Blog Posts
August 21, 2025

Answer these 5 questions to better manage personally identifiable information (PII) in research

My sister Kelsey was a teacher at the local elementary school. In 2020, our worlds collided when she was chosen to participate in a study run by my employer, an educational publishing company conducting research on COVID-19 and its effects on teachers and education. When she received the invite, Kelsey reached out to me, saying she was nervous about speaking to an unknown researcher, and feared she would say something wrong. I’d simply said, “Just tell the truth.”

A week later, I opened up the participant recordings to take notes, and there my sister was, in the Zoom window, nervously biting her nails as she looked off-screen. In her interview, Kelsey discussed the challenges faced by teachers, students, and their parents. For Kelsey, the most disheartening change was the lack of communication with her students; the only way to reach students who didn’t have internet access was to call their house. Often, there was no answer. I heard her voice break as she said, "I worry about my students, not seeing them every day. Not knowing how they are. We don’t have a lot. It’s hard, but you do the best you can with what you have."

At that moment, I saw her cry…and it was right then and there…it hit me. This wasn't only a research participant; this was my sister. As her older sister, I felt I had failed her. I worked at this company and encouraged her to participate in this interview, knowing she might have been in an exposed position with the researcher. I didn't ever want this video used for anything other than what she had agreed to…for UX Research.

I always thought of our research participants as real people, but from then on, it was visceral. I realized that, as a Research Ops professional, I could do better. Participants spend their valuable time with us and allow themselves to be vulnerable. In return, we must collaborate with our legal and data privacy experts to increase knowledge and awareness of data privacy, prepare our participants, and weave research privacy and ethics into every part of the process. That moment with my sister changed how I approach research ethics. It made me realize that protecting participants isn't just about following rules — it's about honoring their trust.

The lowdown on data privacy

The 2024 Cisco Consumer Privacy Survey revealed that most consumers (53 percent) are now aware of privacy laws, and informed consumers feel significantly more confident about protecting their data (81 percent versus 44 percent). Research participants are more informed than ever, so people who do research (PWDR) can no longer afford to be casual about data privacy — and with more rigorous regulations (and penalties) in place, companies can’t afford to be complacent either. However, if you don’t know a lot about data and privacy regulations, knowing where to start can feel daunting.

Even a simple internet search for “data privacy research guidelines” will take you down a rabbit hole large enough to swallow you whole. You’ll find thousands of articles littered with terminology and conflicting information. Data privacy is a constantly evolving and complex world. While the fundamental privacy principles established in the OECD's 1980 Guidelines continue to provide a foundation for global data protection laws (article behind a paywall), they have undergone formal revisions in 2013 and ongoing reinterpretation to address unprecedented challenges posed by AI, social media, and modern data processing technologies.

It can be a lot to take in, but you don’t have to do it alone. First, you must intentionally partner with your data privacy partners. Second, use the 2016 General Data Protection Regulation (GDPR), one of the strictest data privacy laws, as a baseline when implementing new research guidelines, because you'll naturally comply with the majority of global data privacy requirements. (While your research may not be global now, even in the US, new state laws have requirements similar to GDPR.)

PII is at the heart of data privacy

While data privacy covers a lot, one concept that's absolutely central to research is personally identifiable information, or PII. According to the U.S. Department of Labor, PII or personal data is defined as "information which can be used to distinguish or trace an individual's identity, either alone or when combined with other information that is linked or linkable to a specific individual." The easiest way to think about PII is this: if I search the internet, can the information identify this person?

A special category of personal data exists, known as sensitive data, which those in the health and finance industries should be especially aware of. Additional security is necessary because this information, if disclosed, could be abused and cause the participant severe harm, such as identity theft, financial fraud, and discrimination. In their article on the Cyphere blog, What Is Sensitive Personal Data? Examples and Data Protection (GDPR) context, Cybersecurity Consultant Harman Singh explains examples of sensitive data:

These examples fall under special category data, which requires extra security measures and specific lawful grounds for processing under the GDPR. Under the GDPR, (from Article 4(13), (14) and (15) and Article 9 and Recitals (51) to (56)), sensitive personal data is defined as personal data revealing or concerning an individual’s:

  1. Racial or ethnic origin: such as skin color, cultural background, or nationality.
  2. Political views, affiliations, or opinions: such as party membership or voting history.
  3. Religious or philosophical beliefs: such as their faith, spiritual practices, or moral convictions.
  4. Trade union membership or affiliation.
  5. Genetic data: inherited or acquired genetic characteristics obtained by analyzing a biological sample or other means.
  6. Biometric data for identification purposes: physical, physiological, or behavioral characteristics, such as fingerprints, facial recognition data, or iris scans.
  7. Health data: physical or mental health, including the provision of health care services, reveals information about their health status, medical history, or treatments.
  8. Data concerning a person’s sex life or sexual orientation: an individual’s sexual preferences, practices, or orientation.

