Security at Respondent
Respondent is committed to protecting product users and all other relevant parties from security threats. We are guided by the company’s core values, our code of conduct, business ethics, security standards and all relevant legal or contractual standards.
Thousands of companies trust Respondent for their research recruitment needs
Security underpins everything we do
SOC 2 Certified
Respondent is SOC 2 Type II compliant via an external independent auditor. SOC 2 is an industry-leading standard that ensures service providers securely manage data to protect the interests and privacy of all parties. If you wish to learn more or view a copy of our most recent attestation, please email security@respondent.io.
GDPR and CCPA Compliant
Privacy is of paramount importance to us and we have robust processes to ensure that personal information entrusted to us by participants and researchers is not shared without consent. We are compliant with Europe’s General Data Protection Regulation (GDPR) and California’s CCPA regulations.
Access Control and Single Sign On (SSO)
Researcher accounts on Respondent can be associated with organizations and teams to provide flexible and managed access to recruitment projects. In addition, Respondent allows for different access levels to facilitate administrative or billing functions for stakeholders. We support account access through single sign-on SAML, for enhanced security.
Document Signing and NDA Facilitation
Respondent helps researchers automate requests for signing non-disclosure agreements or other documents prior to sharing potentially sensitive intellectual property with participants. This saves time in research operations and helps ensure that appropriate security practices are adhered to.
Data collection and Deletion Practices
Researcher and respondent data is the most important thing we handle. Our company, products, the tools and vendors we use are structured in a optimal fashion to treat this data with best in class security, and to minimize the risk of unauthorized access. Our detailed information security and privacy program features a comprehensive suite of policies, guidelines and processes for identifying and mitigating risks to our data and systems.
Account Deactivation Requests
At Respondent, we believe that control should always be in your hands. That's why we've made it simple to deactivate your account. You may also request deletion of your account and all associated data by contacting us.