How SurveyGizmo Safeguards Your Data
While SurveyGizmo provides an incredibly easy-to-use platform allowing users to collect all types of data from all types of sources, we also provide a powerful set of controls and tools to ensure your data is protected. We work with some of the world’s top brands across all industries, and we deploy industry-leading controls so your data is protected.
足球滚球比分We fully understand that together, we all bear responsibility for the data our customers share with us, so we don’t stop at just meeting the minimums that legislation demands. As a global provider of surveys and software, doing the right thing with data security and privacy is our bedrock.
Completely GDPR Compliant
足球滚球比分SurveyGizmo has taken GDPR compliance as the benchmark for protecting all of our customers’ and respondents’ privacy, regardless of where they are.
足球滚球比分We provide a GDPR Command Center with educational materials that are constantly updated, as new information, practices, and requirements become public. [DR1] All our customers have 24/7/365 access to a standard Data Processing Addendum (DPA). The DPA is a contractual agreement between our customers and SurveyGizmo to ensure we handle and process data as directed by our customers at all times. In addition, all of our employees receive GDPR training led by our own GDPR-certified Privacy Foundations and Practitioner.
SurveyGizmo has a GDPR-compliant data center in Germany to ensure customers who use our European-based datacenter will not have their respondent data transferred to the U.S. without their approval. Our other two data centers in Canada and the USA are also GDPR compliant, and our membership in Privacy Shield means customers can transfer data to our servers outside the EU with assurance it will be as protected as it is in the EU with the same rights to privacy.
足球滚球比分Thanks to our advanced privacy notice and opt-in consent process, SurveyGizmo customers can use our platform to help them comply with GDPR requirements. Account administrators can easily include necessary consents within their surveys. In the event a customer of SurveyGizmo needs to retrieve the respondents’ consent, this is easily done via the platform through the account administrator.
We make it easy for an organization to deploy data privacy disclosures and opt-in statements across their surveys throughout their organization. We also enable customers to configure a data retention policy, easily, and we will automatically purge their data based on the retention rules the customer defines.
Secure Application and Data Architecture
足球滚球比分Through Amazon Web Services (AWS), we have a fault-tolerant, highly available, and scalable infrastructure. We employ web application firewalls and load balancers to protect against intrusion and surges in traffic volume. We are committed to providing a 99.9% uptime for survey takers and application users.
足球滚球比分We utilize a Virtual Private Cloud (VPC) and also create separate network segments using AWS Security Groups, which are the equivalent of firewall rules. There are separate security groups for the different tiers of the application which restrict access on a need-to-have, least-privilege basis.
In addition, SurveyGizmo leverages global infrastructure from AWS to better serve our customers. As a SurveyGizmo customer, you choose where your data resides, and your data remains in that data center, unless you export it or request a move from our Customer Support Team.
Focused on Data Security
SurveyGizmo performed a SOC2 Type I audit in 2019 with the purpose of building a mature, continuous monitoring program to immediately start a SOC2 Type II certification in 2020 and every year thereafter. SurveyGizmo employs a full-time dedicated cybersecurity professional who specializes in building, implementing, and maintaining robust cybersecurity frameworks with experience with the DoD, DoE, Higher Education, and other public and private sector organizations.
足球滚球比分The company also works with an external third-party to perform annual penetration tests (pen tests) on our application and network. In addition, regularly test and scan the application and network to look for vulnerabilities.
Our mature Vulnerability Management program includes scanning tools, real-time alerting, and regular Vulnerability Management team meetings, which feeds into our Enterprise Risk Management Program.
SurveyGizmo is proud we do not just comply with standards and certifications; we see those standards as the foundation upon which we build our information security practice. So you know your data is safe.
Infrastructure Architecture and Controls
Infrastructure Architecture and Controls
足球滚球比分Built on AWS, following best-practices architecture
Redundant server infrastructure spanning multiple availability zones
Automated infrastructure scaling
Federated multi-tenant databases
足球滚球比分Anti-virus and malware detection
Web Application Firewalls (WAF)
足球滚球比分Stateful packet inspection via firewalls
Dedicated encrypted database instances
Full disk encryption on all office information systems
Databases and backups are encrypted with AES-256
Databases backups are performed every hour and are retained for 90 days
足球滚球比分Quarterly mock recovery tests to ensure backup integrity
Network Segmentation with DMZs, VPCs, IPSec Tunnels
All privileged user accounts require multi-factor authentication (MFA)
足球滚球比分Secure data deletion process
Centralized configuration management
24×7 monitoring and support to respond to incidents
Production servers are frequently patched to ensure their security is always up to date
All application traffic encrypted with SSL (TLS 1.2)
Password complexity and re-use rules enforced across all tiers
Passwords changed at least every 90 days
Office physical security controls (badges, cameras, alarm)
Application-Level Security Features and Controls
Team-based and Role-based permissions to manage access within SurveyGizmo
Single Sign-On (SSO) using SAML 2.0
Ability to enforce Multifactor Authentication (MFA) with TOTP or SMS
足球滚球比分Customizable survey restrictions in multi-user accounts
Row level data encryption features
Data Retention Policy (DRP) features
足球滚球比分User access logs to record all logins to your SurveyGizmo account
API access permission controls
Account password restrictions
足球滚球比分Create a Privacy / Data Use Policy for your Surveys
足球滚球比分Create an Anonymous Survey
Control SurveyGizmo Support’s access to your account
Permanently delete data
Standard Operating Procedures
Annual Risk Assessment
Annual Business Continuity / Disaster Recovery exercises
Ongoing application vulnerability scans via WhiteHat and BURP Suite
足球滚球比分Ongoing infrastructure vulnerability scans via Tenable
足球滚球比分Working with 3rd party security analysts / testers
Weekly incident review meeting
足球滚球比分Security and risk assessments integrated into SDLC
足球滚球比分Separation of duties / responsibilities
Incident response team and process
Principle of Least Privileged Access practices
足球滚球比分Documented change review process and approval for all production changes
足球滚球比分Documented escalation and incident handling processes
足球滚球比分Restricted, automated software release processes
足球滚球比分24×7 abuse report process
Company-wide mandatory security training program
Background checks for all employees
HR policies in place around acceptable use, NDA, and customer account access
足球滚球比分No third-party contractor access to production data or infrastructure
足球滚球比分Inventory management process for all technology assets