While primary researchers will know participant identities, these identities must remain anonymous to anyone outside the immediate research team (see this article, “Anonymising Interview Data: Challenges and Compromise in Practice”). Maintaining PII confidentiality is crucial as it minimizes risks to your team and company, and reduces the potential for harm to your participants.

Understanding what constitutes PII and sensitive data is just the beginning. The real challenge is systematically managing this information throughout your research process. Without previous guidance, there is a high probability that PII could exist in every phase of research, from participant recruitment to your insights repository. It’s essential to define the research tasks that generate PII data, so you can not only remove unnecessary existing PII but also plan for the proper handling of PII in the future. That's where my framework comes in: The 5 Questions of PII.

The 5 questions of PII

I created the 5 Questions of PII and its corresponding companion document, the ResearchOps PII Collection and Storage Template (see Figure 1), as a useful tool for remembering and sharing what PII is necessary to document. You may find it helpful to reference the document and its examples as you read through the 5 Questions of PII:

  1. WHO is the Data Controller and the Data Processor? Who will have access to the PII?
  2. WHAT PII will be collected? What data, when combined, equals PII?
  3. WHERE do you store PII?
  4. WHEN do you collect the PII? When will you delete or anonymize PII?
  5. WHY do you need this PII?
Figure 1: The ResearchOps PII Collection and Storage Template can be a starting point for future discussions with your data privacy and legal experts.

Who is the data controller? Who is the data processor? Who will have access to the PII?

A data controller, such as an individual or company, is legally held accountable for securing data, ensuring transparency, and respecting people's rights. Data processors are not legally held accountable for their actions on the data controller’s behalf. This means that as research operations or PWDR, you bear the ultimate responsibility for ensuring your vendors and tools handle participant data appropriately — regardless of their compliance claims. Here’s how the roles of controller and processor are defined:

  • Data controller: The person who decides how long you keep the data and what types of data you will use. It’s likely you or your team will be the data controller if you make these decisions.
  • Data processor: Your tools and vendors typically act as data processors, while you remain the data controller who decides how to use their services.

For tool evaluations, while vendors may say they’re compliant with GDPR, their policies leave it up to the customers to decide what will be done with the data. So, the best practice is to ask vendors how personal data can be anonymized or deleted within their tools. Discuss with your data privacy teams if this is an adequate measure, and what additional follow-ups are needed. If anonymization is available through tools or services, verify that it works accurately and consistently and whether the process can be automated.

In terms of access, consider who will be involved in each task and whether they require personal data to complete it. Limit access to personal data to only those who need it. The best practices are as follows:

  1. If project members attend remote interview sessions as observers, create an invite separate from the moderator and participant so the observers’ and participants’ email addresses are not known to each other.
  2. If you have a data security contact, they can share information about how to secure data with the tools you use. For example, creating user groups that automatically update based on the reporting structure to be used in email, for access to file directories, etc.

Here's how to fill out Columns A-D (see Figure 2) in the ResearchOps PII Collection and Storage Template:

Figure 2: List the user research steps in the first column where PII exists. The Data Controller column is often the research team, while the Data Processor column is the tool where the data is collected and/or stored. For the Access to Data column, ensure the data collected in that stage is necessary for those listed.

What PII will be collected? What data (when combined) equals PII?

Before launching any study, successful researchers ask themselves a fundamental question: What's the minimum amount of personal data needed to answer our research questions? This strategic approach not only protects participant privacy but also streamlines your data management processes. The key is to work backwards from your research goals to determine exactly what information is truly essential while minimizing participant privacy exposure. As you work backwards, identify what data collected could be classified as personal data, alone or when combined, such as full names, phone numbers, email addresses, employers, occupations, and audio, video or screen recordings.

