All users of qualitative research software have a moral obligation to firmly abide by all security protocols and practices during research in order to protect valuable data. In order to help users protect their data and information, specific security measures have been put into place. Usually the project administrator possesses a unique username and password linked to that project, and allows other users associated with the project to have separate usernames and passwords as well. It is recommended that passwords be complex and lengthy, be changed regularly, are never kept in unsecure locations, and are changed immediately upon suspicion they may have been compromised.
In addition to password protection during qualitative research software implementation, any and all transfer of information and data between a user's computer and the server database is full encrypted. Because of the importance of research data, whether raw or applicable, it is backed up every night, encrypted, and securely stored. Valuable data is free from risk of memory loss, file corruption, disk failure, or even computer theft – all nightmares in the electronic age of research and analysis. Some of the most valuable benefits of qualitative research software are the clear communication of how data communication is secured, how safely it is stored and retained, and what the protocol for data breach is.
Share