Information Security

Westat observes high standards of IT systems security to protect the confidentiality, integrity, and availability of project and corporate information systems and their data. We have a trusted, secure facility and personnel, as well as rigorous operations processes that are applied consistently. Our IT security policies and best practices are designed and implemented to support a large number of complex projects and a varied range of clients requiring many different systems, programs, and custom-developed solutions.

How can we help?

We welcome messages from job seekers, collaborators, and potential clients and partners.

Get in Contact

Want to work with us?

You’ll be in great company.

Explore Careers
Back to Top
Privacy Overview
Westat

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognizing you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

3rd Party Cookies

This website uses Google Analytics to collect anonymous information such as the number of visitors to the site, and the most popular pages.

Keeping this cookie enabled helps us to improve our website.

Additional Cookies

This website uses the following additional cookies:

  • Google Analytics
  • Google Tag Manager
  • Google Search Console
  • Google Sitekit