This website does not support versions of Internet Explore below Internet Explorer 10. Please either upgrade your version of Internet Explorer or switch to one of the following browsers:

skip to main content

Security Information

Security Information

Acxiom takes security seriously. We maintain security procedures designed to ensure information we own, license and process is not accessed by any unauthorized person or business. We use a variety of multi-level security systems to control access to our services and information products. Acxiom associates and all users at client locations must have access codes and the authorization to access certain data and applications.

We also regularly conduct risk assessments and audits on our internal and external information systems. These security measures help us continually assess our ability to maintain the security of our data. Our enterprise network security operations center maintains real-time monitoring for information system vulnerabilities and unauthorized access attempts into Acxiom’s systems. We also maintain strict physical security for our facilities and limit access to critical areas of our business.