Security Information (Archive)
Acxiom takes security seriously. We maintain security procedures designed to ensure information we own, license and process is not accessed by any unauthorized person or business. We use a variety of multi-level security systems to control access to our services and information products. Acxiom associates and all users at client locations must have access codes and the authorization to access certain data and applications.
We also regularly conduct risk assessments and audits on our internal and external information systems. These security measures help us continually assess our ability to maintain the security of our data. Our enterprise network security operations center maintains real-time monitoring for information system vulnerabilities and unauthorized access attempts into Acxiom’s systems. We also maintain strict physical security for our facilities and limit access to critical areas of our business.
Data Protection
Acxiom has worked to build a reputation over the course of fifty years for having the highest standards around data privacy, data protection and security. In the past, questionable organizations have falsely attached our name to a data file in an attempt to create a deceitful sense of legitimacy for an asset. In every instance, Acxiom conducts an extensive analysis under our cyber incident response and privacy programs. These programs are guided by security, privacy and legal stakeholders who work with the appropriate authorities to inform them of these crimes.
Acxiom’s Commitment To Data Protection / Data Privacy
We value consumer privacy. U.S. consumers who would like to know what information Acxiom has collected about them and either delete it or opt out of Acxiom’s marketing products, may visit acxiom.com/privacy for more information.
Last Updated: June 30, 2023
Previous Version