Security & Privacy

Your data security and privacy are our top priorities. Learn how we protect your information.

Confidentiality

Individual responses are never shared. Only aggregated, anonymous feedback is provided.

Security

Enterprise-grade security measures protect your data with encryption and secure access controls.

Transparency

Clear visibility into who can see what information, with role-based access controls.

Confidentiality & Minimum Rater Requirements

Individual Responses Protected

  • • No individual rater responses are ever shown to anyone
  • • Leaders cannot see who provided specific feedback
  • • Managers/coaches only see aggregated summaries
  • • Only administrators can access individual responses for system purposes

Minimum Rater Protection

  • • Results only shown when 5+ raters complete assessment
  • • Prevents identification of individual feedback
  • • Ensures statistical validity of results
  • • Assessment automatically closes if minimum not met
What Data is Visible to Whom

Leader Being Assessed

Can See:

  • • Their own aggregated scores and matrix placement
  • • Number of ratings received (only if 5+ completed)
  • • Basic development guidance for their profile
  • • L.E.A.D. element breakdown scores

Cannot See:

  • • Individual rater responses or names
  • • Detailed HR/coaching recommendations
  • • Team matrix comparisons
  • • Rater relationship details

Raters

Can See:

  • • Only their own responses during completion
  • • Assessment instructions and behavioral definitions

Cannot See:

  • • Other raters' responses
  • • Final results or scores
  • • Leader's development plan
  • • Who else is providing feedback

Manager/Coach/HR/OD

Can See:

  • • Aggregated scores and matrix placement for their team members
  • • Detailed HR/OD coaching recommendations
  • • Team matrix view (if enabled)
  • • Summary of rater relationships (not individual names)
  • • Assessment progress and completion status

Cannot See:

  • • Individual rater responses
  • • Specific rater names or emails
  • • Leaders outside their direct responsibility
Data Retention & Deletion Policy

Assessment Data

  • • Assessment results retained for 3 years
  • • Individual responses anonymized after 1 year
  • • Leaders can request data deletion at any time
  • • Organizational data retained per contract terms

Account Data

  • • User accounts deleted upon request
  • • Login data retained for security purposes (90 days)
  • • Email communications can be opted out
  • • Backup data purged according to schedule
Technical Security Measures

Data Protection

  • • End-to-end encryption for all data transmission
  • • AES-256 encryption for data at rest
  • • Regular security audits and penetration testing
  • • SOC 2 Type II compliance

Access Controls

  • • Multi-factor authentication available
  • • Role-based access permissions
  • • Session timeout and secure logout
  • • Audit logs for all system access
Questions About Privacy or Security?

We're committed to transparency about our data practices. If you have questions about how your data is protected or used, please don't hesitate to reach out.