Collaboration and security

Securely manage and collaborate on data assets

Safely manage data while turning it into a valuable asset for your team and organization.

UI mockup showcasing user profile settings with input fields and buttons, set against a blue gradient background.

Collaboration and security

Securely manage and collaborate on data assets

Safely manage data while turning it into a valuable asset for your team and organization.

UI mockup showcasing user profile settings with input fields and buttons, set against a blue gradient background.

Collaboration and security

Securely manage and collaborate on data assets

Safely manage data while turning it into a valuable asset for your team and organization.

UI mockup showcasing user profile settings with input fields and buttons, set against a blue gradient background.

Collaboration and security

Securely manage and collaborate on data assets

Safely manage data while turning it into a valuable asset for your team and organization.

UI mockup showcasing user profile settings with input fields and buttons, set against a blue gradient background.

Data assets give your business a competitive edge

Project invitation and data access permission settings

Invite collaborators to a project with necessary permissions, allowing flexible collaboration while maintaining data security.

Blank interface displaying items with options for selection and settings.

Project invitation and data access permission settings

Invite collaborators to a project with necessary permissions, allowing flexible collaboration while maintaining data security.
Blank interface displaying items with options for selection and settings.

Project invitation and data access permission settings

Invite collaborators to a project with necessary permissions, allowing flexible collaboration while maintaining data security.

Blank interface displaying items with options for selection and settings.

Project invitation and data access permission settings

Invite collaborators to a project with necessary permissions, allowing flexible collaboration while maintaining data security.

Blank interface displaying items with options for selection and settings.

Space permission settings

We support granular management of space permissions for specific purposes such as Admin, Team, Privacy, Security, and Developer.

Screenshot of a user interface displaying a form with fields for name, email, and a message.

Space permission settings

We support granular management of space permissions for specific purposes such as Admin, Team, Privacy, Security, and Developer.
Screenshot of a user interface displaying a form with fields for name, email, and a message.

Space permission settings

We support granular management of space permissions for specific purposes such as Admin, Team, Privacy, Security, and Developer.

Screenshot of a user interface displaying a form with fields for name, email, and a message.

Space permission settings

We support granular management of space permissions for specific purposes such as Admin, Team, Privacy, Security, and Developer.

Screenshot of a user interface displaying a form with fields for name, email, and a message.

SSO (Single Sign-On) login

SSO logins provide users with login convenience while enabling businesses to strengthen security management.

Login interface displaying fields for email and password, with a blue "Submit" button at the bottom.

SSO (Single Sign-On) login

SSO logins provide users with login convenience while enabling businesses to strengthen security management.
Login interface displaying fields for email and password, with a blue "Submit" button at the bottom.

SSO (Single Sign-On) login

SSO logins provide users with login convenience while enabling businesses to strengthen security management.

Login interface displaying fields for email and password, with a blue "Submit" button at the bottom.

SSO (Single Sign-On) login

SSO logins provide users with login convenience while enabling businesses to strengthen security management.

Login interface displaying fields for email and password, with a blue "Submit" button at the bottom.

IP access control

By restricting login access to only specified IPs, you can block unauthorized access to data and ensure compliance with security standards.

Screenshot of a user interface displaying options, including settings and permissions for a file or application.

IP access control

By restricting login access to only specified IPs, you can block unauthorized access to data and ensure compliance with security standards.
Screenshot of a user interface displaying options, including settings and permissions for a file or application.

IP access control

By restricting login access to only specified IPs, you can block unauthorized access to data and ensure compliance with security standards.

Screenshot of a user interface displaying options, including settings and permissions for a file or application.

IP access control

By restricting login access to only specified IPs, you can block unauthorized access to data and ensure compliance with security standards.

Screenshot of a user interface displaying options, including settings and permissions for a file or application.

Inactivity timeout

By automatically logging out users after a period of inactivity, minimize security risks and prevent data leaks.

A digital form with fields for entering numbers and description, against a light blue background.

