Security & Privacy

Your Security is Our Priority

At Not Just One, we’ve built our platform from the ground up with security, privacy, and victim protection as our highest priorities. This page explains the comprehensive measures we take to protect your information and your well-being.

Security Overview

Technical Security Measures

Security-First Development Approach

Our platform has been developed using a security-first methodology, meaning that protection is built into every aspect of our design rather than added as an afterthought. Our approach includes:

  • Privacy by design principles
  • Regular third-party security audits
  • Ongoing security monitoring and testing
  • Input from security specialists with experience protecting vulnerable populations
  • Continuous improvement based on evolving security standards

Our security team brings specialized experience in:

  • Protected communications platforms
  • Victim data protection
  • Threat mitigation for vulnerable users
  • Privacy-enhancing technologies
  • Secure system architecture
End-to-End Encryption

[Coming platform iteration Stage 2, upon activation of platform-based communications.] All communication within our platform is protected by end-to-end encryption, meaning:

  • Messages can only be read by the intended recipients
  • Not even our staff can access the content of your communications
  • Information is protected both in transit and at rest

Our multi-layered access control includes:

  • Role-based permissions limiting what any single person can access
  • Access logging and monitoring
  • Rapid assessment of unusual access patterns

We maintain constant vigilance through:

  • 24/7 automated monitoring for unauthorized access attempts
  • Advanced threat detection technologies
  • Rapid response protocols for potential security events

Privacy Protection

Professional Verification System

Pseudonymous Profile System

Your privacy is protected through our pseudonymous approach:

  • You create a profile using a pseudonym, not your real name
  • No public connection between your identity and your profile
  • Secure messaging that maintains your pseudonymity
  • Control over what identifying details (if any) you choose to share

We collect only essential information:

  • No unnecessary personal data
  • Clear explanation of why each piece of information is needed
  • Regular review of data collection practices
  • Data minimization practices in all platform processes

[Coming platform iteration Stage 2.] Your information is protected through compartmentalization:

  • Different types of information are stored separately
  • Access is limited based on necessity
  • System architecture prevents unauthorized connections between data
  • Granular privacy controls for different sections of your profile

You maintain control over your data:

  • Clear policies on how long information is retained
  • Simple process to delete your data entirely
  • Regular purging of unnecessary data
  • Verification of complete deletion when requested
Multi-Factor Verification Process

We rigorously verify the identity and credentials of all professional users:

  • Professional credential verification with issuing organizations
  • Identity confirmation through multiple methods
  • Employment or affiliation verification
  • Reference checking and professional standing verification
  • Background screening when appropriate

Our verification team:

  • Directly contacts credential-issuing bodies
  • Verifies employment and professional standing
  • Conducts reference checks with established contacts
  • Requires documentation of relevant qualifications
  • Re-verifies credentials periodically

Professional verification is not a one-time process:

  • Annual re-verification of credentials
  • Monitoring of professional standing
  • Random spot checks
  • Verification updates with role or affiliation changes
  • Immediate revocation process for misconduct or credential issues

User Control Features

Legal Protections

Content Visibility Settings

[Coming iteration Stage 2.] You control who can see your information:

  • Select which professional categories can view your profile
  • Set different visibility levels for different sections
  • Update visibility settings at any time
  • Review who has viewed your profile

All connections require your explicit approval:

  • Review professional credentials before accepting connections
  • See why a professional is interested in your story
  • Accept or decline with no obligation
  • End connections at any time

You maintain control over all interactions:

  • Set preferred communication frequency
  • Pause conversations when needed
  • Block connections if necessary
  • Report concerning behavior immediately

You maintain ownership of your content:

  • Edit or update your profile at any time
  • Remove specific sections as desired
  • Delete your entire profile if you choose
  • Verification of complete removal upon request
Content Guidelines to Reduce Legal Risk

Our platform helps protect you legally through:

  • Guidance on information sharing that minimizes legal risk
  • Structured questionnaires designed to avoid defamation issues
  • Clear warnings about potentially problematic content
  • Review process for legal concerns

Our terms of service include:

  • Clear guidelines for professional conduct
  • Prohibition of misuse of victim information
  • Explicit consent requirements for information usage
  • Consequences for terms violations

All professionals agree to:

  • Strict ethical guidelines for victim engagement
  • Clear boundaries on information usage
  • Requirements for permission before publication
  • Accountability for ethical breaches

We provide clear channels to report concerns:

  • Simple process to report inappropriate conduct
  • Rapid response to all reports
  • Thorough investigation procedures
  • Transparent follow-up on all concerns

Security Best Practices

Security Response Protocol

Account Security Recommendations

We recommend all users:

  • Create a strong, unique password
  • [Survivors] Use a secure email address (created just for this purpose)
  • Log out completely when finished using the platform
  • Update security settings regularly

For maximum security when accessing the platform:

  • Use a secure, private device when possible
  • Access from a private internet connection
  • Consider using a VPN for additional protection
  • Be aware of your surroundings when accessing sensitive content
  • Clear your browser history after use if using a shared device

When communicating through the platform:

  • Be mindful of the information you share
  • Report any concerning communication immediately
  • Use our encrypted messaging system rather than external communication
  • Set clear boundaries about your communication preferences
  • Use caution when discussing identifying details
How We Handle Potential Breaches

In the unlikely event of a security concern:

  • Immediate investigation by our security team
  • Rapid isolation of affected systems
  • Prompt notification to potentially affected users
  • Transparent communication about the situation
  • Implementation of additional protections

Our security response includes:

  • Root cause analysis
  • Impact assessment
  • Consultation with security experts
  • Development of preventative measures
  • Thorough documentation of all actions taken

We continuously enhance our security through:

  • Regular security assessments
  • Updates based on evolving best practices
  • User feedback incorporation
  • Proactive threat modeling
  • Investment in security infrastructure

Security FAQs

As a survivor, how do I know my real identity is protected?

Your profile uses a pseudonym rather than your real name, and you control what identifying information (if any) you share. Our system is designed to maintain separation between your identity and your profile.

Can platform staff read my messages?

No. We use end-to-end encryption for all messages [Stage 2 iteration – upon platform-based messaging capability], which means that only you and the professional you’re communicating with can read the content. Not even our staff can access these conversations.

What happens if someone tries to hack my account?

Our system employs multiple layers of protection, including intrusion detection, unusual activity alerts, and access controls. If suspicious activity is detected, we immediately secure the account and notify you.

How are professionals prevented from sharing survivor information inappropriately?

All professionals agree to a strict code of conduct that prohibits unauthorized sharing. They must obtain explicit permission for any external use of your information, and violations result in immediate platform removal and potential legal consequences.

As a survivor, can I completely remove my information from the platform?

Yes. You can delete your profile entirely at any time. When you request deletion, we ensure all your data is completely removed from our systems.

Not Just One provides a secure, controlled environment where survivors can share their experiences with qualified professionals who can help amplify their voices and potentially drive change. Our platform was built with safety, privacy, and well-being as our highest priorities.

Copyright © 2025 Not Just One, LLC | A North Carolina Limited Liability Company | Registered Address: 4030 Wake Forest Road Ste 349, Raleigh, NC 27609