Only collect the personal data you need during the study, then anonymize or delete the personal information that is unnecessary after completing analysis and synthesis. Once the data’s anonymized correctly, it’s no longer considered personal data. Take the following steps to ensure your data collection maps to your research goals:

  1. Review your problem statement. Is it clear what issue you want to address and why it matters?
  2. Review your research questions. Is it clear what you want to find out?
  3. Review the data that needs (or does not need) to be collected: What information or variables do you need for meaningful insight?

For example, in the study I mentioned about COVID-19 and its effects on K-12 education, here’s what I would outline:

  1. Review your problem statement. To inform our research, our participants needed to be K-12 teachers.
  2. Review your research questions. Due to the unknowns of COVID-19, many states had implemented lockdowns, and teachers had been redirected to remote learning. In order to learn remotely, you need access to the proper materials and technology. If they didn’t have access, how close were they to accessible technology and materials?
  3. Review the data that needs (or does not need) to be collected. What personal data wasn’t necessary at all? Participant age. What if we wanted to see if older teachers struggled with the technology they had never used before? Was this considered in the research questions? If not, this data could be shared by the participant without prompting and anonymized as an insight for future studies, but age wasn’t necessary to collect and consider when recruiting for this study.

Where do you store PII?

Does personal data exist in tools? Do you have personal data in your email? What about research databases, local drives, screeners, scheduling, consent forms, project pages, analysis and synthesis, participation, and incentive trackers?

To ensure best practices, run a workshop with PWDR to ask about their processes and where they store their information, then create a data map (see Figure 3). Start broad within the different stages of research, ask questions and invite discussions around why they do research or store research data in this way. Then, review the data, and craft potential suggestions for the ideal storage solution(s) and share with your partners. For example, you may identify the need to set up cross-functional guidelines around sharing specific data to reduce existing silos between teams while maintaining data integrity. If you notice once a study is over, there is a “set it and forget it” mindset, there would be clear benefits to establishing explicit policies for data retention, implementing data clean-up processes during the study wrap-up and scheduling routine audits to manage the growing storage and meet compliance requirements.

Figure 3: A research data map is an easy way to catalogue where research data lands, and supports discussion and decision-making around how to adjust workflows to support more ethical and compliant data handling.

When do you collect the PII? When will you delete or anonymize PII?

Let’s say you're three months into a study on remote learning challenges. Sarah Mitchell from Riverside Elementary shared insights about technology gaps, while Michael Fletcher from Downtown Middle School discussed budget constraints. During recruitment and interviews, you needed their full names for scheduling and their school information for context. But now you're analyzing data — and this is where most researchers miss a crucial privacy opportunity. Strewn through your documents, you’ll find personal data everywhere — participant names in transcripts, school locations in notes, email addresses in correspondence, demographic details in surveys.

The key principle is simple: once you move from data collection to analysis, most personal identifiers become unnecessary. Personal information that was essential for building rapport during interviews becomes an unnecessary privacy risk once you've extracted the insights you need. Here's what this looks like in practice:

  • Replace participant names with codes: Sarah Mitchell becomes “Participant 1” or “Teacher A.” Keep a secure participant register (limited access only) that links real names to aliases and retains essential contact information, like email addresses for future study invitations, while removing this information from all other research materials.
  • Anonymize locations and identifying details: Change "Riverside Elementary" to "Rural K-5 school" — keeping only contextual details that matter for your research.
  • Train your team and create guidelines: Ensure templates explain how to recognize when PII is no longer needed and how to anonymize different data types.

For example, in the remote learning study I mentioned, this is what should happen during the transition to analysis:

  1. Replace participant names with codes: Full names were necessary for scheduling interviews, but "Teacher 3" works just as well for analysis of technology challenges.
  2. Anonymize locations and identifying details: We needed to know "Downtown Middle School" during recruitment to understand the urban context, but "Urban middle school serving 400 students" provides the same analytical value without the privacy risk.
  3. Set review dates and check compliance: What personal data wasn't necessary to retain? Email addresses. Once interviews were complete and follow-up communication ended, these should be deleted from transcripts, notes, and other research materials — keeping them only in the participant register as previously mentioned. The insights about budget constraints don't require knowing how to contact Michael — only that he teaches at an under-resourced urban school.

Your data privacy experts can provide the company’s standard timeframe for retaining data, including whether researchers can request extensions if they have a logical reason. If extensions are allowed, work with your data privacy experts to identify necessary information to collect at the time of request, ideally through a form.

Why do you need this PII?

