Security at AImpact

We take the security of your data seriously. Learn how we protect your information and maintain the integrity of our platform.

Data Encryption

  • Encryption in Transit: All data transmitted between your browser and our servers is encrypted using TLS 1.2+
  • Encryption at Rest: All stored data is encrypted using AES-256 encryption
  • Database Encryption: Our databases use industry-standard encryption for all stored information

Authentication & Access Control

  • Clerk Authentication: We use Clerk for secure user authentication with multi-factor authentication support
  • Role-Based Access: User permissions are managed through role-based access control (RBAC)
  • Session Management: Automatic session timeout and secure session handling
  • Password Requirements: Strong password policies enforced for all accounts

Infrastructure Security

  • Cloud Hosting: Hosted on secure cloud infrastructure with enterprise-grade security
  • Firewall Protection: Network firewalls and DDoS protection
  • Regular Updates: Operating systems and dependencies kept up-to-date with security patches
  • Backup & Recovery: Automated daily backups with disaster recovery procedures

Monitoring & Compliance

  • 24/7 Monitoring: Continuous security monitoring and anomaly detection
  • Audit Logs: Comprehensive logging of all system activities and access attempts
  • Security Audits: Regular security assessments and vulnerability scans
  • Incident Response: Documented procedures for handling security incidents

Payment Security

  • PCI Compliance: We do not store credit card information; payments are processed through Stripe
  • Secure Payments: All payment transactions use Stripe's secure infrastructure

Reporting Security Issues

If you discover a security vulnerability in our platform, we encourage you to report it responsibly. Please contact us immediately:

Email: abbas.aimpact@gmail.com

We appreciate your help in keeping AImpact secure. We will acknowledge reports within 48 hours and provide updates on our progress.

Your Responsibilities

While we implement robust security measures, you also play a role in protecting your account:

  • Use a strong, unique password for your account
  • Enable two-factor authentication when available
  • Never share your login credentials with others
  • Be cautious of phishing attempts and suspicious links
  • Keep your contact information up to date
  • Report any suspicious activity immediately

Last updated: May 14, 2026