User Interviews logo with rainbow filled icon
Product
Platform
User Interviews
The complete research recruitment platform
icon version of the Recruit logo- a green circle stacked on top of a lighter green square with two top rounded edges
Recruit
Source from our panel and automate research
icon version of the Research Hub logo- a light blue circle stacked on top of a darker blue square with two bottom rounded edges
Research Hub
Build your own panel and automate research
dark blue plug icon
Integrations & APIs
Extend User Interviews with your favorite tools
Features
survey clipboard icon
Screener surveys
calendar page icon
Scheduling
giftcard icon
Incentives
Opt-in forms
Collaboration
plus icon
Add-ons
Use Cases
navy blue report icon showing a document with a line graph on it
Research panel
NEW Reports
conversation bubbles icon
Moderated research
usability testing browser window icon
Usability tests
dark blue stacked check box icon
Surveys
wheelchair user icon
Accessibility research
Read product release notes
new tab icon
Spotlight
Take a self-guided product tour of User Interviews
Visit the demo center →
Talk to users today!
Sign Up Free
Pricing
Company
All about UI
dark blue UI logo icon
About Us
Read about our story, team, mission, and culture
dark blue handshake icon
Partners
Want to collab? Join our partner ecosystem!
dark blue icon of users on cards representing contacts
Customer Stories
We're trusted by research teams big and small
dark blue brief case icon
Careers
We're hiring! Read about our current openings.
bullhorn icon
Affiliate Program
NEW
Get paid when you refer researchers to UI!
Spotlight
gold crown icon
User Interviews for Enterprise
We help enterprise teams find and recruit their target audience, and gain meaningful insights at speed.
Talk to users today!
Sign Up Free
Resources
Learn
dark blue icon of a quill and ink
Blog
Fresh UXR content, every week
dark blue icon of a microphone with radiating circles
Podcast
Tune into Awkward Silences
dark blue icon of a sign post with two opposite facing arrows
Field Guide
An in-depth guide to UXR methods
Events
In-person and virtual sessions
EXPLORE
line graph on page icon
Data & Reports
Original UXR industry analyses
toolbox icon
UXR Tools
Calculators, methods selectors & more
dark blue icon of a life ring
Help Center
Need support? We got you.
icon of the UI logo with a graduation cap on
User Interviews Academy
NEW
Product education for researchers
FEATURED
folded map icon
2024 UX Tools Map
Explore the UXR software landscape
briefcase icon
2025 Research Budget Report
NEW
Learn how your spending compares
combined bar and line graph icon
2024 State of User Research
Data from our annual survey
dark blue icon of nondescript stacked money bills
Incentive Calculator
How much should you pay?
light green asterisk icon on a dark blue background
2024 UX Salary Report
Insights and trends in UXR salaries
dark blue icon of a rocket next to a document
UX Research Launch Kits
Choose a method, get researching!
template icon
Free Research Templates
Kickstart your next project!
fresh lettuce icon
See all resources
Explore our brand new content hub
Talk to users today!
Sign Up Free
Participants
Participant resources
pink icon of a browser window with a magnifying glass
Browse online studies
Find the type of study that works for you
pink icon of ellipsis in a lighter pink circle
Learn more about participating
Getting started is simple and fast
pink icon of a book cover with a question mark on it
Participant FAQs
Need help? Start here
a pink life ring icon
Contact participant support
Talk to our dedicated participant support team
Join our Panel
pink icon of a right arrow with an incomplete circle around it
Want to get paid to participate?
Sign up free today →
Share your opinions, get paid.
Sign Up to Participate
Sign In
Sign Up
Sign Up
Sign In

Voluntary Disclosure Policy

‍

We take security seriously and welcome the contribution of external security researchers to help us ensure the security and privacy of our users. Please review the following policy before you disclose a potential security vulnerability.
‍

Reporting a Security Vulnerability

If you discover a security issue or vulnerability in a User Interviews service, we ask that you report this to us confidentially by emailing security@userinterviews.com.

‍

Please provide as many relevant details as you can, such as:

  • How the vulnerability can be exploited and the potential impact
  • How you discovered the vulnerability and clear steps to reproduce
  • Any proof of concept attack and/or images showing the attack vector
  • Any known patches or controls to mitigate the vulnerability

If you wish to be recognized in our Hall of Fame, please also provide your name/handle and a link for recognition (e.g., LinkedIn, Twitter, or personal website). See the “Recognition” section below for additional information.

‍

Requirements and Exclusions 

As long as you adhere to the following parameters when reporting an issue to us, we will not pursue or support any legal action related to your research. 
‍

Requirements:
  • Do not access, destroy, or negatively impact User Interviews’ or its users’ data in any way.
  • Do not use automated scanners. The use of automated scanners may result in investigative action and your IP address being blocked.
  • Make every effort to avoid privacy violations and interruption or degradation of User Interviews’ services during your research.
  • Do not conduct any type of physical or electronic attack against User Interviews’ personnel.
  • Do not violate any laws or breach any prior agreements.
  • Keep information about any vulnerabilities you’ve discovered confidential until we’ve had 90 days to investigate your report and carry out any necessary remediation.
In Scope:
  • *.userinterviews.com
Out of Scope:
  • Findings from applications or systems not in scope
  • Findings that do not demonstrate a security impact to a site or application in scope
  • Any services hosted by third-party providers and third-party services
  • Findings derived primarily from social engineering (e.g., phishing, vishing)
  • UI and UX bugs and spelling mistakes
  • Network-level Denial of Service (DoS/DDoS) vulnerabilities
Things we do not want to receive:
  • Personally identifiable information (PII)
  • Financial account information (e.g., bank account number, credit card holder data)
Recognition 

We do not currently have a bug bounty program in place but will update this page with relevant information if one is instituted. In addition, we are happy to recognize your contribution in our Security Hall of Fame below if you provide your name/handle and a link for recognition.


We reserve the right to only credit researchers who have reported an issue that is proven and of sufficient severity.

‍

‍Hall of Fame 

A special thanks to the following people who have responsibly disclosed vulnerabilities to User Interviews:

‍

This could be you!

Talk to users today. Seriously, we're fast.

Sign up freeBook a demo
the UI icon in an illustrated group of moving lines that resembles a comet
User Interviews Logo
Product
RecruitResearch HubPricingIntegrations & APIsPanel ReportsSecurityRelease Notes🌟 Get a Demo
Researcher Resources
Help CenterUser Interviews AcademyField GuideBlogPodcastLaunch KitsEventsFree Research TemplatesIncentive CalculatorSubscribe to our newsletter
X social iconLinkedIn social iconFacebook social icon
Participant Resources
Help CenterBrowse All StudiesFocus Groups StudiesDiary StudiesInterviews StudiesUser Tests & SurveysRefer a Participant
Facebook social icon
Company
About UsCase StudiesPartnershipsCareers
Compare
User Interviews vs. UserTestingUser Interviews vs. UserZoomUser Interviews vs. Respondent
© 2025 User Interviews Inc.  All rights reserved.
Researcher Terms | Participant Terms | Privacy Policy | CA Privacy Notice