Security
Security and data practices
What to expect when your research data is in my hands.
How I protect your data
-
Access Control Configuration
LimeSurvey deployments configured with token-based respondent access, authentication scoping, and permission controls.
-
Respondent Anonymization
Surveys configured to collect no personally identifiable information where studies require it.
-
Clean Code, No Plugin Bloat
No fragile third-party dependencies that introduce vulnerabilities or unpredictable behavior.
-
WCAG 2.1 As a Baseline
Accessibility compliance is standard on every build, tested before any survey reaches a respondent.
-
Secure Data Lifecycle
Participant data is protected through collection, storage, and handoff to your team's existing tooling.
Have specific compliance or data requirements for your study? Mention them in your inquiry and I will address them directly.
Send an Inquiry