If you want to collect any data at all, you should be able to provide a reasonable explanation why the information is necessary to the research and how it will be used. If someone requests additional data simply “because it may be good to have in the future,” say no. Document the types of PII and related reasons for collecting these in Columns E-F, Rows 1-2 in the ResearchOps PII Collection and Storage Template to gather, for example:

  • First Name: to identify and communicate with the participant.
  • Email Address: to contact the participant.
  • Occupation: to identify the necessary criteria for the selection of studies.
  • Video Recording: to review gestures, facial expressions, and movements so the researcher can resolve any inconsistencies participants exhibit in conversation and paint a more accurate picture of the user.
  • Screenshare Recording: to observe how participants interact with what is present on the screen within the system in their environment while using their own equipment.

You don’t know what you don’t know

This framework might seem overwhelming at first glance, especially when you're trying to apply it to your existing processes. Don't worry. I've got a practical approach to get you started. Think about what is still unknown, then set up an hour-long working session with your researchers. If uncertainty remains, set up some follow-up sessions to create alignment and clarity. Structure your first hour-long working session as follows:

  1. Spend five minutes at the beginning to set context and share what you want to accomplish.
  2. Process mapping should take about twenty-five minutes overall. Limit yourself to four or five key research stages or topics. As you go through each topic, take a few minutes to explain, then set a timer for five minutes and have everyone add stickies with their answers and any questions. Prompt your researchers about their processes, what data they collect at each step, and when/if it’s anonymized or deleted.
  3. During the next ten minutes, cluster the stickies into themes.
  4. Spend fifteen minutes encouraging discussions among the group to focus on where processes differ and identify best practices. Take notes in an area visible to the researchers with the findings, decisions, and any next steps.
  5. The last five minutes should include a quick summary of what you’ve learned. Thank the researchers for their time and invite them to continue adding more stickies if they think of others after the session concludes. As a final note, share a timeline for following up with next steps.

During these sessions, not only will you learn more about the existing PII and processes, but more importantly, you’ll have included your researchers in crafting data privacy goals and best practices—researchers who will now have a better understanding of data privacy concerns and potentially provide excellent perspectives. Once you've mapped out where PII lives, the next crucial step is partnering with legal and data privacy experts, who will know the ins and outs required. If you work at a smaller company, which may not have full-time legal and data privacy representatives, you’ll still likely have access to a general counsel from outside the company.

It’s the journey, not the destination

Building ethical research practices isn't a destination — it's an ongoing journey. Every small step you take along that journey makes research safer and more trustworthy for the people who generously share their time and experiences with us. If you find yourself spinning your wheels, start small — pull together researchers for an initial working session, gather relevant information to help guide early conversations — anything that might create momentum. Celebrate every win, with every step — big or small — as you travel along the path to produce ethical research that participants can trust.

Disclaimer: I’ve written this article from my perspective, research, and experience as a ResearchOps professional. I’m not a Legal or Data Privacy professional. This article is for informational purposes only and shouldn’t be considered legal advice.

Edited by Kate Towsey and Katel LeDu

👉 The ResearchOps Review is the publication arm of the Cha Cha Club – a members' club for ResearchOps professionals. Subscribe for smart thinking and sharp writing, all laser-focused on Research Ops.

Kasey Canlas

A common complaint across disciplines in 2025 has been the notion that AI will solve everything—typically a hopeful, cost-cutting call “from above”; from the executive. Generally speaking, it seems people are waking up to the fact that this isn’t true—at least not yet, and perhaps it never will be. But these notions have been thematic, so as ResearchOps professionals have started to wrap their arms around AI, including understanding what it can and cannot do, they’ve also found themselves helping stakeholders to understand its strengths and limitations.

Stephanie Marsh, the ResearchOps Lead at the UK’s Ministry of Justice, shared a research-specific example. They said, “If we don’t have the data, like when you’re talking about underrepresented groups, we can’t use AI to generate that data. We need AI to use the data to generate insights, which I think is a pretty common misconception: that it’s just going to create new stuff rather than synthesise what’s already there.”

Who would have known? We may still need researchers after all! (In case you didn’t pick it up, that was sarcasm.)

Finally, Stephanie Kingston, a UX Research Program Manager at Cisco, pointed out something promising, and, again, a sign of Schumpeter’s “creative destruction” at play. Stephanie shared the potential of AI “to accelerate and free ourselves [that is, ResearchOps] up for more of that creative, strategic work that we are so good at” and “we can automate the parts that...you know, probably aren’t giving us a lot of ‘work joy,’ and I think it’d be really exciting to see what sort of amazing, creative things that people can come up with when we’re not always like in the ticky-tacky weeds. So, really looking forward to the future on that.”

