Security Statement

Security

Your Security is Our Top Priority

Match2Lists.com uses some of the most advanced technology for Internet security available today. You can upload, store and share your data with confidence.

In addition to the 99.99% scheduled uptime guarantee, Match2Lists customers benefit from:

User Authentication and Access Privileges

Match2Lists.com provides each user in your organization with a unique user name and encrypted password that must be entered each time a user logs on.

Match2Lists.com issues a session "cookie" only to record authentication information for the duration of a specific session. The session "cookie" does not include the username, password, or any other confidential user or session information. Instead, Match2Lists implements more advanced security methods based on dynamic data and encoded session IDs.

RC4 128-Bit SSL Data Encryption On-Transfer & At-Rest

When you access Match2Lists.com using industry standard Secure Socket Layer (SSL) technology, your information is protected using both server authentication and data encryption, ensuring that your data is safe, secure, and available only to registered users in your organisation.

Match2Lists.com is hosted in a secure server environment that uses class leading firewall and other advanced technology to prevent interference or access from outside intruders. With server based Sub Net / Port Blocking and IP restriction, your data is protected against unauthorized retrieval.

Data Location and Data Segregation

All data is located in a high security data centre in the United Kingdom. Match2Lists.com's data centre is monitored 24/7 to ensure adherence to strict service levels. Only authorised, registered and accompanied visitors are allowed to enter the main building.

All servers are located within a secure, environmentally protected data centre housed centrally within the main building with access limited to authorised personnel only.

Data is stored in multiple RAID servers. Segregation is implemented through application security and other measures to ensure that customer data is always protected and only accessible by your approved personnel.

Match2Lists.com Security Architecture

Below is a simplified diagram of Match2Lists' multi-layered security architecture. You upload and download your data securely with SSL encryption, passing through firewalls and user account authentication processes along the way. Activity is logged for auditing, while data within Match2Lists is protected by role-based and time-based access controls as well as many physical security measures.

Match2Lists.com Security Architecture

Data Recovery & Investigation Support

Whilst we expect disaster recovery to be extremely rare, Match2Lists.com data is backed up every 24hours and stored securely onsite. We recommend, however, that all our clients deploy their own back up & recovery solutions.

Match2Lists.com investigative support officers provide a point of contact for security related support information such as user actions logs, user access audit reports, and data protection compliance.

Additionally, security researchers seeking information on how to report security issues to Match2Lists.com should contact ourĀ Investigation Support Officer.

Want more information?

Telephone
UK: +44 203 750 3350


Email sales@match2lists.com
support@match2lists.com


Webinar Take a Webinar
Live demos and Q&A


Newspaper Get Inside Information
In our email newsletter