How SurveyGizmo Safeguards Your Data

While SurveyGizmo provides an incredibly easy-to-use platform allowing users to collect all types of data from all types of sources, we also provide a powerful set of controls and tools to ensure your data is protected. We work with some of the world’s top brands across all industries, and we deploy industry-leading controls so your data is protected.

足球滚球比分We fully understand that together, we all bear responsibility for the data our customers share with us, so we don’t stop at just meeting the minimums that legislation demands. As a global provider of surveys and software, doing the right thing with data security and privacy is our bedrock.

Completely GDPR Compliant

足球滚球比分SurveyGizmo has taken GDPR compliance as the benchmark for protecting all of our customers’ and respondents’ privacy, regardless of where they are.

足球滚球比分We provide a GDPR Command Center with educational materials that are constantly updated, as new information, practices, and requirements become public. [DR1] All our customers have 24/7/365 access to a standard Data Processing Addendum (DPA). The DPA is a contractual agreement between our customers and SurveyGizmo to ensure we handle and process data as directed by our customers at all times. In addition, all of our employees receive GDPR training led by our own GDPR-certified Privacy Foundations and Practitioner.

SurveyGizmo has a GDPR-compliant data center in Germany to ensure customers who use our European-based datacenter will not have their respondent data transferred to the U.S. without their approval. Our other two data centers in Canada and the USA are also GDPR compliant, and our membership in Privacy Shield means customers can transfer data to our servers outside the EU with assurance it will be as protected as it is in the EU with the same rights to privacy.

足球滚球比分Thanks to our advanced privacy notice and opt-in consent process, SurveyGizmo customers can use our platform to help them comply with GDPR requirements. Account administrators can easily include necessary consents within their surveys. In the event a customer of SurveyGizmo needs to retrieve the respondents’ consent, this is easily done via the platform through the account administrator. 

We make it easy for an organization to deploy data privacy disclosures and opt-in statements across their surveys throughout their organization. We also enable customers to configure a data retention policy, easily, and we will automatically purge their data based on the retention rules the customer defines.

Secure Application and Data Architecture

足球滚球比分Through Amazon Web Services (AWS), we have a fault-tolerant, highly available, and scalable infrastructure. We employ web application firewalls and load balancers to protect against intrusion and surges in traffic volume. We are committed to providing a 99.9% uptime for survey takers and application users.

足球滚球比分We utilize a Virtual Private Cloud (VPC) and also create separate network segments using AWS Security Groups, which are the equivalent of firewall rules. There are separate security groups for the different tiers of the application which restrict access on a need-to-have, least-privilege basis.

In addition, SurveyGizmo leverages global infrastructure from AWS to better serve our customers. As a SurveyGizmo customer, you choose where your data resides, and your data remains in that data center, unless you export it or request a move from our Customer Support Team.

Focused on Data Security

SurveyGizmo performed a SOC2 Type I audit in 2019 with the purpose of building a mature, continuous monitoring program to immediately start a SOC2 Type II certification in 2020 and every year thereafter. SurveyGizmo employs a full-time dedicated cybersecurity professional who specializes in building, implementing, and maintaining robust cybersecurity frameworks with experience with the DoD, DoE, Higher Education, and other public and private sector organizations.

足球滚球比分The company also works with an external third-party to perform annual penetration tests (pen tests) on our application and network. In addition, regularly test and scan the application and network to look for vulnerabilities.

Our mature Vulnerability Management program includes scanning tools, real-time alerting, and regular Vulnerability Management team meetings, which feeds into our Enterprise Risk Management Program.

SurveyGizmo is proud we do not just comply with standards and certifications; we see those standards as the foundation upon which we build our information security practice. So you know your data is safe.

Infrastructure Architecture and Controls

Infrastructure Architecture and Controls

足球滚球比分Built on AWS, following best-practices architecture

Redundant server infrastructure spanning multiple availability zones

Automated infrastructure scaling

Federated multi-tenant databases

足球滚球比分Anti-virus and malware detection

足球滚球比分Web filtering

Web Application Firewalls (WAF)

足球滚球比分Stateful packet inspection via firewalls

Dedicated encrypted database instances

Full disk encryption on all office information systems

Databases and backups are encrypted with AES-256

Databases backups are performed every hour and are retained for 90 days

足球滚球比分Quarterly mock recovery tests to ensure backup integrity

Network Segmentation with DMZs, VPCs, IPSec Tunnels

All privileged user accounts require multi-factor authentication (MFA)

足球滚球比分Secure data deletion process

Centralized logging

足球滚球比分Centralized monitoring

Centralized configuration management

24×7 monitoring and support to respond to incidents

Production servers are frequently patched to ensure their security is always up to date

All application traffic encrypted with SSL (TLS 1.2)

Password complexity and re-use rules enforced across all tiers

Passwords changed at least every 90 days

Office physical security controls (badges, cameras, alarm)

Application-Level Security Features and Controls

Team-based and Role-based permissions to manage access within SurveyGizmo

Single Sign-On (SSO) using SAML 2.0

Ability to enforce Multifactor Authentication (MFA) with TOTP or SMS

足球滚球比分Customizable survey restrictions in multi-user accounts

Row level data encryption features

Data Retention Policy (DRP) features

足球滚球比分User access logs to record all logins to your SurveyGizmo account

API access permission controls

Account password restrictions

足球滚球比分Create a Privacy / Data Use Policy for your Surveys

足球滚球比分Create an Anonymous Survey

Control SurveyGizmo Support’s access to your account

Permanently delete data

Standard Operating Procedures

Annual Risk Assessment

Annual Business Continuity / Disaster Recovery exercises

Ongoing application vulnerability scans via WhiteHat and BURP Suite

足球滚球比分Ongoing infrastructure vulnerability scans via Tenable

足球滚球比分Working with 3rd party security analysts / testers

Weekly incident review meeting
足球滚球比分Security and risk assessments integrated into SDLC

足球滚球比分Separation of duties / responsibilities

Incident response team and process

Principle of Least Privileged Access practices

足球滚球比分Documented change review process and approval for all production changes

足球滚球比分Documented escalation and incident handling processes

足球滚球比分Version control

足球滚球比分Restricted, automated software release processes

足球滚球比分24×7 abuse report process

Company-wide mandatory security training program

Background checks for all employees

HR policies in place around acceptable use, NDA, and customer account access

足球滚球比分No third-party contractor access to production data or infrastructure

足球滚球比分Inventory management process for all technology assets

Put your feedback in motion

足球滚球比分Start a free 7-day trial or speak with a member of our sales team.

start a free trial