Home > Survey participants > Privacy & data protection

Protecting your information is our priority

At Wallis, trust is at the heart of everything we do. When people choose to participate in our research, they’re sharing something valuable — their experiences, opinions, and personal information. It’s our responsibility to honour that trust through robust privacy practices and strong data protection measures.

Read our Privacy Policy to learn more about how we protect your information.

  • Wallis collects personal information from people who participate in market and social research studies. We do this in accordance with the Australian Data and Insights Association (ADIA) Code of Professional Behaviour, which guarantees anonymity to respondents, and the Privacy Act 1988 (Cth), which sets strict standards for the collection, storage, use and disclosure of personal information.

    We uphold the principles of transparency, informed consent and confidentiality — ensuring that participants always understand what data is being collected and why.

  • We only collect the personal information we genuinely need to conduct quality research — no more, no less. We clearly communicate data requirements with clients and partners, and securely delete personal data once it's no longer needed.

    Every dataset is tagged with an owner and a use-by date to ensure timely deletion and clear accountability.

  • All data collected by Wallis is stored securely in Australia. We never send data offshore, ensuring full compliance with Australian privacy laws and providing peace of mind to both clients and participants.

  • Wallis is certified under ISO 27001 (Information Security Management) and ISO 20252 (Market, Opinion and Social Research). These internationally recognised standards guide our data governance framework and reinforce our commitment to secure, high-quality research.

    We apply a multi-layered security approach, including:

    • Role-based access controls

    • Encryption in transit and at rest

    • Secure server infrastructure

    • Regular penetration testing

    • Ongoing staff training and audits