The foundations of quality research
Quality insights need responsive, reliable and representative survey respondents.
So we use a range of highly effective techniques to identify and eliminate undesirable respondents.
Member Verification Process
Upon enrollment, panel members complete an extensive member profile survey. This identifies the specific attributes of an individual – similar to a person's DNA – and we continuously monitor these data points for any changes.
Utilizing Digital Fingerprinting technology we employ over 80 (non-PII) data points from a respondent's browser and operating system to create a unique ID for their computer. This means we are able to detect if more than one respondent is participating in a survey from the same computer. If a single computer is duplicated in a survey, the panel member is flagged and removed from the study.
Upon sample deployment, we can use technology to identify the location from which a respondent is taking a survey. If the location of the IP Address of the respondent's computer doesn't match the targeted location of the survey, then the respondent is blocked from completing the study. If a respondent is flagged for multiple Geo-IP conflicts, a veracity audit is triggered to validate the legitimacy of the panel member.
Because of these checks and many other stringent validation measures, you can always be confident in the integrity of our panels.
After all, you want to spend your time providing quality insights, not worrying about the integrity of your data source.