Collaboration and security

Securely manage and collaborate on data assets

Safely manage data while turning it into a valuable asset for your team and organization.

Data assets give your business a competitive edge. Enhance your business with data asset security features.

Data assets give your business a competitive edge. Enhance your business with data asset security features.

Data sharing and collaboration

Secure collaboration

Control access so that only authorized individuals can access necessary data.
Project invitations and data access permission settings
Project invitations and data access permission settings

Project invitations and data access permission settings

Invite collaborators to a project with necessary permissions, allowing flexible collaboration while maintaining data security.

Space permission settings
Space permission settings

Space permission settings

We support granular management of space permissions for specific purposes such as Admin, Team, Privacy, Security, and Developer.

SSO (Single Sign-On) Login
SSO (Single Sign-On) Login

SSO (Single Sign-On) Login

SSO logins provide users with login convenience while enabling businesses to strengthen security management.

IP access control
IP access control

IP access control

By restricting login access to only specified IPs, you can block unauthorized access to data and ensure compliance with security standards.

Inactivity timeout
Inactivity timeout

Inactivity timeout

By automatically logging out users after a period of inactivity, minimize security risks and prevent data leaks.

Manage security log
Manage security log

Manage security log

Manage member usage by reviewing access logs, personal data download records, permission change logs, and security settings status.

Privacy protections and controls

Protect respondents' data with security best practices

Personal information is encrypted for storage and securely disposed of when no longer needed.

Question type

Specialized question types for collecting personal information

Dataspace provides a 'personal information' question type for collecting sensitive data such as name, phone number, and address.
    Specialized question type for collecting personal information ensures encryption and timely disposal

    Encryption

    Personal information, encrypted and stored

    Information collected using personal information question types is encrypted and securely stored.
      Personal information, encrypted and stored

      Automatic disposal

      Automatically dispose of after the retention period expires

      Information collected using personal information question types allows you to set a retention period. After the retention period ends, the data is automatically disposed of.
        Automatically dispose of after the retention period expires

        Security

        Data assets need to be protected safely.

        Dataspace automatically detects whether sensitive fields are being collected in the survey design process. Sensitive fields are then automatically encrypted and deleted to support compliance with security and privacy standards.
        Secure collaboration
        Secure collaboration

        Secure collaboration

        Dataspace has safeguards across data collection, project access levels, and collaboration features such downloading and sharing.

        Google/AWS Cloud Security
        Google/AWS Cloud Security

        Google/AWS Cloud Security

        Dataspace leverages Google and AWS cloud security for secure data management. We continuously implement evolving privacy and data protection processes, procedures, and best practices.

        Data encryption and deletion
        Data encryption and deletion

        Data encryption and deletion

        Personal data is automatically encrypted, stored securely, and deleted safely

        From data collection to experience analysis, get started with Dataspace