Collaboration and security

Securely manage and collaborate on data assets

Safely manage data while turning it into a valuable asset for your team and organization.

UI mockup showcasing user profile settings with input fields and buttons, set against a blue gradient background.

Collaboration and security

Securely manage and collaborate on data assets

Safely manage data while turning it into a valuable asset for your team and organization.

UI mockup showcasing user profile settings with input fields and buttons, set against a blue gradient background.

Collaboration and security

Securely manage and collaborate on data assets

Safely manage data while turning it into a valuable asset for your team and organization.

UI mockup showcasing user profile settings with input fields and buttons, set against a blue gradient background.

Collaboration and security

Securely manage and collaborate on data assets

Safely manage data while turning it into a valuable asset for your team and organization.

UI mockup showcasing user profile settings with input fields and buttons, set against a blue gradient background.

Data assets give your business a competitive edge

Permission settings

Project invitation and data access permission settings

Invite collaborators to a project with necessary permissions, allowing flexible collaboration while maintaining data security.

Blank interface displaying items with options for selection and settings.

Permission settings

Project invitation and data access permission settings

Invite collaborators to a project with necessary permissions, allowing flexible collaboration while maintaining data security.
Blank interface displaying items with options for selection and settings.

Permission settings

Project invitation and data access permission settings

Invite collaborators to a project with necessary permissions, allowing flexible collaboration while maintaining data security.

Blank interface displaying items with options for selection and settings.

Permission settings

Project invitation and data access permission settings

Invite collaborators to a project with necessary permissions, allowing flexible collaboration while maintaining data security.

Blank interface displaying items with options for selection and settings.

Permission granularity

Space permission settings

We support granular management of space permissions for specific purposes such as Admin, Team, Privacy, Security, and Developer.

Screenshot of a user interface displaying a form with fields for name, email, and a message.

Permission granularity

Space permission settings

We support granular management of space permissions for specific purposes such as Admin, Team, Privacy, Security, and Developer.
Screenshot of a user interface displaying a form with fields for name, email, and a message.

Permission granularity

Space permission settings

We support granular management of space permissions for specific purposes such as Admin, Team, Privacy, Security, and Developer.

Screenshot of a user interface displaying a form with fields for name, email, and a message.

Permission granularity

Space permission settings

We support granular management of space permissions for specific purposes such as Admin, Team, Privacy, Security, and Developer.

Screenshot of a user interface displaying a form with fields for name, email, and a message.

Login

SSO (Single Sign-On) login

SSO logins provide users with login convenience while enabling businesses to strengthen security management.

Login interface displaying fields for email and password, with a blue "Submit" button at the bottom.

Login

SSO (Single Sign-On) login

SSO logins provide users with login convenience while enabling businesses to strengthen security management.
Login interface displaying fields for email and password, with a blue "Submit" button at the bottom.

Login

SSO (Single Sign-On) login

SSO logins provide users with login convenience while enabling businesses to strengthen security management.

Login interface displaying fields for email and password, with a blue "Submit" button at the bottom.

Login

SSO (Single Sign-On) login

SSO logins provide users with login convenience while enabling businesses to strengthen security management.

Login interface displaying fields for email and password, with a blue "Submit" button at the bottom.

IP control

IP access control

By restricting login access to only specified IPs, you can block unauthorized access to data and ensure compliance with security standards.

Screenshot of a user interface displaying options, including settings and permissions for a file or application.

IP control

IP access control

By restricting login access to only specified IPs, you can block unauthorized access to data and ensure compliance with security standards.
Screenshot of a user interface displaying options, including settings and permissions for a file or application.

IP control

IP access control

By restricting login access to only specified IPs, you can block unauthorized access to data and ensure compliance with security standards.

Screenshot of a user interface displaying options, including settings and permissions for a file or application.

IP control

IP access control

By restricting login access to only specified IPs, you can block unauthorized access to data and ensure compliance with security standards.

Screenshot of a user interface displaying options, including settings and permissions for a file or application.

Logout

Inactivity timeout

By automatically logging out users after a period of inactivity, minimize security risks and prevent data leaks.

A digital form with fields for entering numbers and description, against a light blue background.

Logout

Inactivity timeout

By automatically logging out users after a period of inactivity, minimize security risks and prevent data leaks.
A digital form with fields for entering numbers and description, against a light blue background.

