Security

Security and data practices

What to expect when your research data is in my hands.

How I protect your data

  • Access Control Configuration

    LimeSurvey deployments configured with token-based respondent access, authentication scoping, and permission controls.

  • Respondent Anonymization

    Surveys configured to collect no personally identifiable information where studies require it.

  • Clean Code, No Plugin Bloat

    No fragile third-party dependencies that introduce vulnerabilities or unpredictable behavior.

  • WCAG 2.1 As a Baseline

    Accessibility compliance is standard on every build, tested before any survey reaches a respondent.

  • Secure Data Lifecycle

    Participant data is protected through collection, storage, and handoff to your team's existing tooling.

Have specific compliance or data requirements for your study? Mention them in your inquiry and I will address them directly.

Send an Inquiry