Security Statement


Your Security is Our Top Priority uses some of the most advanced technology for Internet security available today. You can upload, store and share your data with confidence.

In addition to the 99.99% scheduled uptime guarantee, Match2Lists customers benefit from:

User Authentication and Access Privileges provides each user in your organization with a unique user name and encrypted password that must be entered each time a user logs on. issues a session "cookie" only to record authentication information for the duration of a specific session. The session "cookie" does not include the username, password, or any other confidential user or session information. Instead, Match2Lists implements more advanced security methods based on dynamic data and encoded session IDs.

RC4 128-Bit SSL Data Encryption On-Transfer & At-Rest

When you access using industry standard Secure Socket Layer (SSL) technology, your information is protected using both server authentication and data encryption, ensuring that your data is safe, secure, and available only to registered users in your organisation. is hosted in a secure server environment that uses class leading firewall and other advanced technology to prevent interference or access from outside intruders. With server based Sub Net / Port Blocking and IP restriction, your data is protected against unauthorized retrieval.

Data Location and Data Segregation

All data is located in a high security data centre in the United Kingdom.'s data centre is monitored 24/7 to ensure adherence to strict service levels. Only authorised, registered and accompanied visitors are allowed to enter the main building.

All servers are located within a secure, environmentally protected data centre housed centrally within the main building with access limited to authorised personnel only.

Data is stored in multiple RAID servers. Segregation is implemented through application security and other measures to ensure that customer data is always protected and only accessible by your approved personnel. Security Architecture

Below is a simplified diagram of Match2Lists' multi-layered security architecture. You upload and download your data securely with SSL encryption, passing through firewalls and user account authentication processes along the way. Activity is logged for auditing, while data within Match2Lists is protected by role-based and time-based access controls as well as many physical security measures. Security Architecture

Data Recovery & Investigation Support

Whilst we expect disaster recovery to be extremely rare, data is backed up every 24hours and stored securely onsite. We recommend, however, that all our clients deploy their own back up & recovery solutions. investigative support officers provide a point of contact for security related support information such as user actions logs, user access audit reports, and data protection compliance.

Additionally, security researchers seeking information on how to report security issues to should contact ourĀ Investigation Support Officer.

Want more information?

UK: +44 203 750 3350


Webinar Take a Webinar
Live demos and Q&A

Newspaper Get Inside Information
In our email newsletter