UserTesting Security

We take data safety and security seriously. We protect customer and test participant data using industry-leading controls and systems that prevent unauthorized access, damage, and unintentional deletion.

 

Review Our Security Profile on Whistic

We make it easy to validate the safety of your data with us by bringing together all the security documentation you’re looking for in a single online Security Profile. Reports, certificates, audits, questionnaires–they’re all here. Follow the link above to access our current security profile. 

 

 

Image
usertesting-security-hero

Data hosting and encryption

All confidential and proprietary data (including video files, customer and test participant data) is hosted through Amazon Web Services (AWS), a SOC 2 and ISO 27017 certified hosting provider.

All data is encrypted at rest and in transit. Data is stored in encrypted form using 256-bit AES encryption. Encryption keys are managed by AWS Key Management Services.

All communication to and from the data center is encrypted using TLS 1.2 or greater.

Image
Data Hosting

Service authentication

Complex passwords are required for customer and test participant access, including built-in password requirements for every Live Conversation session. Users are logged out of the system after periods of inactivity.

Image
service authentication

Single sign-on

UserTesting also supports login via single sign-on using SAML 2.0 protocols. This enables customers to implement additional security requirements for passwords and the login process.

Image
single sign on

Data collection

The platform isn’t designed to collect PII. Rather, we collect a little PII to manage demographics and connect you with the right test participant. We don’t share a participant’s name with you. You only know that they meet your demographic requirements and you see them by their self-selected “handle” or profile name which doesn’t match up with their actual name.

Image
data collection

Data processing

When following instructions during completion of a recorded test, or participating in a live interview session, UserTesting may record some or all of the following:

  • Device screen
  • Voice
  • Camera input (which may include participant’s face)
  • Answers to any questions in the instructions

 

The resulting video and answers are then available to customers for further processing using the platform including:

  • Note taking
  • Video clip creation
  • Highlight reel creation
  • Machine transcription
  • Sharing of videos (full videos, clips and highlight reels)
  • Downloading of videos (full videos, clips and highlight reels)
  • Downloading of notes, transcripts and links to videos in excel format

 

While this additional processing is facilitated by the platform, it is completely controlled by the customer.

Image
data processing

Disaster recovery and business continuity

Disaster recovery and business continuity are included as part of UserTesting’s security policy. The platform has been designed to be robust and recoverable.

Image
data recovery

Compliance certifications and membership

 

Auditing

Compliant with auditing criteria as developed by the American Institute of CPAs, ensuring customer data is securely managed

 

Data protection

Certified as an ISO/IEC 27001 Information Security Management System (ISMS)

 

Privacy compliance

Certified as an ISO/IEC 27701 Privacy Information Management System (PIMS)

 

Health data protection

Compliant with the Health Insurance Portability and Accountability Act of 1996 (HIPAA)

 

Cloud Security Alliance

Active membership in organization sharing best practices, tools, training, and thought leadership on cloud security

The UserTesting security team is here to help

Our security team includes staff responsible for ensuring ongoing information security, including:


Physical security, inclusive of annual physical security audits


Active membership in organization sharing best practices, tools, training, and thought leadership on cloud security

 


Administration of security training, ensuring all employees are trained on how to best protect confidential information


Immediate attention to inquiries, potential breaches, or other alerts indicating anomalies or issues