---
title: Security
date: 2021-07-23T19:42:42Z
modified: 2026-04-24T01:14:43Z
permalink: "https://www.contactmonkey.com/security"
type: page
status: publish
excerpt: ""
wpid: 51590
parent: ""
ancestors: []
children: []
author: Peter Wong
---

# Your data is in safe hands with ContactMonkey

Your security comes first in everything we build. With advanced infrastructure, automation, and constant monitoring, your data is always protected.

[Contact us](#form)[Visit our Trust Center](https://trust.contactmonkey.com/)



![](https://www.contactmonkey.com/cm_wp/wp-content/uploads/2024/10/1-1.png "1")



                                                                                             



## Certified from the start

[Visit our Trust Center](https://trust.contactmonkey.com/)

![](https://www.contactmonkey.com/cm_wp/wp-content/uploads/2024/08/SOC-2-badges.png "SOC-2-badges")

#### ****SOC 2 Type 2 certified****

Our completion of the AICPA SOC 2 Type 2 audit affirms that our security practices, policies, and operations meet the highest industry standards.



![](https://www.contactmonkey.com/cm_wp/wp-content/uploads/2024/08/GDPR-1.png "GDPR-1")

#### **GDPR compliant**

ContactMonkey complies with GDPR and allows data erasure requests under our [GDPR Erasure Policy](https://www.contactmonkey.com/blog/gdpr-compliance-internal-communications). Our [Data Processing Addendum](https://www.contactmonkey.com/dpa) is available to all customers.



![](https://www.contactmonkey.com/cm_wp/wp-content/uploads/2024/08/sso.png "sso")

#### ****Secure single sign-on****

Available on our Enterprise plans, ContactMonkey integrates with SAML 2.0 providers (by request) for single sign-on.







## End-to-end security you can trust

Enjoy fast and reliable enterprise-grade security for your internal communications.



### Data security

- **Automated backups:** ContactMonkey’s databases are regularly backed up to protect customer data and ensure it’s easily recoverable in case of disruptions.
- **Data encryption:** All data is encrypted at rest using AES-256 and in transit using TLS v1.2 to protect your information from unauthorized access.
- **Multi-region strategy**: Have your data close to home. Our application is available in the USA, Western Europe, Australia and Asia Pacific, and Canada.





![](https://www.contactmonkey.com/cm_wp/wp-content/uploads/2024/10/2-2.png "2")



![](https://www.contactmonkey.com/cm_wp/wp-content/uploads/2024/10/3-2.png "3")

### Environment security

- **Cloud leverage:** We use Amazon Web Services (AWS) for cloud infrastructure hosting and services.
- **Continuous monitoring:** Our platform is continuously monitored by experts to ensure safety.
- **Vetted vendors:** All third-party vendors are evaluated for SOC 2 compliance and best practices.
- **Proactive alerts:** Our engineering team swiftly addresses newly detected vulnerabilities.
- **Access control:** Production environment access is tightly controlled with least privilege standards.







### External security assessment

- **Third-party testing:** Annual independent penetration testing ensures robust security.
- **SOC 2 verification:** Annual SOC 2 audits by independent auditors validate our adherence to top security standards.





![](https://www.contactmonkey.com/cm_wp/wp-content/uploads/2024/10/4-2.png "4")



![](https://www.contactmonkey.com/cm_wp/wp-content/uploads/2024/10/5-2.png "5")

### Secure software delivery

- **Secure development & integration:** All projects follow secure development principles and undergo review to ensure protection from the start.
- **Manual & automated testing:** All system changes undergo thorough automated and manual testing before production deployment.
- **Peer-reviewed code:** All system changes are peer-reviewed and tested by our engineers to guarantee secure delivery to production.







### Security-ready team

- **Annual security training:** Mandatory employee security training ensures all staff are vigilant and prepared.
- **Rigorous screening:** All employees and contractors undergo background checks as per local laws and industry standards.
- **Confidentiality:** Signed agreements uphold the protection of sensitive information.
- **Security & risk management team:** Our multi-department Security & Risk Management team oversees company-wide security.





![](https://www.contactmonkey.com/cm_wp/wp-content/uploads/2024/10/6-2.png "6")



            #### “Before Contact Monkey, we had nothing. We had no benchmark. We had no idea what messaging was getting to our employees, how they were best receiving it. We had very limited two-way feedback loops.”

Jerilyn Hall

Employee Communications Manager



[Read the story](https://www.contactmonkey.com/customer/mustang-cat-used-contactmonkey-to-drive-culture)

40–50%

of deskless workforce now reached







![](https://www.contactmonkey.com/cm_wp/wp-content/uploads/2026/03/Jerilyn-Hall.png "Jerilyn Hall")

Watch video









                   #### “\[ContactMonkey\] really does allow our teams to be creative, but also provides the analytics to make sure we’re doing the right things.”

Jeremy Roberts

Sr. Manager of Communications, Go-To-Market & Incentives



[Read the story](https://www.contactmonkey.com/customer/freedom-mobile-boosted-internal-comms-metrics)

40%

read rate boost



15%

higher open rates







![](https://www.contactmonkey.com/cm_wp/wp-content/uploads/2026/01/Jermey_Freedom-Mobile-1.png "Jermey_Freedom Mobile 1")

Watch video









       #### “ContactMonkey’s Dynamic Content tool saves me hours. I no longer need to copy, paste, or duplicate emails. It saves time, brain space, and prevents duplication errors.”

