D6 Research is founded on the principles of advancement and benefit for the end user community. The mission of our surveys is to collect broad and reliable feedback from the real-world that can be analyzed for unique insights thereby benefiting the end user community as a whole. Therefore:
Policy Regarding Privacy of Participant’s Information
Survey metadata is only used for research purposes. It is not used for any activities related to marketing or selling products and services to those that participate.
D6 Research does not sell your survey metadata or any information about you to any third parties.
Survey Integrity Policy
End user surveys are conducted to provide insights that benefit the end user community. D6 endeavors to discover emerging requirements and highlight legacy common practices that should be phased out thereby defining new best practices that are in alignment with achieving next generation organizational security and business demands.
Therefore, surveys conducted for the end user market are executed independently of vendors, manufacturers and their respective channels. We do not accept payment, compensation or allow these parties to define, direct, or directly influence the scope, details or activities regarding the research.
We do not perform research or surveys on behalf of vendors, manufacturers or their respective channels. Therefore, D6 Research does not market or share the survey metadata or information about participants to these parties.
We may review the research scope with such parties to gain feedback to consider additional discovery concepts and may disclose insights (not metadata or individual responses) that inform to disclose the collective demand of the end user community to enable them to make improvements that align with end user goals.
Some of our surveys are conducted as “controlled” surveys and are invite-only because we need to rely on the accuracy of the profile of the person/organization that is responding to it.
Controlled surveys require the participant receive and use a code to take the survey. This enables them to identify themselves only to the analyst performing analysis while not having any of their responses or meta data attributed to them or their organization by anyone else (in the case of a breach or rogue access).
The survey responses are initially collected in Survey Monkey, a third party platform. However, for controlled surveys, the responses and metadata cannot be assembled and be attributed to any of the respondents that participated in the survey. For “open” surveys (survey conducted that do not require a code to participate) participant responded and metadata could potentially be assembled to be attributed to respondents however access to this service and the results is restricted and typically such open surveys limit disclosures of personally identifiable information.
Surveys conducted by D6 Research will always disclose and note as to whether they are open or controlled surveys.
Security and Protection of Participant’s Information:
The information (responses, metadata, etc.) is ported to a D6 Research controlled database to be combined with other data.
The collective D6 database and encrypted using the latest standard cryptographic algorithms.
In addition to encrypting the database, a separate cipher is employed that must be used to determine any association between responses, metadata, and participants identity. This cipher is kept offline at all times (disconnected from the internet), in a separate location from the database, and encrypted at all times when not in use.
Only one person at D6, the Chief Executive Officer, holds the private cryptographic key (stored separately from the database and cipher computer/server on a secure element) that can only be used with their consent, presence, and action to perform the decryption process with the secure element device and secret. Therefore, access to controlled survey information that could be used to attribute specific responses to an individual or organization is tightly controlled using the highest information security practices and principals.