AffiDock Logo AffiDock
  • ...
  • ...
  • ...
  • ...
  • ...

Data Protection

Last updated: October 5, 2025

At Shock Experts, we understand that you're entrusting us with some of your most sensitive business data — advertising account credentials, campaign metrics, and financial information. This page details the technical and organizational security measures we've implemented to protect your data in AffiDock.

We never sell your data. We never share your account credentials with third parties. We never use your advertising data for any purpose other than displaying it to you.

1. Encryption & Data Protection

Encryption at Rest

  • AES-256 Encryption: All sensitive data, especially account credentials, is encrypted using industry-standard AES-256 encryption
  • Isolated Credential Vault: Account passwords, API tokens, and access keys are stored in a separate, encrypted vault with independent access controls
  • Encrypted Backups: All backup systems use encrypted storage with separate encryption keys
  • Database Encryption: Campaign metrics and account metadata are stored in encrypted databases

Encryption in Transit

  • TLS 1.3: All connections to AffiDock use TLS 1.3 or higher with perfect forward secrecy
  • HTTPS Everywhere: All pages and API endpoints enforce HTTPS; HTTP requests are automatically redirected
  • Secure API Connections: Communication with advertising platforms uses encrypted, authenticated connections
  • Certificate Pinning: Critical connections use certificate pinning to prevent man-in-the-middle attacks

Password Security

  • Passwords are hashed using Argon2id with per-user salts
  • We never store plaintext passwords
  • Password reset tokens expire after 1 hour
  • Account lockout after repeated failed login attempts

2. Access Controls & Authentication

User Authentication

  • Multi-Factor Authentication (MFA): Available for all users and strongly recommended for account security
  • Session Management: Secure session tokens with automatic expiration and refresh mechanisms
  • OAuth Integration: Support for secure sign-in via Google with minimal permission scopes
  • IP Monitoring: Suspicious login locations trigger verification emails

Role-Based Access Control (RBAC)

  • Granular Permissions: Team members can be assigned specific roles (Admin, Editor, Viewer)
  • Principle of Least Privilege: Users only have access to data and features necessary for their role
  • Account Isolation: Each organization's data is logically isolated; no cross-customer access
  • Audit Logs: All access and modifications are logged and auditable

Internal Access Controls

  • Minimal Engineer Access: Engineering team has strictly limited access to production data
  • Logged & Audited: All internal access is logged with justification and reviewed regularly
  • Credential Separation: Production credentials are never stored in code or version control
  • Background Checks: All team members handling user data undergo background checks

3. Infrastructure & Network Security

Cloud Infrastructure

  • Enterprise-Grade Hosting: Hosted on AWS/Google Cloud Platform with SOC 2 Type II compliance
  • UK/EU Data Centers: Primary data storage in UK/EU-based data centers for GDPR compliance
  • Redundant Architecture: Multi-availability zone deployment for high availability and disaster recovery
  • DDoS Protection: Advanced DDoS mitigation and rate limiting to prevent service disruption

Network Security

  • Firewalls: Network-level firewalls restrict access to databases and internal services
  • VPC Isolation: Application runs in isolated Virtual Private Cloud with restricted ingress/egress
  • Intrusion Detection: Automated systems monitor for suspicious network activity
  • API Rate Limiting: Protects against brute force attacks and abuse

Backup & Disaster Recovery

  • Automated Backups: Daily encrypted backups with point-in-time recovery
  • Geographic Redundancy: Backups stored in multiple geographic locations
  • 90-Day Retention: Backup copies retained for 90 days for disaster recovery
  • Tested Recovery: Regular disaster recovery drills to ensure backup integrity

4. Security Monitoring & Incident Response

24/7 Monitoring

  • Automated alerting for suspicious activity and security anomalies
  • Real-time monitoring of login attempts, API usage, and data access patterns
  • System health monitoring with automated failover
  • Log aggregation and analysis for security threat detection

Vulnerability Management

  • Regular Security Audits: Annual third-party security audits and penetration testing
  • Dependency Scanning: Automated scanning for vulnerabilities in third-party libraries
  • Patch Management: Critical security patches applied within 24 hours
  • Bug Bounty Program: Security researchers can responsibly disclose vulnerabilities

Incident Response Protocol

In the unlikely event of a security incident:

  • Immediate Containment: Automated systems isolate affected components to prevent spread
  • 72-Hour Notification: Affected users notified within 72 hours as required by GDPR
  • Regulatory Compliance: Relevant supervisory authorities informed as required by law
  • Transparent Communication: Clear information about what data was affected and remediation steps
  • Post-Incident Analysis: Thorough investigation and implementation of preventive measures

5. Compliance & Certifications

Regulatory Compliance

  • GDPR: Full compliance with EU General Data Protection Regulation
  • UK DPA 2018: Compliance with UK Data Protection Act 2018
  • CCPA: California Consumer Privacy Act compliance for US users
  • PCI DSS: Payment card data handled by PCI DSS Level 1 compliant Stripe

Industry Standards

  • SOC 2 Type II compliance (infrastructure providers)
  • ISO 27001 aligned security practices
  • OWASP Top 10 security guidelines
  • Regular security training for all team members

6. Your Security Responsibilities

Best Practices for Account Security

  • Enable MFA: Turn on multi-factor authentication in your account settings
  • Strong Passwords: Use unique, complex passwords (we recommend a password manager)
  • Review Team Access: Regularly audit team member permissions and remove unnecessary access
  • Monitor Activity: Check your account activity log for unexpected actions
  • Secure Devices: Keep your devices and browsers updated with security patches
  • Report Suspicious Activity: Contact us immediately if you notice anything unusual

7. Third-Party Security

All third-party service providers undergo security vetting and are bound by strict data processing agreements:

  • Stripe (Payments): PCI DSS Level 1 compliant payment processor; we never see full card numbers
  • AWS/GCP (Infrastructure): SOC 2 compliant cloud infrastructure with enterprise security
  • Email Providers: Encrypted email delivery with SPF, DKIM, and DMARC authentication
  • Analytics: Privacy-focused, GDPR-compliant analytics without user tracking

We never share your advertising account credentials with any third party. API connections to advertising platforms are made directly from our secure servers.

8. Contact & Security Reporting

For security-related questions, concerns, or to report a vulnerability:

  • Security Email: legal@shock-experts.com
  • Postal Address: Shock Experts LLP, London, United Kingdom, OC457555

If you discover a security vulnerability, please report it responsibly. We appreciate security researchers helping us keep AffiDock secure and will respond to all legitimate security reports within 48 hours.

Our Commitment to You

AffiDock was built by affiliates who understand how critical account security is to your business. We treat your data with the same care and paranoia we'd want for our own accounts. Your trust is our most valuable asset, and we take data protection seriously — not just because it's legally required, but because it's the right thing to do.

— The Shock Experts Team

AffiDock Logo

AffiDock

...

...

  • ...
  • ...
  • ...
  • ...
  • ...

...

  • ...
  • ...
  • ...
  • ...
  • ...

...

....

We use cookies to improve your experience. By using this site, you agree to our Cookie Policy.