Anonymity is the foundation. Here's how we protect every voice that comes through Gathered Voices.
We collect only what's absolutely necessary for theme generation. No demographic data, no user identification metadata, no unnecessary tracking. The less data we have, the less risk to your people.
All data is encrypted during transmission using industry-standard TLS protocols. Database contents are encrypted at rest. Even if someone gained unauthorized access to our infrastructure, they would find encrypted data they cannot read.
We log system events for security and reliability, but never personal information. Our logs contain timestamps, error codes, and system metrics. No IP addresses, no user identifiers, no content. If something goes wrong, we can debug it without exposing anyone.
To prevent abuse, we implement rate limiting. Even here, privacy comes first. IP addresses are hashed with SHA-256 before use as rate limit keys. We never log or store raw IP addresses anywhere in our system.
We carefully select vendors who share our commitment to security and privacy. Each vendor maintains enterprise-grade security certifications and has signed Data Processing Agreements (DPAs) with us.
Start surfacing insights today. No setup required for employees to share feedback.