As Schumpeter wrote: “Depressions [or perhaps disruptions] are not simply evils, which we might attempt to suppress, but—perhaps undesirable—forms of something which has to be done.”

How Companies Operate Is Changing—So ResearchOps Must Change, Too

Post-pandemic economic shifts and AI have impacted all layers of society, including how organisations are designed—in other words, how they operate—and ResearchOps is not immune. Jenna Lombardo, a Senior ResearchOps Manager who’s worked most recently at Workday and LinkedIn, shared the following:

"One of the most prominent and disruptive themes impacting ResearchOps this year has been the radical restructuring of organization design for both research and operations functions. I’ve observed a stark polarization: on one hand, once-mature, centralized operations teams are facing significant consolidation or dissolution, with core functions often being offshored or absorbed.

On the other hand, we see a recognition of ResearchOps’ strategic value among emerging teams. These organizations are aggressively vying for budget allocation to establish their first dedicated ResearchOps role, signaling a clear understanding of its necessity for scalability and quality control.

I’ve also witnessed an accelerating shift away from traditional, decentralized UX research models toward hybridized research structures. For example, several major organizations are merging their user experience and product research capabilities with market research teams. It will be interesting to see how these shifts play out in 2026."

Jenna has done such an excellent job of expressing this theme that it’s hardly worth adding anything, except to say it will indeed be intriguing to see how these shifts play out in 2026. Watch this space.

Democratisation Is Still a Big Theme, but It’s Shifting

As budgets have shrunk and researchers have been laid off, an intriguing theme for ResearchOps has emerged: often the ResearchOps team, which could be a “team of one,” is retained with the mission to either continue or start setting up operations that support research democratisation—a term that barely needs explaining these days. Rodrigo Dalcin, Staff User Experience Research Operations at Wealthsimple, offers a pointed example: he is Wealthsimple’s only research hire, and research is entirely democratised. Far from a one-off, this is an emerging theme that research and ResearchOps leaders should be aware of.

Rodrigo shared: “I’m in a very unique position where I work in a company where research is 100% democratised, and helping the people who are doing research figure out things that are usually linked to the expertise of dedicated researchers has been a big theme. And that includes, for example, using creative, clever ways of getting them to make a decision around a research approach based on the time that they have to do research, based on how much knowledge they have over a problem space, or how much risk they’re dealing with has definitely been a big thing for me.”

What’s striking about Rodrigo’s story is that there are now opportunities for research operations professionals to own research entirely, which begs a big question: Should we own research entirely? I think research expertise is crucial, so either research leaders need to become better operators or ResearchOps folks need to become better research methodologists—and ideally both.

Finally, on the topic of democratisation, Luana Cruz, a ResearchOps specialist at Itaú Unibanco, makes a compelling case to think about how you deliver self-service programmes as you turn the page to 2026. She says:

" I think the trend is that people are just finding out that self-service isn’t just a program or a document you’ve done once and will be forever useful. No. I think people are just finding out that self-service is about making people closer to research, either by doing it by themselves or by supporting their local researcher.

So for 2026, I hope we crawl back to the beginning when we were trying to understand how to scale research and ask ourselves: Are these self-service programs that we all grew fond of the answer for scaling research? Or is it just a palliative solution, and it was meant to end in the near future?

My gosh, it’s another excellent question! Write it at the top of your 2026 must-consider list and let me know when you’ve got the answer."

The Relentless Search for a Job

This article would not be complete without addressing the major theme of layoffs and joblessness. I’m sure I wasn’t alone in assuming that layoffs would peak in 2022 and that things would then get back to “normal.” Instead, it’s 2025 and layoffs are still happening. At this point, it’s almost trite to say that times are tough. That said, there have been success stories, such as Eric Levy, Director of Insights Operations for US Pharmacopeia:

For me, 2025 was a year of new beginnings. I’d been looking for full-time work since getting RIFed [RIF being “reduction in force”]. More than two years of active job searching—that was a lot of heartbreak.

If you’ve experienced that heartbreak, you’ll be heartened to know that others who’ve run the unemployment gauntlet have found work, too. Kasey Canlas, a UX ResearchOps contractor currently working at Amazon, is one such story. Kasey shared her story:

"I spent the first seven and a half months [of 2025] unemployed after being let go, and it really crushed my spirit. What I learned about the ResearchOps job market is that it’s confusing. Organisations think they know what they want, they throw everything under the sun in the job description, and then you get to interviews and they don’t know how to interview for an ops role, and then you get to final rounds, and you ask for feedback, and you’re met with silence. Or we just found someone who was a better fit."

