Skip to main content

Dynamic Matched audience overview

Dive into dynamic Matched audience concepts and requirements; and learn about collaborating with IQM to onboard, target, and refresh audience data.

Team IQM avatar
Written by Team IQM
Updated this week

On this page:

Dynamic Matched audience overview

Matched audiences are made up of users from your first-party data such as Customer Relationship Management (CRM) data for specialty campaigns, NPI lists for Healthcare campaigns, or past voters for Political campaigns, for example.

While a Matched audience generates, it recognizes consumers across channels and devices through IQM’s privacy-compliant Identity Graph, which unifies offline and online identifiers to a single profile. Targeting this segment allows you to reach these offline users through digital channels.

While standard, in-platform Matched audience targeting is suitable for most campaigns, we recommend creating a dynamic Matched audience when targeting highly specific PII segments with an ongoing need for audience refreshes. This approach involves collaborating with IQM to onboard and target your own data.

A key benefit of dynamic Matched audiences is the continuous synchronization between your external data source and the audience targeted within the IQM platform. The platform automatically refreshes the audience each time your source file changes, ensuring end-to-end harmony with little manual effort.

Refer to Matched audience overview for more information about in-platform, standard Matched audiences, or continue reading to learn more about onboarding your own dynamic Matched audiences.

Data onboarding and targeting process overview

Onboarding data for dynamic Matched audience targeting first takes places outside of the IQM platform, then moves into the platform once your data is processed.

Review the graphic below for more details, or refer to Upload and target a dynamic Matched audience to get started.

  1. Contact us at support@IQM.com, or reach out to your account representative, to notify us that you’d like to bring your own PII-based data for dynamic Matched audience creation.

  2. IQM creates a secure AWS S3 bucket and shares access with your organization.

  3. Upload files to the shared bucket using the agreed-upon paths.

  4. IQM ingests, validates, and processes the data taxonomy you provided, and transforms it into a targetable Matched audience. This includes undergoing an audience-matching process, which correlates digital identities to the identifiers that you included in your source file(s).

  5. IQM manages account permissions to grant you exclusive access to your Matched audience.

  6. Access the Matched audience in the IQM platform, which was created for you via API.

    1. When a Matched audience reaches a Ready status, it includes three metrics: Records, Match Rate, and Reach. Refer to Matched audience overview: Key terms and concepts for more information on these metrics and the audience-matching process.

  7. Target the Matched audience via new or existing campaigns in the IQM platform.

  8. If desired, update the existing source-data file in S3 to dynamically refresh your Matched audience.

Data privacy measures for dynamic Matched audiences

Customer data privacy measures

When you create an audience with first-party data or enable other audience-targeting features, you agree to comply with applicable data laws and regulations including but not limited to GDPR, CCPA, and HIPAA. Your organization remains the controller of any personally identifiable information (PII) you send.

In addition to ensuring all sharing complies with applicable laws and your privacy policy, follow these guidelines to help ensure security and compliance when creating dynamic Matched audiences:

  • Least privilege: When you define permissions, you’ll apply permission settings that relate to AWS’s “Identity and Access Management” (IAM) policy. These IAM policies are used to grant users specific permissions such as the ability to list and read objects within a particular S3 bucket or folder.

    Always grant the minimum necessary access to each party. This security measure includes blocking public access and activating the “Bucket Owner Enforced” setting in S3, which disables Access Control Lists (ACLs) and ensures the bucket owner can manage all of its objects’ permission settings, regardless of the uploader.

  • Auditability: Enable S3 server access logging or CloudTrail data events for the bucket. These settings allow you to review key details related to each time your bucket and its objects are delivered to another bucket.

  • Data minimization: Limiting the amount of sensitive information that’s passed between parties is a critical step in maintaining data security. Store and share only the minimum amount of PII or other data necessary to meet your specific Matched audience use case and legal basis.

  • Retention: Agree on an object lifecycle (e.g., auto-expire raw files after a certain number of days) to minimize the storage of PII or other sensitive data.

IQM data privacy measures

IQM’s identity graph is fully privacy compliant. IQM doesn’t track any device or cookie with “Do not track” settings enabled, and follows all CCPA and GDPR guidelines.

IQM takes the following measures to provide a secure and compliant audience-matching solution (NPI matching, Voter matching, and other first-party data matching) that not only benefits our customers but also respects the privacy rights of individuals:

  • HIPAA compliance: Healthcare advertisers can create Matched audiences from NPI lists, as well as create HCP Matched audiences. Our foremost priority is aligning with the Health Insurance Portability and Accountability Act (HIPAA). This legislation mandates safeguarding individuals' healthcare information, a responsibility we discharge meticulously in our NPI matching process. ​

  • Robust data encryption: When NPI, voter, or other first-party data files include personally identifiable information (PII) such as first name, last name, and address, IQM anonymizes the data during the audience-matching process. Files are stored behind a firewall and encrypted in the case of a data breach. The rigorous data encryption measures that we have implemented are intended to preserve the confidentiality and integrity of data. These techniques also ensure data remains shielded during transit and while at rest, mitigating the risk of unauthorized access.

  • Secure data storage: All data processed within IQM undergoes secure storage, complemented by stringent access controls and comprehensive audit trails. This not only bolsters data security but also establishes traceability, an essential facet for demonstrating compliance.

  • Routine compliance audits: IQM conducts ongoing compliance audits to ascertain the continued alignment of our NPI, Voter, and other sensitive-data matching processes with the latest data privacy regulations. This unwavering commitment to compliance provides our customers with confidence, knowing they can utilize our platform without encountering legal concerns.

