Login

IT Security and Compliance

Group 6929

IT security and compliance

Protecting your data. Powering your impact.

At Impact Reporting, safeguarding your data is more than a technical necessity – it’s a responsibility we take seriously. As a trusted partner for public sector organisations and ESG-led businesses, we operate to the highest standards of security, privacy and resilience.

From secure cloud infrastructure to certified controls and transparent governance, our platform is designed to give you confidence at every level.

  • circle-purple

    UK-hosted infrastructure

    All client data is securely stored in AWS data centres located in the UK, ensuring full compliance with UK data protection laws.

  • circle-purple

    End-to-end encryption

    All data in transit and at rest is encrypted using industry-standard protocols.

  • circle-purple

    Secure development lifecycle

    Security is embedded into every stage of our software development process, including peer reviews, vulnerability scanning, and rigorous UAT.

  • circle-purple

    Access control & audit trails

    Only authorised team members can access sensitive information, and all access is regularly reviewed and audited.

  • circle-purple

    Regular testing & certification

    We undergo annual penetration testing and hold Cyber Essentials and Cyber Essentials Plus certifications (valid through December 2025).

How we keep your data secure

We’ve built our platform with security at its core. Here’s how we protect your data:

data warehouse

Our approach to compliance

We are fully compliant with:

  • UK GDPR

  • The Data Protection Act 2018

  • The Privacy and Electronic Communications Regulations (PECR)

We also align our internal policies to recognised standards including ISO 27001, OWASP, and NCSC guidance.

Group 6934

Built for resilience

We’ve planned for the unexpected — so your data stays secure, even when challenges arise:

  • Business Continuity Plan
    Documented, tested, and regularly reviewed to ensure continuity in the event of disruption.

  • Daily encrypted backups
    Stored in secure UK locations and tested weekly for recoverability.

  • Breach response protocol
    Should an incident occur, we act quickly to contain, assess and notify relevant parties within 72 hours.

christopher-burns-8KfCR12oeUM-unsplash

AI and AI automation

We use generative AI tools responsibly to improve platform functionality and summarisation. Where AI is embedded into the platform, it is clearly labelled and only uses data from publicly available sources.

We do not use client data to train AI models.

All AI usage is governed by our internal Generative AI Usage Policy, which ensures ethical and secure implementation.

image-strip-sustainability

Access and authentication

  • Single Sign-On (SSO) available for enterprise clients

  • Multi-Factor Authentication (MFA) available and encouraged

  • Strong password policies and account lockouts enforced

  • Full data export capabilities — your data remains yours at all times

wood sustainability background

Certifications and third-party reviews

We regularly complete security assessments and procurement reviews for public sector clients, including:

  • Cyber Essentials & Cyber Essentials Plus

  • Third-party penetration testing (annual)

  • CAIQ assessments and council due diligence (e.g. Camden)

Security, data protection, business continuity and backup

Impact Reporting is a cloud-based SaaS platform that helps organisations capture, monitor, and report their social and environmental impact. Our solution is designed for businesses working with public sector contracts, ESG reporting, and social value delivery. 

Yes. We implement industry-standard security controls, including end-to-end encryption, secure development practices, vulnerability testing, and strict access management. All data is hosted in the UK using AWS infrastructure, and our IT Security Policy is aligned with GDPR and UK legislation. 

Yes. We carry out both network and application-level penetration testing annually using independent third-party security experts. 

Security is embedded throughout our Software Development Life Cycle (SDLC). This includes secure coding practices, peer reviews, automated vulnerability scanning, and rigorous internal User Acceptance Testing (UAT) processes. 

We take data security extremely seriously. Impact is fully cloud-based and is hosted on a private AWS EU-West-2 network based in London, UK, ringfenced from the public internet with strict access controls.

The software itself has been built from the ground up with OWASP recommendations in mind and is regularly assessed for compliance by Sec-1. In addition:

  • ISO 27001 Compliant & HIPAA Eligible Infrastructure
  • Cyber Essentials and Cyber Essentials Plus Certification (renewed annually, current until 13/12/2025)
  • ICO Certified – DPA Officer
  • WCG 2.1 Certified Level A & AA.
  • Qualys A HTTPS enforcement terminating on load balances in private containers with Impact’s Core not accessible via public internet

Absolutely. We are fully compliant with UK GDPR, the Data Protection Act 2018, and the Privacy and Electronic Communications Regulations. Our Data Protection Officer oversees all data governance processes. 

All third-party software providers must meet or exceed our internal security standards. Vendors are assessed regularly to ensure ongoing compliance. 

We have a clearly defined breach response policy. If a breach occurs, we assess, contain and, where necessary, notify both the ICO and any affected clients within 72 hours. All breaches are documented and reviewed to prevent recurrence. 

Yes. You have full ownership of your data. All content within the platform can be exported at any time in accessible formats like Excel or CSV. 

Yes. Our Business Continuity and Disaster Recovery Plans are documented, tested, and regularly reviewed. They outline key responsibilities, recovery procedures, and communication plans in the event of an incident. 

Yes. Daily encrypted backups are stored in UK-based AWS servers and retained for 30 days. These are tested weekly to ensure recoverability and reliability. 

Product, updates and AI use

We use the Scrum framework to release regular updates that include new features, performance enhancements, and security patches. Updates are tested thoroughly, and release notes are shared with users. 

Yes. We use generative AI tools (such as ChatGPT and Microsoft Copilot) to support internal development of the platform, reporting assistance, and summarisation tasks. Usage is strictly governed by our Generative AI Usage Policy to ensure data privacy and ethical compliance. Where we do use AI in the platform this is clearly labelled and is used only to access, disseminate and present information from publicly-available sources. 

No. We never input personal or confidential data into AI prompts. All tools used are configured to prevent training on client content, ensuring data remains private and secure. 

Access and permissions

Only authorised team members with a genuine business need can access client data. Access is reviewed regularly and revoked immediately when no longer required.

We enforce a strong password policy, two-factor authentication, and automatic account lockouts after failed login attempts. User access is tightly controlled and audited. 

Yes. Single Sign-On (SSO) is available for enterprise clients who require integrated authentication across platforms. 

Yes. Multi-Factor Authentication (MFA) is available and strongly encouraged to add an additional layer of protection to user accounts. 

Accreditations and standards

While we are not currently ISO 27001 certified, our internal policies and security framework align closely with its principles. This includes rigorous access controls, secure development practices, incident response procedures, and regular security reviews. 

Yes. We are certified under both: 

  • Cyber Essentials (valid through December 2025) 
  • Cyber Essentials Plus (valid through December 2025) 

These certifications confirm that our organisation meets UK government-backed security standards and is protected against a wide range of common cyber threats. 

Yes. Our approach is aligned with: 

  • ISO 27001 principles 
  • NCSC Cyber Essentials scheme 
  • OWASP guidance for secure application development 
  • UK GDPR and PECR compliance 

We also regularly complete external security and due diligence assessments as part of procurement for public sector and enterprise clients. 

Yes. In addition to Cyber Essentials and Cyber Essentials Plus certification, we undergo annual penetration testing and complete third-party assessments such as CAIQ and custom council questionnaires (e.g. Camden), covering software security, disaster recovery, data management and more. 

Yes. Our DPO is Ed Cox. He oversees compliance with all data protection legislation and is the contact point for any privacy-related enquiries. You can reach him at ed.cox@impactreporting.co.uk. 

Sign up to our newsletter