Logout

Inactivity timeout

By automatically logging out users after a period of inactivity, minimize security risks and prevent data leaks.

A digital form with fields for entering numbers and description, against a light blue background.

Logout

Inactivity timeout

By automatically logging out users after a period of inactivity, minimize security risks and prevent data leaks.

A digital form with fields for entering numbers and description, against a light blue background.

Log management

Manage security log

Manage member usage by reviewing access logs, personal data download records, permission change logs, and security settings status.

Two rows of text boxes displayed on a screen, labeled with options or settings.

Log management

Manage security log

Manage member usage by reviewing access logs, personal data download records, permission change logs, and security settings status.
Two rows of text boxes displayed on a screen, labeled with options or settings.

Log management

Manage security log

Manage member usage by reviewing access logs, personal data download records, permission change logs, and security settings status.

Log management

Manage security log

Manage member usage by reviewing access logs, personal data download records, permission change logs, and security settings status.

Two rows of text boxes displayed on a screen, labeled with options or settings.

Protect respondents' data
with security best practices

Protect respondents' data with security best practices

Question type

Dataspace provides a 'personal information' question type for collecting sensitive data such as name, phone number, and address.

User interface showing a dropdown menu with options for selecting a value, displayed on a blue background.

Question type

Dataspace provides a 'personal information' question type for collecting sensitive data such as name, phone number, and address.

User interface showing a dropdown menu with options for selecting a value, displayed on a blue background.

Encryption

Information collected using personal information question types is encrypted and securely stored.

Diagram showing a locked padlock icon and a table with blank fields, suggesting security settings or access controls.

Encryption

Information collected using personal information question types is encrypted and securely stored.

Diagram showing a locked padlock icon and a table with blank fields, suggesting security settings or access controls.

Automatic disposal

Information collected using personal information question types allows you to set a retention period. After the retention period ends, the data is automatically disposed of.

Two chat message boxes with text, one containing a prompt and the other showing a response, themed in blue.

Automatic disposal

Information collected using personal information question types allows you to set a retention period. After the retention period ends, the data is automatically disposed of.

Two chat message boxes with text, one containing a prompt and the other showing a response, themed in blue.

Data assets need to be protected safely

Secure collaboration

Dataspace has safeguards across data collection, project access levels, and collaboration features such downloading and sharing.

A set of three symbols: a diamond shape, a circular shape, and a rectangular shape with a pattern.

Secure collaboration

Dataspace has safeguards across data collection, project access levels, and collaboration features such downloading and sharing.

A set of three symbols: a diamond shape, a circular shape, and a rectangular shape with a pattern.

Secure collaboration

Dataspace has safeguards across data collection, project access levels, and collaboration features such downloading and sharing.

A set of three symbols: a diamond shape, a circular shape, and a rectangular shape with a pattern.

Google/AWS Cloud Security

Dataspace ensures secure data management with Google and AWS cloud security, continuously advancing privacy and protection practices.

A stylized icon featuring a paper document with a pin and folded corner, set on a dark blue background.

Google/AWS Cloud Security

Dataspace ensures secure data management with Google and AWS cloud security, continuously advancing privacy and protection practices.

A stylized icon featuring a paper document with a pin and folded corner, set on a dark blue background.

Google/AWS Cloud Security

Dataspace ensures secure data management with Google and AWS cloud security, continuously advancing privacy and protection practices.

A stylized icon featuring a paper document with a pin and folded corner, set on a dark blue background.

Data encryption and deletion

Personal data is automatically encrypted, stored securely, and deleted safely.

Icons of cutlery, a plate with food, a cup, and a beer mug on a subtle gray background.

Data encryption and deletion

Personal data is automatically encrypted, stored securely, and deleted safely.

Icons of cutlery, a plate with food, a cup, and a beer mug on a subtle gray background.

Data encryption and deletion

Personal data is automatically encrypted, stored securely, and deleted safely.

Icons of cutlery, a plate with food, a cup, and a beer mug on a subtle gray background.

Certification Number: ISMS-P-KISA-2023-027
Certification Scope: Research Platform Service
Validity Period: 2023.7.5 ~ 2026.7.4

Copyright © Opensurvey Inc