Inactivity timeout

By automatically logging out users after a period of inactivity, minimize security risks and prevent data leaks.
A digital form with fields for entering numbers and description, against a light blue background.

Inactivity timeout

By automatically logging out users after a period of inactivity, minimize security risks and prevent data leaks.

A digital form with fields for entering numbers and description, against a light blue background.

Inactivity timeout

By automatically logging out users after a period of inactivity, minimize security risks and prevent data leaks.

A digital form with fields for entering numbers and description, against a light blue background.

Manage security log

Manage member usage by reviewing access logs, personal data download records, permission change logs, and security settings status.

Two rows of text boxes displayed on a screen, labeled with options or settings.

Manage security log

Manage member usage by reviewing access logs, personal data download records, permission change logs, and security settings status.
Two rows of text boxes displayed on a screen, labeled with options or settings.

Manage security log

Manage member usage by reviewing access logs, personal data download records, permission change logs, and security settings status.

Manage security log

Manage member usage by reviewing access logs, personal data download records, permission change logs, and security settings status.

Two rows of text boxes displayed on a screen, labeled with options or settings.

Protect respondents' data
with security best practices

Protect respondents' data with security best practices

Dataspace provides a 'personal information' question type for collecting sensitive data such as name, phone number, and address.

User interface showing a dropdown menu with options for selecting a value, displayed on a blue background.

Dataspace provides a 'personal information' question type for collecting sensitive data such as name, phone number, and address.

User interface showing a dropdown menu with options for selecting a value, displayed on a blue background.

Information collected using personal information question types is encrypted and securely stored.

Diagram showing a locked padlock icon and a table with blank fields, suggesting security settings or access controls.

Information collected using personal information question types is encrypted and securely stored.

Diagram showing a locked padlock icon and a table with blank fields, suggesting security settings or access controls.

Information collected using personal information question types allows you to set a retention period. After the retention period ends, the data is automatically disposed of.

Two chat message boxes with text, one containing a prompt and the other showing a response, themed in blue.

Information collected using personal information question types allows you to set a retention period. After the retention period ends, the data is automatically disposed of.

Two chat message boxes with text, one containing a prompt and the other showing a response, themed in blue.

Data assets need to be protected safely

Dataspace has safeguards across data collection, project access levels, and collaboration features such downloading and sharing.

A set of three symbols: a diamond shape, a circular shape, and a rectangular shape with a pattern.

Dataspace has safeguards across data collection, project access levels, and collaboration features such downloading and sharing.

A set of three symbols: a diamond shape, a circular shape, and a rectangular shape with a pattern.

Dataspace has safeguards across data collection, project access levels, and collaboration features such downloading and sharing.

A set of three symbols: a diamond shape, a circular shape, and a rectangular shape with a pattern.

Dataspace ensures secure data management with Google and AWS cloud security, continuously advancing privacy and protection practices.

A stylized icon featuring a paper document with a pin and folded corner, set on a dark blue background.

Dataspace ensures secure data management with Google and AWS cloud security, continuously advancing privacy and protection practices.

A stylized icon featuring a paper document with a pin and folded corner, set on a dark blue background.

Dataspace ensures secure data management with Google and AWS cloud security, continuously advancing privacy and protection practices.

A stylized icon featuring a paper document with a pin and folded corner, set on a dark blue background.

Personal data is automatically encrypted, stored securely, and deleted safely.

Icons of cutlery, a plate with food, a cup, and a beer mug on a subtle gray background.

Personal data is automatically encrypted, stored securely, and deleted safely.

Icons of cutlery, a plate with food, a cup, and a beer mug on a subtle gray background.

Personal data is automatically encrypted, stored securely, and deleted safely.

Icons of cutlery, a plate with food, a cup, and a beer mug on a subtle gray background.

Certification Number: ISMS-P-KISA-2023-027
Certification Scope: Research Platform Service
Validity Period: 2023.7.5 ~ 2026.7.4

Copyright © Opensurvey Inc