Acxiom takes security seriously. We maintain security procedures designed to ensure information we own, license and process is not accessed by any unauthorized person or business. We use a variety of multi-level security systems to control access to our services and information products. Acxiom associates and all users at client locations must have access codes and the authorization to access certain data and applications.
We also regularly conduct risk assessments and audits on our internal and external information systems. These security measures help us continually assess our ability to maintain the security of our data. Our enterprise network security operations center maintains real-time monitoring for information system vulnerabilities and unauthorized access attempts into Acxiom’s systems. We also maintain strict physical security for our facilities and limit access to critical areas of our business.Acxiom's Public Key Infrastructure