How SurveyGizmo Safeguards Your Data
While SurveyGizmo provides an incredibly easy-to-use platform allowing users to collect all types of data from all types of sources, we also provide a powerful set of controls and tools to ensure your data is protected. We work with some of the world’s top brands across all industries, and we deploy industry-leading controls so your data is protected.
We fully understand that together, we all bear responsibility for the data our customers share with us, so we don’t stop at just meeting the minimums that legislation demands. As a global provider of surveys and software, doing the right thing with data security and privacy is our bedrock.
Completely GDPR Compliant
SurveyGizmo has taken GDPR compliance as the benchmark for protecting all of our customers’ and respondents’ privacy, regardless of where they are.
足球滚球比分We provide a GDPR Command Center with educational materials that are constantly updated, as new information, practices, and requirements become public. [DR1] All our customers have 24/7/365 access to a standard Data Processing Addendum (DPA). The DPA is a contractual agreement between our customers and SurveyGizmo to ensure we handle and process data as directed by our customers at all times. In addition, all of our employees receive GDPR training led by our own GDPR-certified Privacy Foundations and Practitioner.
足球滚球比分SurveyGizmo has a GDPR-compliant data center in Germany to ensure customers who use our European-based datacenter will not have their respondent data transferred to the U.S. without their approval. Our other two data centers in Canada and the USA are also GDPR compliant, and our membership in Privacy Shield means customers can transfer data to our servers outside the EU with assurance it will be as protected as it is in the EU with the same rights to privacy.
Thanks to our advanced privacy notice and opt-in consent process, SurveyGizmo customers can use our platform to help them comply with GDPR requirements. Account administrators can easily include necessary consents within their surveys. In the event a customer of SurveyGizmo needs to retrieve the respondents’ consent, this is easily done via the platform through the account administrator.
We make it easy for an organization to deploy data privacy disclosures and opt-in statements across their surveys throughout their organization. We also enable customers to configure a data retention policy, easily, and we will automatically purge their data based on the retention rules the customer defines.
Secure Application and Data Architecture
足球滚球比分Through Amazon Web Services (AWS), we have a fault-tolerant, highly available, and scalable infrastructure. We employ web application firewalls and load balancers to protect against intrusion and surges in traffic volume. We are committed to providing a 99.9% uptime for survey takers and application users.
We utilize a Virtual Private Cloud (VPC) and also create separate network segments using AWS Security Groups, which are the equivalent of firewall rules. There are separate security groups for the different tiers of the application which restrict access on a need-to-have, least-privilege basis.
足球滚球比分In addition, SurveyGizmo leverages global infrastructure from AWS to better serve our customers. As a SurveyGizmo customer, you choose where your data resides, and your data remains in that data center, unless you export it or request a move from our Customer Support Team.
Focused on Data Security
SurveyGizmo performed a SOC2 Type I audit in 2019 with the purpose of building a mature, continuous monitoring program to immediately start a SOC2 Type II certification in 2020 and every year thereafter. SurveyGizmo employs a full-time dedicated cybersecurity professional who specializes in building, implementing, and maintaining robust cybersecurity frameworks with experience with the DoD, DoE, Higher Education, and other public and private sector organizations.
足球滚球比分The company also works with an external third-party to perform annual penetration tests (pen tests) on our application and network. In addition, regularly test and scan the application and network to look for vulnerabilities.
足球滚球比分Our mature Vulnerability Management program includes scanning tools, real-time alerting, and regular Vulnerability Management team meetings, which feeds into our Enterprise Risk Management Program.
足球滚球比分SurveyGizmo is proud we do not just comply with standards and certifications; we see those standards as the foundation upon which we build our information security practice. So you know your data is safe.
Infrastructure Architecture and Controls
Infrastructure Architecture and Controls
Built on AWS, following best-practices architecture
足球滚球比分Redundant server infrastructure spanning multiple availability zones
足球滚球比分Automated infrastructure scaling
足球滚球比分Federated multi-tenant databases
Anti-virus and malware detection
足球滚球比分Web Application Firewalls (WAF)
足球滚球比分Stateful packet inspection via firewalls
Dedicated encrypted database instances
Full disk encryption on all office information systems
足球滚球比分Databases and backups are encrypted with AES-256
Databases backups are performed every hour and are retained for 90 days
足球滚球比分Quarterly mock recovery tests to ensure backup integrity
足球滚球比分Network Segmentation with DMZs, VPCs, IPSec Tunnels
足球滚球比分All privileged user accounts require multi-factor authentication (MFA)
Secure data deletion process
Centralized configuration management
足球滚球比分24×7 monitoring and support to respond to incidents
足球滚球比分Production servers are frequently patched to ensure their security is always up to date
足球滚球比分All application traffic encrypted with SSL (TLS 1.2)
Password complexity and re-use rules enforced across all tiers
足球滚球比分Passwords changed at least every 90 days
Office physical security controls (badges, cameras, alarm)
Application-Level Security Features and Controls
足球滚球比分Team-based and Role-based permissions to manage access within SurveyGizmo
Single Sign-On (SSO) using SAML 2.0
足球滚球比分Ability to enforce Multifactor Authentication (MFA) with TOTP or SMS
足球滚球比分Customizable survey restrictions in multi-user accounts
Row level data encryption features
足球滚球比分Data Retention Policy (DRP) features
User access logs to record all logins to your SurveyGizmo account
足球滚球比分API access permission controls
Account password restrictions
Create a Privacy / Data Use Policy for your Surveys
Create an Anonymous Survey
Control SurveyGizmo Support’s access to your account
Permanently delete data
Standard Operating Procedures
足球滚球比分Annual Risk Assessment
Annual Business Continuity / Disaster Recovery exercises
Ongoing application vulnerability scans via WhiteHat and BURP Suite
Ongoing infrastructure vulnerability scans via Tenable
Working with 3rd party security analysts / testers
Weekly incident review meeting
足球滚球比分Security and risk assessments integrated into SDLC
Separation of duties / responsibilities
Incident response team and process
足球滚球比分Principle of Least Privileged Access practices
Documented change review process and approval for all production changes
Documented escalation and incident handling processes
Restricted, automated software release processes
24×7 abuse report process
Company-wide mandatory security training program
足球滚球比分Background checks for all employees
HR policies in place around acceptable use, NDA, and customer account access
No third-party contractor access to production data or infrastructure
足球滚球比分Inventory management process for all technology assets