FAQ

FAQ researchers

1.

Activate account

2.

Login

3.

Forgot your password

4.

Change personal information

5.

Security and privacy

1. Activate account

How can I activate my account?

Notice! For the following steps you must have received two e-mails with the subjects '' Confirm registration '' and '' Study registration ''. If you have not received these, please contact the study team of the study you are participating in.

  • Did you not receive a '' Confirm registration '' email? Click here for instructions. & Nbsp;
  • Has your activation link expired? Click here for instructions.
Steps to Activate Account.

  • Step 1
    You have applied for an account and received two emails with the subjects "Confirm registration" and "Registration investigation".
  • Step 2
    Confirm your registration by clicking the link in the email with subject "Confirm registration". This will take you to a web page where you will be asked to reset your password.
  • Step 3
    Reset your password and keep it in a safe place. 

    Notice!
    The password must be at least 8 characters long, contain a capital letter and a number.
  • Step 4
    After the reset you will be taken to a login page, where you can log in with your email address and password you just created.

After these steps, your account will be activated. 

My activation link has expired.

Please note! For the following steps you must have received an e-mail with the subject '' Registration for research ''. If you have not received these, please contact the study team of the study you are participating in.

Activate account (without confirmation email)
  • Step 2
    Select '' forgot password ''. Enter the email address with which you have an account as a researcher at Your Research and click on '' Reset ''.
  • Step 3
    Go to your email and view the message with the subject "Set password for Your Research" and click on the link in this email.
  • Step 4
    Set a new password to activate your account and close the entire browser.
  • Step 5
    Go to & nbsp; https://portal.yourresearch.com & nbsp; or click & nbsp; here
  • Step 6
    Enter your email address as the username and the password you set when activating your account.

  • Step 7
    Verify your account with the code sent by email and / or text message.

  • Step 8
    When logging in for the first time, you must accept a disclaimer, after which you can choose the study you will participate in.

After these steps your account is activated and you are logged in.

I have not received a '' Confirm registration '' email.

The reason why you do not receive a '' Confirm registration '' e-mail can have several causes. For example:

  • You already have an account
  • The e-mail has entered your spam box and is automatically deleted.

You can still activate your account by following the steps below.

Activate account without '' Confirm registration '' email
  • Step 2
    Select '' forgot password ''. Enter the email address with which you have an account as a researcher at Your Research and click on '' Reset ''.
  • Step 3
    Go to your email and view the message with the subject "Set password for Your Research" and click on the link in this email.
  • Step 4
    Set a new password to activate your account and close the entire browser.
  • Step 5
    Go to & nbsp; https://portal.yourresearch.com & nbsp; or click & nbsp; here
  • Step 6
    Enter your email address as the username and the password you set when activating your account.

  • Step 7
    Verify your account with the code sent by email and / or text message.

  • Step 8
    When logging in for the first time, you must accept a disclaimer, after which you can choose the study you will participate in.

2.Login

How can I login?

Please note! You had to activate your account for the following steps. Have you not done this yet? Then go to activate account.

  • Step 1
    Click here to go to the login page or copy the following url https://portal.yourresearch.com
  • Step 2
    Enter your email address as the username and password you set when activating your account.
  • Step 3
    Verify your account with the code sent by email and / or text message.
  • Step 4
    When logging in for the first time, you must accept a disclaimer and then choose the study you will participate in.
3.Forgot your password

I forgot my password. How can I request a new one?

  • Step 1
    Click on the following link (or copy this URL https://portal.yourresearch.com );
  • Step 2
    Choose 'Forgot your password';
  • Step 3
    Enter your email address with which you registered. (if you have lost it, please contact the study team or Your Research);
  • Step 4
    You will receive an email with the subject 'Forgotten password';
  • Step 5
    Click on the link in the email and then set a new password consisting of 1 capital letter, 1 small letter, 1 number, 1 non-alphanumeric and at least 8 characters / digits long;
  • Step 6
    CLOSE full browser after setting;
  • Step 7
    Go to the following link again (or copy this URL https://portal.yourresearch.com );
  • Step 8 < / b>
    Enter your e-mail address and created password;
  • Step 9
    Enter the verification code you will receive by e-mail;
  • Step 10
    You are logged in.
4.Change personal information

Change your email or phone number

You can change your personal details yourself.

  • Step 1
    Go to the Your Research Portal via this link & nbsp ; and login with your account information. For more information about logging in, click here .
  • Step 2
    After logging in and choosing your study, you can go to your personal profile via the icon below. Here you can change your data. Please note! After making changes, you must save the changes.

5.Security and privacy

Is Your Research secure?

Your Research is committed to protecting the data of its users, customers, suppliers and employees.

Your Research protects its systems by using the most recent standards and is ISO 27001 and NEN 7510 certified (standard of information security. These standards ensure that information security must be structured in a process-based manner in the context of the general business risks for you as a user and us as an organization.

In addition to the above, we have taken the following precautions :

Applications

  • Individual user accounts based on roles / rights, preventing unauthorized access;
  • Strong passwords according to password policy;
  • Activation of two factor authentication;
  • Enabling additional security policy by institutions;
  • Use of penetration testing by third parties to ensure security;
  • Use of mod There are techniques to minimize risk;
  • Audit logs to provide an overview of data accessibility and actions taken.

Servers and network

  • Applications run on fully managed virtual private servers;
  • Hosting providers are certified with relevant certifications (ISO27001) and / or national or international standards;
  • Unauthorized access is prevented and sites are protected by digital surveillance equipment;
  • Updates and patches are - if necessary - performed regularly;
  • Backups are Created and stored at least twice a day;
  • Firewall protection prevents unwanted connections to our servers;
  • Databases are not directly accessible from the public Internet.

Organisational

  • Awareness among employees is stimulated by training, asses sments, contractual obligations and reminders;
  • Your Research employees are scanned in advance and security measures are taken at the end of the contract;
  • Suppliers of your research are periodically evaluated and pre-assessed against quality and safety;
  • Electronic equipment used by Your Research is fully encrypted;
  • Periodic checks are performed on the security framework (eg. Internal audits, data protection impact assessments, business continuity plan tests, management reviews and external audits).

Processes

  • Your Research strives to avoid data leaks completely, but can do not give a 100% guarantee. That is why Your Research has developed and disseminated data breach policies throughout the organization;
  • Data security is embedded in all development processes to enhance and ensure data security (eg, release cycles, code review, testing);
  • In case of serious events, Your Research makes use of its BCP policy;
  • Penetests are performed annually by an external independent party;