Set Your Survey Security Settings When Creating Online Surveys

One important question you need to ask yourself when planning your online survey is who can answer the survey? Do you want your survey to be open to anyone who is interested or do you want to restrict the survey to a certain group? There are pros and cons to each approach depending on your survey goals, for example restricting your survey can be useful if there is an incentive associated with the survey questionnaire.

Cvent offers you the option to select who can answer the survey. You can choose - Anyone can answer the survey for an open survey and Only individuals on a targeted list can answer the survey for a private survey.

Survey Security Settings

Using Cvent Web Surveys software gives you several ways to increase survey security and limit which survey respondents are allowed survey access.

Limit responses. Cvent Web Surveys tool allows survey administrators to limit responses to ensure data accuracy. This option is extremely helpful if the planner wants to avoid duplication of records (aka each person only gets to vote once to avoid ballot stuffing). As an online survey creator you have the option to limit responses three different ways:

Survey Security Settings: Limit Responses

1. One response per computer. The way this works is after completion of the online survey, a cookie is saved on the computer. If a cookie exists, no new survey responses are allowed. This feature allows existing responses to be edited and partial responses to be completed.

2. One response per IP address. When a new survey respondent arrives at the surveys website, the respondent's IP address is checked. If it already exists for this survey, the respondent will get a message stating they've already completed the web survey.

3. Only responses from the following IP addresses. If you choose this option, enter the specified IP addresses in the text box. You must enter the IP address in the correct format (i.e. An IP address containing a zero will be interpreted as a range. For example, will be interpreted as Just like when you select only one response per IP address, when a survey respondent lands on the welcome page the survey system will check their IP against the list of allowed IP addresses. If the survey respondent is within the specified range, the respondent can proceed.

Password Protection. Survey administrators can also set a password for their online survey questionnaire. This automatically eliminates any unwanted respondents from the mix. During the survey development, you can decide whether or not you want to use the password protection survey security setting. If you choose to, you can send out the password along with the survey invitation or you can share it in a different manner. For example, if you have an employee job satisfaction survey that is always open for employee feedback collection, you may want to host the survey password on your intranet. Since the survey is hosted on the internet, password protection keeps out respondents who may have happened on the survey via a Google search. In this case, you may not be using email survey invitations so you need another method other than only individuals on the targeted list to secure your survey.

Survey Security Settings: Password Protection

Include a Verification Process. A verification process is used to help prevent computer generated responses. An image of five characters is displayed to the user, also known as a CAPTCHA. The user must correctly type the characters to continue.

Survey Security Setting: Add Verification CAPTCHA
Use Secure Socket Layers (SSL). SSL uses a cryptographic system that uses two keys to encrypt data − a public key known to everyone and a private or secret key known only to the recipient of the message. Both Netscape Navigator and Internet Explorer support SSL and many Web sites use the protocol to obtain confidential user information, such as credit card numbers. By convention, URLs that require an SSL connection start with https instead of http.

Survey Security Settings: Secure Socket Layers (SSL)
blog comments powered by Disqus
Crimes in Design Webinar
Subscribe to our Monthly Newsletter