Information collection and use
We built a research tool to help us run research. We use this tool to record the observations and the feedback we capture during our sessions. This personal information is not permanently kept in that tool, so only anonymised information will be used once the research is complete. We are dedicated to keeping your details private. We don’t collect any details about you, other than basic identifying information provided to us by the recruitment agencies we use. This will be gathered with your permission. We’ll always do our best to keep that information completely secure, and to use that information only for the purposes of a single research project. We do not pass on/sell/swap any of your personal details with anyone.
We also store videos during one-on-one user testing sessions, and audio for other forms of research. We will clearly inform you of when we are recording sessions, and what will happen with those recordings. These recordings are provided to the companies that ask us to run the research, without your personal identifying information attached. We do not keep your personal identifying information or videos or audio files once the research is complete.
We have built FlexUX to be secure. We use Secure Socket layer Protocol (SSL) encryption, to make sure others can’t see what we are storing or sharing via FlexUX. We use well trusted online servers to manage access and security, and will always keep our security as up to date as possible. We are concerned about safeguarding the confidentiality of your personally identifiable information, so all information we capture is stored in Australian-based servers.
We will make any legally-required disclosures of any breach of the security, confidentiality, or integrity of your unencrypted electronically stored personal data to you via email or conspicuous posting on this website in the most expedient time possible and without unreasonable delay, consistent with (i) the legitimate needs of law enforcement or (ii) any measures necessary to determine the scope of the breach and restore the reasonable integrity of the data system.
If you’d like to talk to us directly then please contact email@example.com.