Security of your data is an absolute priority to us. It’s a guiding beacon that we follow strictly when shaping the power and features of Nfield, and we make a great effort to assure that both our team and our software solutions comply with the strongest security measures. Learn more about the things we do to keep your data safe.
Microsoft – Nfield runs on Microsoft Azure, the highly secured cloud known for its flawless, trusted performance, extensive data storage, and reliability. Microsoft’s engineers work 24/7 to protect the cloud, scale its powers, and administer other services which run on the Azure such as Xbox, Office365 or Hotmail.https://azure.microsoft.comNIPO security – we maintain a strong security policy to ensure that your data and our products are safeguarded round the clock. Independent security experts scrutinize our security procedures every year to evaluate our tools, processes and people. The ISO 27001:2013 certification measures are followed strictly by every wire connection and person in the company. As a matter of course, only a small team of the NIPO specialists has access to the Nfield infrastructure.GDPR compliance – Nfield is fully compliant with GDPR, enabling users to take care of consent management and other important privacy requirements. Contact our team at email@example.com for further information.
1. Separate domains – your projects are allocated on your own separate domain, inaccessible to anyone else – even our employees – unless explicitly requested by you in the context of customer support. 2. Access and logging – a user role configuration defines the scale of activities the user is allowed to perform in Nfield. What’s more, your domain administrator sets password requirements in the software interface so that you can apply your own strict password policy. All actions taken by users are tracked and your domain administrators can revise them individually. The system automatically signs out the user when inactive for more than 15 minutes.
63 % of confirmed data breaches involved leveraging weak, default or stolen passwords, according to the Verizon’s Data Breach Investigations Report. Please ensure that you have a stringent password policy in place.
3. Data backup – the collected data is stored in secure Microsoft SQL database servers and replicated to other data centers so that it can be restored in the event of an emergency. Microsoft security policies regulate strict access to the data centers. 4. Data encryption – all your data is secured by SSL and encrypted for protection against data sniffing.
Packet sniffing allows individuals to capture data as it is transmitted over a network and is used by network professionals to diagnose network issues, and by malicious users to capture unencrypted data, like passwords and usernames. If this information is captured in transit, a user can gain access to a system or network.
1. Your control over CAPI devices – a survey questionnaire with other project information is displayed to the interviewer only when two conditions are met:
What happens next?
2. Secure sharing of CAPI device – your interviewers can use the same mobile device to conduct surveys. Assigned surveys and collected data is stored per interviewer (upon the personal username and password). Interviewers cannot review, start or modify any other surveys conducted on the same device.3. Encoded questionnaires – NIPO’ questionnaires are compiled at the start of an interview from an encoded proprietary format. The original script is never displayed in an interviewer device so the interviewer cannot make changes to the survey.
According to Verizon, 26 % of miscellaneous errors involved sending information to the wrong person. Please see our page on CAPI for some useful tips to combat this.
Get notified when we publish new handy tips and important news about Nfield
© 2020 NIPO | Privacy | Cookie disclosure | Sitemap