Information Security

Version 3.0 – Published: 6 June 2024
1. Introduction

AdFixus is committed to security and privacy, maintaining an information security and privacy posture that aligns with our risk appetite, vision, and mission—specifically regarding consumer privacy.

While our solutions do not capture or store consumer Personally Identifiable Information (PII), we may collect customer information for normal business operations. We ensure that this information is secured to protect our business and operate effectively in a competitive marketplace.

All staff and contractors are trained on their information security obligations (per our Acceptable Use Policy) and adhere to secure development practices (per our Secure Development Policy).

Our Information Security Management System (ISMS) is implemented and continually improved in line with ISO27001:2022, developed at the executive level, and approved by our CEO.

2. Objectives of the ISMS

Our ISMS and this policy aim to ensure:

  • Any consumer PII captured and stored is hashed to prevent decryption.
  • No consumer PII is ever compromised, stolen, or lost.
  • All consumer identifiers are anonymous and double-encrypted.
  • Solutions achieve 99.9% uptime with no data loss.
  • All known critical security vulnerabilities are addressed within 24 hours.
3. Key Security Pillars

3.1 Privacy and Confidentiality

  • Consumer privacy is central to our market proposition.
  • No consumer PII is stored, and IP addresses or device identifiers are treated as PII.
  • Identifiers are two-way encrypted, with keys held by both AdFixus and the customer.
  • Any logged consumer behavior is linked only to encrypted identifiers, preventing AdFixus or third parties from identifying users.
  • Security by design ensures no unencrypted PII is stored, nullifying potential breach risks.

3.2 Integrity

  • Ensures identifiers cannot be inappropriately changed or modified.
  • All consumer identifiers are encrypted; modified identifiers cannot be decrypted.
  • Measures include:
    • No third-party access to PII without customer encryption keys.
    • No PII is stored; all processing occurs in volatile memory.
    • Logs linked to identifiers are securely stored and decryptable only by the customer.

3.3 Availability

  • Solutions are mission-critical for customers and their websites.
  • Enables first-party to first-party matching between partners.
  • Web logs stored on request allow customers to analyze traffic.
  • System is designed for 99.9% uptime per month with no data loss.

3.4 Governance

  • ISMS complies with ISO27001:2022 standards.
  • Critical processes are documented, reviewed quarterly, and continually improved.
  • Governed by the Information Governance Committee, including CEO, COO, and CTO.
4. Continuous Assurance

Through controlled delivery, ISMS operation, and staff commitment, AdFixus continually ensures that security objectives are met and the four key pillars—Privacy, Integrity, Availability, Governance—are upheld.

For questions regarding our Information Security Management System, contact:
📧 security@adfixus.com

A new era of customer identity

Get in touch for a free audit of your identity stack.

By clicking “Accept All Cookies”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.