Overall Information Security Policy

 

4.9 Data Quality Assurances in Special Precaution Markets

 

  • In markets where data quality is a known issue it’s necessary to cover this with the client in advance, at quoting and commissioning stage.
  • On commission, suggest and agree upon a data quality regime with both client in advance and in writing, options it might include:
    • Slow release sample with 10%, 25%, 50% and 75% full data checks, including trend analysis at 50% and 75%.
    • Secondary validation of 10% of quant interviews by re-contact.
    • Inclusion of red herring questions.
    • Inclusion of question timers that does not allow Next until minimum time lapsed.
    • When using data entry, 25% validated by independent data inputter
    • When using offline methods, include a check of identity before interview, re-contact of 10% of participants to validate the interviews, and listening/monitoring of 5% of interviews. All interviewers should have at least one interview either validated or monitored

 

5.0 Information Security Policy for QDATAMS’ Staff and Vendors

 

This emphasizes the importance that QDATAMS’ places on data security. Each person in the company has the individual responsibility for maintenance of security over QDATAMS’ AND CLIENTS’ information under his/her control.  We ensure review of the following precautions and be sure that they are understood by all of all employees for the general protection of QDATAMS’ AND CLIENTS’s information – recognizing all forms of such data including printed reports, digital, other computer storage materials, equipment and word of mouth. These include:

 

  1. Practicing the clean/locked desk policy after-hours and during any long absence.
  2. Controlling access to electronic and hard copy files, storyboards, scripts, etc.
  3. Securing all faxes and e-mails.
  4. All passwordsmust be at least 8(eight) characters, and contain a combination of numbers, symbols, uppercase letters, lowercase letters, and spaces. The password would be free of repetition, dictionary words, usernames, pronouns, IDs, and any other predefined number or letter sequences.
  5. Avoiding discussion about QDATAMS’ AND CLIENTS’s sensitive information with anyone who does not have a need-to-know.
  6. Not discussing QDATAMS’ AND CLIENTS’ information in public places such as restaurants and airplanes.
  7. Ensuring that when competitively sensitive material is no longer needed, it is shredded.
  8. Routinely challenging unknown visitors in your area or people who are not identified.
  9. Practicing the call back procedure when you’re not absolutely sure of a caller’s identity and need to know and competitively sensitive information is involved.
  10. Ensuring that all suspected breaches of security are reported to the company’s designated security coordinator for further reporting to CLIENTS’ contact and/or CLIENTS’s Corporate Security.
  11. Ensuring that QDATAMS’ AND CLIENTS’s sensitive test materials are protected during fieldwork and no sensitive test material is visible to those other than respondents.
  12. Ensuring that respondents are sensitively screened prior to any research and any respondent who have relatives/close friends working for competition, agencies, stores, etc. are eliminated from the sample.

 

In many cases, the secure handling of sensitive QDATAMS’ AND CLIENTS’ information affects the STAFF, CLIENT and QDATAMS as a firm.  Knowledge to all staff is our competitive advantage.

These general guidelines are not intended to be all-inclusive, but rather a helpful reminder of our obligations and responsibilities regarding information security. The key is for us to be aware that our clients’ competitors are trying to obtain our information and it is up to us as a valued business partner to ensure that this does not happen. Equally, we are guiding by ethical principles surrounding safeguarding our research participants.