IMatch Logo

Privacy Policy

Last Update: March 2024

Your data privacy is our top priority.

1. Data Collection

We collect information necessary to facilitate B2B transactions, including company details, user roles, and business documents like invoices and purchase orders.

2. Security Standards

All data is encrypted in transit and at rest using industry-standard protocols. We prioritize the security of your supply chain data.

Enterprise Security Compliance

IMatch uses SOC2-compliant data centers and bank-grade TLS 1.3 encryption for all data in transit. We conduct regular penetration testing and third-party security audits to ensure your supply chain data remains confidential and tamper-proof.