What about authorization?
This layer makes sure that only authorized employees are able to perform a limited set of actions based on their role within the organization. Users are granted usage rights on a need-to basis. Each user action is logged by the system and can be tracked. In addition, the application can be configured so that every change made by a user requires the approval of a top user.
How does Impactia make sure that my email information is secure?
All of the communication between the user’s workstation and the server’s web client is encrypted using SSL and authenticated by using a trusted certificate.
Do you store my contact list? How secure is it?
No, we do not automatically store your contact list, unless you choose to upload it. It is important to understand that Impactia is NOT a bulk email service, but rather a service that enhances day-to-day email correspondence. Therefore, it doesn’t require storing contact lists. The user can decide whether or not they want to upload contact lists in order to further segment their delivery rules. Most users choose to upload sender contact lists only, and rarely upload large recipient contact lists as it is simply not necessary. This makes our service less appealing to hackers. When lists are uploaded, however, they are of course highly protected.
What information do you store on your servers?
We are committed to respecting and protecting the privacy of our customers and those who use our website. The following Privacy Statement provides details about how your personal information is collected and used. Impactia is the sole owner of information collected on this site. The amount of personal information you are required to supply is limited to that which is necessary to supply the service or carry out the transaction that you requested. Additional information that might be requested is labeled as optional. We will not sell, share, or rent this information to others in any way different from what is disclosed in this statement.
What happens to email messages sent through you?
The Impactia server secures the data stored by the system, making sure that sensitive data (i.e. email messages) is deleted at the end of each transaction, leaving only essential meta-data.