Security policy

1. Data security

Security in terms of data protection is ensured by various means. first, every User of the service of Pharmatching.com is requested to enter very limited data only. Furthermore, when you place a service request this is done anonymously.

Pharmatching.com requires the use of a username and password protection. We have a password retrieval process for Users which ensures that they are verified to obtain their password which is operated via their valid Email account.

All data are stored on database servers that are secured from public access. Transactions involving financial data are only processed using secure server technology.
All data transmission to and within Pharmatching.com are encrypted via strong and current encryption methods including 256-bit SSL-Certification and 2084-bit RSA public keys. The lock icon in the browser shows that your data are fully protected from access.

Every User has an account where all entries and activities and sent/received messages or applications are archived unlimited until the account is deleted by the User. The User can export certain data of this account.

Any use of automatic or manual device or process to unlawfully access any pages on the Pharmatching.com websites will be prosecuted to the full extent under the relevant German law.

More details on terms & conditions

More details on privacy 


2. Technical security measures

Physical Security

Our server farm dedicated to Pharmatching.com is located in Germany, at a state-of-the-art facility providing 24-hour physical security including requirement of biometric access data, redundant electrical power, redundant and scalable broad-band internet-access, redundant air conditioners and backup equipment requiring asymmetric encryption.

Perimeter Security

The multicast architecture installed for the system communication is monitored 24/7 for all relevant operating parameters. The network perimeter is protected by a firewall. Pharmatching.com monitors and analyzes the system continuously including firewall logs, server logs, system load and system accessibility to proactively identify security threats.

Inside the perimeter firewalls, the systems are specifically safeguarded including network address translation and port redirection.