| Infrastructure Audits |
Constant Contact infrastructure and development deployments— | |
| External Audits |
As both a Salesforce and Google partner, Constant Contact | |
| Security Audits |
Constant Contact performs routine security audits on all servers and applies security updates as they are made available. |
Constant Contact makes a point to practice safety in the digital sphere. This safety starts and ends with data security. The ways that Constant Contact practice data safety include:
| Data Type | Description | |
| Data in Transit |
All sensitive data shared between the application, extranet, | |
| Data at Rest |
Credentials are stored in an encrypted on-disk format to | |
| Redundant Architecture |
Constant Contact uses a redundant server architecture (which | |
| Data Backup |
Constant Contact's backup procedures follow the basic rules of the CIA triad: confidentiality, integrity, and availability. |
Copyright © 2025 · All Rights Reserved · Constant Contact · Privacy Center