LET US SHARE OUR

Information Security

Our top priority is to keep customer data safe and secure, so we work hard to protect you from the latest threats. We always appreciate your input and feedback on our security. We appreciate every security vulnerability report. To report a vulnerability, please submit a support request. We will assess the risk, work out a solution as soon as possible, and let you know. We respect the time and talent that drives new discoveries in IT security.

Thanks for your support!


1. Guidelines and Rules

Security first! While testing the vulnerability, we prohibit data deletion, unauthorized data access, and service disruption. If you’ve discovered a security vulnerability, please do not share or consult with others publicly. Do not attempt to access or modify data maintained by our systems. Do not attempt to execute a Denial of Service (DoS) attack. Do not attempt to send spam, unauthorized email or other forms of unsolicited messages.

Our anti-spam policy is one of the fundamentals of our approach to email marketing. Provide detailed information so that we can replicate the problem. A recognition award may be given for an accomplishment that represents a special value for GetResponse. It involves a nomination and approval process. Any rewards or financial compensation for your report will be considered only in special cases and are not guaranteed.

2. Your Data is Safe with Us.

We save your data to multiple servers and disks at the same time to ensure failsafe reliability. All data is backed up daily and stored in our security-focused data centers in multiple locations across the United States and Europe.

3. We Protect Your Billing Data.

We protect all credit card data using state-of-art encryption – the same level of encryption used by the leading banks. All sensitive data is processed, transmitted and stored on a PCI-compliant network that is regularly scanned for security by industry-leading experts.

4. Our Security Obsession.

We protect all credit card data using state-of-art encryption – the same level of encryption used by the leading banks. All sensitive data is processed, transmitted and stored on a PCI-compliant network that is regularly scanned for security by industry-leading experts.

5. Fully Redundant System.

Redundancy is a keyword for us at GetResponse. All our web servers, email servers, and database servers operate at full redundancy. We use redundant disk arrays (RAIDs), redundant power supplies and redundant Internet connections. GetResponse is engineered to work great even if multiple systems fail.


We focus on giving our best providing top security support for you. Any report should be address to our support@Response.com