AI-powered MSP/MSSP demand routing.

Privacy

Privacy policy and data handling principles.

We collect only what is required to qualify requests, match providers, and improve marketplace outcomes. Data use is limited to operational needs and controlled by role, auditability, and trust standards.

Last updated: March 13, 2026

Privacy highlights

Data minimization by default where possible
Need-to-know sharing for provider routing only
Framework-aware handling for regulated requests
Support channel for privacy and trust inquiries
Collection

Data handling snapshot

Only the information required to qualify and route requests.

Collection categories

4

Safeguards

3

EncryptedRole-based accessAudit trails
Security controls are embedded into routing workflows.
Controls

User control options

Requests for access, correction, and deletion are supported.

Control options

4

Retention stages

3

Access requestsCorrectionsOpt-outs
We process privacy requests through documented workflows.
Sharing

Sharing posture

Need-to-know sharing with vetted providers only.

Sharing principles

3

Legal bases

4

No resaleFit-based routingAggregated analytics
Data is never sold for ad targeting.

What we collect

  • Contact details, company profile, and role information
  • Service requirements, budget range, and implementation timeline
  • Compliance frameworks and security priorities
  • Engagement activity and provider response signals

How we use data

  • Qualify and enrich cybersecurity request submissions
  • Route buyers to vetted providers based on fit and readiness
  • Measure marketplace quality and response performance
  • Improve matching accuracy and operational workflows

Data sources

  • Information provided directly by buyers and providers
  • Operational data generated from platform usage and routing activity
  • Verification or enrichment data shared by approved partners
  • Support communications and onboarding documentation

Legal bases

  • Contract performance to deliver marketplace services
  • Legitimate interest in improving routing quality and security outcomes
  • Consent where required for marketing or optional communications
  • Compliance with legal or regulatory obligations

Data sharing and controls

How information is shared and managed.

Sharing principles

  • Qualified providers only receive relevant request details
  • Data is not sold to third parties for ad targeting or list resale
  • Aggregated analytics are used to improve platform quality and reliability

User controls

  • Request access to personal or company profile data
  • Request correction or update of stored information
  • Request deletion of request data where applicable
  • Opt out of non-essential communications

Security safeguards

Encryption and secure transport

Data is protected in transit and at rest using modern encryption practices.

Role-based data access

Only authorized users can access request or provider data relevant to their role.

Operational audit trails

Sensitive actions are logged for accountability and security review.

Cookies and analytics

  • Essential cookies support authentication and secure sessions.
  • Analytics cookies measure page usage to improve routing workflows.
  • Preference cookies remember form choices and content selections.

International transfers

  • Data may be processed in regions where CybersecurityMatch or its service providers operate.
  • When required, transfers are protected with contractual safeguards and security controls.
  • Access is restricted to authorized personnel with role-based permissions.

Children's privacy

Designed for business users only.

  • The platform is intended for business users and is not directed to children under 16.
  • We do not knowingly collect personal data from children without appropriate authorization.

Retention and lifecycle

Active request lifecycle

Request and routing records are retained for operational continuity, provider coordination, and support needs.

Post-engagement records

Outcome and quality signals may be retained in aggregated form to improve routing and matching performance.

Deletion and suppression workflows

Users can request deletion or suppression where allowed, and we process those requests through documented workflows.

Questions?

Contact our trust and privacy support team.

Reach out for privacy requests, data access, or deletion inquiries.

Contact the team

Ready to move fast

Get matched with cybersecurity providers in hours, not weeks.

Submit your request once. Our AI qualifies, enriches, and routes the lead to the best MSP and MSSP partners for your stack, industry, and timeline.

Optimized for faster qualification and stronger provider fit.

What you get

  • AI-qualified leads scored for budget, urgency, and compliance.
  • Provider shortlists with verified certifications and references.
  • Scheduling workflows with smart reminders and follow-up.
  • Live conversion analytics and quality trend insights.

Need cybersecurity support now?

Submit your requirements and get a vetted provider shortlist in hours.

Request Help

Growing your provider pipeline?

Join the marketplace and access higher-intent demand with stronger fit signals.

Become a Provider

Explore next

Navigate by service, industry, framework, or region.