AI & Compliance
Intuify utilizes AI to not only enhance the survey experience, but improve the efficiency of our analysis tools. From live dynamic probing to auto-coding thousands of open-ended respondents, AI is an integral part to our research methodologies.
​
We recognize the significance of using AI for data collection in research and are committed to ensuring that all data is handled in a formal and secure manner. At Intuify, we take proactive steps to adhere to key compliance standards, ensuring the safety and security of both your data and that of your respondents.
.jpg)

-
Your data is stored in the USA and EU as required
-
Your data is never used to store other people's LLMs
-
Our analysis tool platform is agnostic and data is fully portable.
​
And most importantly...

Our Standards and Compliances

Intuify is proud to announce we are SOC 2 Type I compliant!
​
What is SOC 2 Type I compliance?
SOC 2 Type I is an audit report that evaluates a company's controls relevant to the Trust Services Criteria (TSC) at a specific point in time. It focuses on whether the company's policies and procedures are properly designed to meet the criteria for security, availability, processing integrity, confidentiality, and privacy. The report confirms that the company’s controls are in place and functioning at that specific moment but does not assess their ongoing effectiveness over time. It's often used by businesses to demonstrate to clients and partners that they have the necessary measures in place to protect data.

​What is CyberGRX Tier 2 Certification?
CyberGRX Tier 2 certification is part of the CyberGRX Third-Party Cyber Risk Management platform, which helps organizations assess and manage the cyber risks associated with their third-party vendors. The Tier 2 certification is a level that focuses on evaluating the security posture of a vendor, providing a comprehensive assessment that includes detailed controls and measures.
​
The certification helps organizations understand the level of risk their vendors pose in terms of cybersecurity, ensuring that these vendors have appropriate security measures in place to protect sensitive data and mitigate risks. Tier 2 typically involves more in-depth scrutiny and verification of a vendor's security controls and practices compared to lower-tier assessments.
​
This certification is important for companies looking to maintain a robust cybersecurity strategy, ensuring that their third-party partners meet specific security standards to reduce potential vulnerabilities in the supply chain.