A misunderstanding of the ResearchOps role is certainly a problem for job seekers (and for hirers hiring the wrong people for poorly defined roles). Still, job descriptions are gradually improving as ResearchOps becomes better defined, and thanks in part to The ResearchOps Review and various Cha Cha Club productions, we’ll no doubt see continued improvements in 2026 and beyond.

Learning on the Job

If you thought AI had been covered, it rears its em-dash-loving head in the jobs market, too. Not only has AI revolutionised how talent acquisition teams operate, for better or worse—most stories point to worse, at least for job seekers—it’s also revolutionised the types of skills companies are including in job descriptions. I’m sure that statement is hardly a revelation, but this article would be incomplete without it.

UX ResearchOps Leader and job seeker Lydia Iana shared how her job-seeking experience has shifted over the past year. She said:

I feel like every job description now includes AI. They want you to have experience with AI and to automate tasks using it. ...And it’s a little bit difficult because all of these job requirements want you to have AI experience, but yet AI is still pretty new, so it’s kind of learning on the job, right?

It is a conundrum. Perhaps a short course on AI for ResearchOps professionals is needed to help bridge that gap? It’s not on my to-do list, but it should be on someone’s.

A Light at the End of the Tunnel

If you’re job hunting, Eric and Kasey’s stories have shown that there is light at the end of the tunnel, even if it’s in the form of a not-to-be-sneezed-at contract. And if you’re in the depths of job-seeking heartbreak or have a job but you’re worried how long it will last, here are some practical words from Stephanie Kingston.

I think the biggest thing I learned about ResearchOps this year is that we are very good at what we do, and there’s a lot of joy and a lot of pain in that, because you’ve seen a lot of elimination of ResearchOps roles this year. And I do hope, and I believe, and I think that the pendulum is going to swing back because ResearchOps people are creative and strategic—we are force multipliers.

We do so many things that aren’t apparent until we’re gone. And I think we are going to see a reversal of this negative swing that we’ve seen over the past year. And so, I’m very hopeful for that because there’s a lot of really incredible people out here doing this work, and we deserve all the love and support because we’re really good at what we do.

More than Ever, Community and Connection Are Essential

Finally, the theme that’s come up time and again during the tumult of 2025 is the importance of community and connection. As Kasey Canlas shared:

What really turned everything around for me was that I went to a conference and I got to speak with others who are in our field, and it really reminded me why I love what I do, and I love helping people. And it made me remember I’m not alone.

The Cha Cha Club, the members’ club of which this article’s contributors are part, is predominantly a virtual environment, but it gives members a space to connect. It helps them feel less alone, whatever their context or need. I often say to new members: “If you’re a team of one, you’re now a team of 200!”

Looking Ahead

From AI to layoffs and radical organisational changes, to an evolution in the scope of ResearchOps, 2025 has, without doubt, been a year of ‘creative destruction.’ But ResearchOps professionals are a motley crew of highly adaptive and inventive people. Over the past fifteen years, we’ve collectively, if not consciously, used the rapid scaling of research, the rise of the research technology sector, and the growing focus on data privacy to expand our remit in organisations. And with advancements in AI and the organisational changes we’re seeing in how products and services are built and delivered, we’re doing it again. So, here’s to an even more productive (or perhaps creatively destructive) 2026!

1 Seven months after running the first LinkedIn poll, I reran it with precisely the same question and framing. The results were nearly the same.

2 “Recessions Have Become Ultra-rare. That Is Storing up Trouble: Continuous Growth Can Make Economies Fat and Slow.” The Economist, November 10, 2025. https://www.economist.com/finance-and-economics/2025/11/10/recessions-have-become-ultra-rare-that-is-storing-up-trouble.

3 Founded by Kate Towsey, the Cha Cha Club is a members’ club for full-time ResearchOps professionals. The ResearchOps Review is the publishing arm of the Cha Cha Club.

Supercharge your Research Ops with Rally

Rally’s Research Ops Platform enables you to do better research in less time. Find out how you can use Rally to empower your teams to talk to their users, without disjointed tooling and spreadsheets.  Explore Rally now by setting up a demo.