Privacy
Privacy policy and data handling principles.
We collect only what is required to qualify requests, match providers, and improve marketplace outcomes. Data use is limited to operational needs and controlled by role, auditability, and trust standards.
Last updated: March 13, 2026
Privacy highlights
Data handling snapshot
Only the information required to qualify and route requests.
Collection categories
4
Safeguards
3
User control options
Requests for access, correction, and deletion are supported.
Control options
4
Retention stages
3
Sharing posture
Need-to-know sharing with vetted providers only.
Sharing principles
3
Legal bases
4
What we collect
- Contact details, company profile, and role information
- Service requirements, budget range, and implementation timeline
- Compliance frameworks and security priorities
- Engagement activity and provider response signals
How we use data
- Qualify and enrich cybersecurity request submissions
- Route buyers to vetted providers based on fit and readiness
- Measure marketplace quality and response performance
- Improve matching accuracy and operational workflows
Data sources
- Information provided directly by buyers and providers
- Operational data generated from platform usage and routing activity
- Verification or enrichment data shared by approved partners
- Support communications and onboarding documentation
Legal bases
- Contract performance to deliver marketplace services
- Legitimate interest in improving routing quality and security outcomes
- Consent where required for marketing or optional communications
- Compliance with legal or regulatory obligations
Data sharing and controls
How information is shared and managed.
Sharing principles
- Qualified providers only receive relevant request details
- Data is not sold to third parties for ad targeting or list resale
- Aggregated analytics are used to improve platform quality and reliability
User controls
- Request access to personal or company profile data
- Request correction or update of stored information
- Request deletion of request data where applicable
- Opt out of non-essential communications
Security safeguards
Encryption and secure transport
Data is protected in transit and at rest using modern encryption practices.
Role-based data access
Only authorized users can access request or provider data relevant to their role.
Operational audit trails
Sensitive actions are logged for accountability and security review.
Cookies and analytics
- Essential cookies support authentication and secure sessions.
- Analytics cookies measure page usage to improve routing workflows.
- Preference cookies remember form choices and content selections.
International transfers
- Data may be processed in regions where CybersecurityMatch or its service providers operate.
- When required, transfers are protected with contractual safeguards and security controls.
- Access is restricted to authorized personnel with role-based permissions.
Children's privacy
Designed for business users only.
- The platform is intended for business users and is not directed to children under 16.
- We do not knowingly collect personal data from children without appropriate authorization.
Retention and lifecycle
Active request lifecycle
Request and routing records are retained for operational continuity, provider coordination, and support needs.
Post-engagement records
Outcome and quality signals may be retained in aggregated form to improve routing and matching performance.
Deletion and suppression workflows
Users can request deletion or suppression where allowed, and we process those requests through documented workflows.
Questions?
Contact our trust and privacy support team.
Reach out for privacy requests, data access, or deletion inquiries.
Ready to move fast
Get matched with cybersecurity providers in hours, not weeks.
Submit your request once. Our AI qualifies, enriches, and routes the lead to the best MSP and MSSP partners for your stack, industry, and timeline.
Optimized for faster qualification and stronger provider fit.
What you get
- AI-qualified leads scored for budget, urgency, and compliance.
- Provider shortlists with verified certifications and references.
- Scheduling workflows with smart reminders and follow-up.
- Live conversion analytics and quality trend insights.
Need cybersecurity support now?
Submit your requirements and get a vetted provider shortlist in hours.
Growing your provider pipeline?
Join the marketplace and access higher-intent demand with stronger fit signals.
Explore next