As (design) researchers in the Web3 ecosystem, we've seen first hand how usability affects privacy and security measures. This is why we believe in the importance of frequent testing, facilitated by the Web3UX panel.

This document describes our policy when it comes to protecting your privacy as a Web3 UX panel member.

Who we are

We are individual (design) researchers in the Web3 ecosystem. To address a common challenge when finding people to participate in studies, we formed a collective to recruit and maintain the Web3 UX panel. Please see our page of panel hosts to find out more about individual panel hosts. You can contact us at [email protected].

Our role in your privacy

We ask you to share data, and determine with what purpose and how these data are processed. That makes us a data controller.

Data we collect from you

We ask you to share data with us so that we can match you to (design) research studies. These can be surveys, usability tests, interviews, etc. To match you, we need to understand what type of person you are, we don't need to know who you are.

<aside> 💡 Note that you might be asked for your account address or ENS name when joining a specific study to send you crypto as compensation for your time. Any information you provide to an individual panel host who invites you to a study is between yourself and the inviting host. As such, how this data is collected and managed falls outside the scope of the panel's privacy policy.


You are asked to provide a name. You can and are encouraged to use a nickname.

Data collected

How we work with 3rd party processors

We work with Great Question to collect and manage any data you provide. If you sign up for the panel, Great Question processes this data on our behalf. Great Question is GDPR compliant. On this page you can find details on how to exercise your digital rights with Great Question. More details in their privacy policy.

<aside> ⚠️ Note that Great Question may host data in the United States and Australia and will disclose data to local law enforcement if requested. Also, they log your IP address and device information.


If you find vulnerabilities in how panel data is managed, we encourage you to let us know!

Who can access your data