Security at Respondent
Respondent is committed to protecting our participants, researchers, and partners from security threats. We are guided by our core values, security standards, and all relevant legal and contractual standards.
Thousands of companies trust Respondent to recruit quality participants
Security guides everything we do
SOC 2 certified
Respondent is SOC 2 Type II compliant via an external independent auditor. SOC 2 is an industry-leading standard that ensures service providers securely manage data to protect the interests and privacy of all parties. If you wish to learn more or view a copy of our most recent attestation, please email security@respondent.io
GDPR and CCPA compliant
We have robust processes to ensure that personal information entrusted to us by participants and researchers is not shared without consent. We are compliant with Europe's General Data Protection Regulation (GDPR) and California's CCPA regulations.
Access control and single sign on (SSO)
Researcher accounts on Respondent can be associated with organizations and teams to provide flexible and managed access to recruitment projects. Respondent also allows for different access levels to facilitate administrative or billing functions. We support account access through single sign-on SAML, for enhanced security.
Document signing and NDA facilitation
Respondent helps researchers automate requests for signing non-disclosure agreements or other documents before sharing potentially sensitive intellectual property with participants. This saves time in research operations and helps ensure that appropriate security practices are adhered to.
Data collection and deletion practices
Our company, products, the tools and vendors we use are structured to treat researcher and participant data with best in class security, and to minimize the risk of unauthorized access. Our detailed information security and privacy program features a comprehensive suite of policies, guidelines, and processes for identifying and mitigating risks to our data and systems.
Account deactivation requests
At Respondent, we believe that control should always be in your hands. That's why we've made it simple to deactivate your account. You may also request deletion of your account and all associated data by contacting us.
Frequently Asked Questions
Yes, Respondent is SOC 2 Type II certified and undergoes regular audits through an external independent vendor. This certification is an industry-leading standard that ensures that our data security processes adhere to prescribed best practices.
Security is central to everything we do at Respondent. Researchers can require participants to sign a non-disclosure agreement before participating in a study to prevent sensitive IP from being shared. In addition, our advanced access control levels ensure that you can restrict access to research data for exactly the groups that need to know, even within your own organization. These are further backed by our best-in-class data security practices that ensure that your project data is stored securely.
Respondent collects participant profile information including personally identifiable information to match participants with the most relevant paid research opportunities. We ensure that all such data is stored securely in adherence to robust data security practices and use it exclusively for matching. Respondent actively ensures that even researchers will only have access to participants' profile information during the study itself. Respondent also manages payments directly, to minimize the risk of compromising potentially sensitive payment details and accounts.
You can review our privacy policy for further details or email us at security@respondent.io for questions.
Yes, Respondent is GDPR and CCPA compliant.
Recruit high-quality participants today
- Your research data is secure with Respondent
- Get NDAs signed before conducting research
- Recruit for any research methodology on any tool