Emily-Rose Carr

Internal Communications Specialist



[Read the story](https://www.contactmonkey.com/customer/seek-outperforms-benchmarks-with-contactmonkey)

~60%

open rates



~19%

click rates







![](https://www.contactmonkey.com/cm_wp/wp-content/uploads/2026/01/Emily-Rose-Carr_Seek-2.png "Emily-Rose Carr_Seek 2")

Watch video









                                 #### With dynamic content, I can build one email with multiple blocks, with each block tailored to a group. I’m not duplicating emails or copy/pasting. It saves time and reduces mistakes.

James Maiden

Sr. Manager of Communications, Go-To-Market & Incentives



[Read the story](https://www.contactmonkey.com/customer/mccowngordon-dynamic-content-feature)

5x

faster email creation







![](https://www.contactmonkey.com/cm_wp/wp-content/uploads/2026/01/James_Maiden_McCownGordon-3.png "James_Maiden_McCownGordon 3")

Watch video









                           #### “Data helps drive informed decision-making. With appropriate feedback, we’re now able to analyze and change our strategy.”

Lindsey Champagne

Director of Communications and PR



[Read the story](https://www.contactmonkey.com/customer/certapros-13-average-click-rate)

13%

average click rate







![](https://www.contactmonkey.com/cm_wp/wp-content/uploads/2026/01/Lindsey-Champagne-_CertaPros-Painters-2.png "Lindsey-Champagne-_CertaPros Painters 2")





![](https://www.contactmonkey.com/cm_wp/wp-content/uploads/2026/01/Flagger-Force_logo-white-1.png "Flagger Force_logo-white 1")

#### “Our team’s efficiency was slowed down by the lack of sophistication of our previous tool. And we knew employees weren’t getting the information—they were flagging it as phishing.”

Tamara Palmer

Employee Engagement & Internal Communications Lead



[Read the story](https://www.contactmonkey.com/customer/flagger-force-boosting-open-rates)



![](https://www.contactmonkey.com/cm_wp/wp-content/uploads/2026/01/tamara-palmer_Flagger-Force-1.png "tamara-palmer_Flagger Force 1")











### Security FAQs



**********How do I remove my ContactMonkey data?**********

Taking control of your ContactMonkey data is easy. Simply send us a message at <support@contactmonkey.com> with clear instructions on what you want deleted. We’ll swiftly process your request and get back to you within 30 days.

[Learn more](https://help.contactmonkey.com/hc/en-us/articles/360039579692-How-do-I-remove-my-ContactMonkey-Data-)





**************How does tracking work?**************

Your team can make data-driven decisions with confidence by using ContactMonkey’s dashboard, which provides powerful analytics from open rates and link clicks to read times, locations, and more.

[Learn more](https://help.contactmonkey.com/hc/en-us/articles/360049530952-How-does-tracking-work-)





**************Is my data secure?**************

You bet. Your data’s under lock and key! With ContactMonkey, your info is strictly for analytics in internal comms. We store sender/recipient email addresses, subject lines, and optional email bodies upon sending. Once opened, we track recipient IPs and device user agents. Plus, we’ve got AES 256 encryption at rest and TLS 1.2 in transit for added security.

[Learn more](https://help.contactmonkey.com/hc/en-us/articles/200893553-Is-my-data-secure-)





******************Are my email messages stored?******************

With ContactMonkey’s email builder, users can create responsive HTML templates and emails right from our SaaS platform. Once created, they’re saved as JSON and HTML in our database, giving users easy access to view and modify them whenever they want. You’ve got the power to delete them entirely, wiping them from our database. Plus, emails made and sent via rich text? They don’t linger on our servers, providing extra peace of mind.

[Learn more](https://help.contactmonkey.com/hc/en-us/articles/200666257-Does-ContactMonkey-store-my-email-message-)





**************How do I report a possible vulnerability?**************

Are you a security researcher? Do you think you have found a vulnerability in the ContactMonkey system? We are happy to connect with you via <security@contactmonkey.com>. Please be aware that at this time that ContactMonkey is not operating a bug bounty program.

[Learn more](https://help.contactmonkey.com/hc/en-us/articles/200666257-Does-ContactMonkey-store-my-email-message-)











## Got security questions?

Fill out this form, and we’ll get back to you soon. Or, email us directly at <security@contactmonkey.com>.

![](https://www.contactmonkey.com/cm_wp/wp-content/uploads/2024/10/Security-illustration.png "Security illustration")

![](https://www.contactmonkey.com/cm_wp/wp-content/uploads/2024/06/icon-star.svg "icon-star")![](https://www.contactmonkey.com/cm_wp/wp-content/uploads/2024/06/icon-star.svg "icon-star")

![](https://www.contactmonkey.com/cm_wp/wp-content/uploads/2024/06/icon-star.svg "icon-star")![](https://www.contactmonkey.com/cm_wp/wp-content/uploads/2024/06/icon-star.svg "icon-star")

![](https://www.contactmonkey.com/cm_wp/wp-content/uploads/2024/06/icon-star-half-1.svg "icon-star-half-1")

Top-voted internal comms software on

[G2](https://www.g2.com/products/contactmonkey-inc-contactmonkey/reviews)









![](https://www.contactmonkey.com/cm_wp/wp-content/uploads/2024/06/icon-star.svg "icon-star")

![](https://www.contactmonkey.com/cm_wp/wp-content/uploads/2024/06/icon-star.svg "icon-star")![](https://www.contactmonkey.com/cm_wp/wp-content/uploads/2024/06/icon-star.svg "icon-star")

![](https://www.contactmonkey.com/cm_wp/wp-content/uploads/2024/06/icon-star.svg "icon-star")![](https://www.contactmonkey.com/cm_wp/wp-content/uploads/2024/06/icon-star-half-1.svg "icon-star-half-1")

Top-voted internal comms software on

[G2](https://www.g2.com/products/contactmonkey-inc-contactmonkey/reviews)