Key terms and concepts

Validation check

IQM performs a standard validation check during the Test and validate portion of the data onboarding process. Common checks include the following items.

Validated element

Description

Path and naming

The folder structure matches those outlined in S3 bucket structure and file paths. It includes a seat_id folder and a parseable timestamp.

Encoding

The file uses UTF-8 character encoding with Unix newlines (\n). It doesn’t start with a Byte Order Mark (BOM).

Encryption

The files contain raw values; encryption is not currently supported.

Size sanity

The file isn’t empty, and its size is within the mutually agreed-upon limit (typically <1GB and <1MM rows).

Headers

A header row is included, and each column’s header matches the requirements outlined in File formats and schemas.

Delimiters

The files use commas.

Types

No required fields were left blank, and all numeric fields parse.

Duplicates

Duplicate rows found within a single file may be de-duplicated.

Failure handling

Files affected by validation errors are skipped, and IQM will contact you with error details and next steps. Non-failing files will continue to be processed without interruption.

New versus refreshed audiences

The way you add, update, and delete files to the shared S3 folder determines each Matched audience’s behavior.

Desired behavior

Description

Create a new audience

Add a new file to the shared S3 folder to create a new audience.

When you add multiple files to the S3 folder at once, each file still represents its own dynamic audience.

Dynamically refresh an existing audience

Update an existing file in the S3 folder to trigger an automatic re-processing of the existing audience.

Notify IQM before adding or removing columns, and before changing delimiters.

Delete an existing audience

Deleting an existing file from the S3 folder will not automatically remove the corresponding audience from the IQM platform.

You can complete the same in-platform deletion process for dynamic or standard Matched audiences by following the steps outlined in Manage a Matched audience.

Refer to Upload and target a dynamic Matched audience to complete the processes described in this table.

S3 bucket structure and file paths

Path formatting notice: When reviewing the required taxonomy path, note that seat_id=<seat_id> is a folder name, not a query string. Use the exact seat or account identifier provided to you by IQM.

For <timestamp> formatting, use zero-padding. We also recommend a YYYYMMDD_HHMMSS format in UTC (e.g., 20250115_230501).

Requirements

Path or description

Required onboarding upload path

s3://<bucket>/onboarding/seat_id=<seat_id>/<audience_id>/<audience_name>.csv

Required versioning

Enable S3 Versioning (external link) on the bucket to safely recover from accidental overwrites.

Required retry info

Use a new <timestamp> any time you resend a file to differentiate between the existing file and the new one.

Recommended bucket name

An iqm-<partner>-<digest> bucket name is recommended, where <digest> is typically an 8 to 16 character alpha-numeric code.

File formats and schemas

Segment file

File content notice: Provided files must contain valid content. For example, Political advertisers adding files with L2 IDs should follow the “LAL<numeric ID>” format, and Healthcare advertisers adding files with NPI IDs should ensure they begin with the number “1”.

Refer to Validation check to confirm that your file follows all other formatting and content guidelines.

Path: s3://<bucket>/onboarding/seat_id=<seat_id>/<audience_id>/<audience_name>.csv

Supported column combinations

  1. NPI_ID

  2. L2_ID

  3. NPI_ID, first_name, last_name, ZIP, State

  4. L2_ID, first_name, last_name, ZIP, state

  5. First_name, last_name, ZIP, state (for Political or Healthcare advertisers)

  6. State_Voter_ID (for Political advertisers)

Example

first_name,last_name,address,zip,state,email
Alex,Morgan,123 Market St,94103,CA,alex.morgan@example.com

Templates

“Identity and Access Management” (IAM) templates

Template notice: The JSON samples below should be treated as templates that include placeholders. Replace these placeholders (<bucket>, <IQM_ACCOUNT_ID>, etc.) with your details

If you’re using server-side encryption (SSE) with AWS Key Management Service (KMS) to encrypt your S3 object data, allow kms:Decrypt and kms:Encrypt on the key.

Cross‑account role (partner account) – trust IQM to assume

{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Principal": { "AWS": "arn:aws:iam::<IQM_ACCOUNT_ID>:role/<IQM_Role_Name>" },
"Action": "sts:AssumeRole"
}
]
}

Inline policy for the cross-account role – limited bucket access

{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "ListAndGet",
"Effect": "Allow",
"Action": ["s3:ListBucket"],
"Resource": ["arn:aws:s3:::<bucket>"]
},
{
"Sid": "ObjectsRW",
"Effect": "Allow",
"Action": ["s3:GetObject","s3:PutObject","s3:DeleteObject","s3:GetObjectVersion"],
"Resource": ["arn:aws:s3:::<bucket>/*"]
}
]
}

Audience usage reports

For each seat_ID, we recommend maintaining monthly audience usage reports with respect to each dynamic Matched audience that you upload. Analyze month-over-month details including metrics such as Impressions and Spend, along with Audience IDs and Audience Names, broken out by audience (file) and campaign.

Use the following template to maintain the report with respect to each uploaded audience:

Item

Path or description

S3 path

s3://<client_bucket>/seat_id= <seat_id>/audience_usage_reports/<MM>-<YYYY>.csv

Account

The Workspace ID and Organization ID.

Month

The month you would like to report on.

Audience

The Audience Name and/or Audience ID.

Campaign

The Campaign Name and/or Campaign ID.

Metrics

The Impressions and/or Spend.

Once available, reports will be shared either via email or Google Drive.

Locate additional Matched audience resources

Did this answer your question?