The Verification Process: How We Screen Professional Users

Trust is the foundation of the Not Just One platform. For victims sharing sensitive personal experiences, knowing exactly who has access to their stories is essential. That’s why we’ve developed one of the most comprehensive professional verification systems available on any platform.

In this article, we’ll walk through our rigorous multi-stage verification process, explaining how we ensure that only qualified, legitimate professionals gain access to victim narratives on our platform.

Why Verification Matters

Before diving into our process, it’s important to understand why strict professional verification is so critical to our mission:

  • Safety for victims – Sharing traumatic experiences requires absolute confidence in who will access that information
  • Accountability – Clear identification of all professional users creates a culture of responsibility
  • Legal protection – Proper verification helps protect both victims and professionals from potential misuse
  • Platform integrity – Comprehensive verification maintains the trustworthiness of the entire ecosystem

Simply put, without rigorous verification, the platform couldn’t function. It’s the critical infrastructure that makes everything else possible.

Our Multi-Factor Verification Approach

Unlike platforms that rely on single-factor verification (like email confirmation or basic ID checks), Not Just One implements a comprehensive multi-factor approach customized to each professional category. Let’s explore the core components of this process.

  1. Identity Verification

    The first step in our process verifies that professionals are who they claim to be:

  • Government-issued identification – Professionals provide official identification documents through our secure verification portal
  • Biometric confirmation – Depending on risk level, some professionals complete a brief video verification process
  • Digital footprint analysis – We review professional online presence for consistency with provided information
  • Employment confirmation – We verify current professional position and organizational affiliation

This step ensures that the person applying for access is using their real identity and provides a foundation for the more specialized verification that follows.

  1. Credential Verification

Once identity is confirmed, we verify professional credentials specific to each category:

For Journalists:

    • Press credentials verification
    • Publication history confirmation
    • Editorial references when appropriate
    • Media organization employment verification

For Researchers:

    • Academic or institutional affiliation confirmation
    • Research ethics board approvals when applicable
    • Publication and research history validation
    • Grant funding verification when relevant

For Law Enforcement:

    • Badge and identification validation
    • Jurisdictional authority confirmation
    • Departmental authorization for platform use
    • Case relevance assessment when appropriate

For Policy Advocates:

    • Organizational affiliation verification
    • Position and authority confirmation
    • Track record in relevant policy areas
    • Reference checks from recognized organizations

For Legal Professionals:

    • Bar association status verification
    • Practice area confirmation
    • Standing check with relevant authorities
    • Client representation verification when applicable

This specialized approach ensures that professionals not only are who they claim to be, but also possess the legitimate professional qualifications for their category.

  1. Background Assessment

For certain professional categories, particularly those dealing with highly sensitive cases, we conduct appropriate background assessments:

    • Professional conduct review – Checking for any relevant disciplinary actions or complaints
    • Ethical standing assessment – Verification of adherence to professional ethical standards
    • Platform-specific risk evaluation – Assessment of appropriateness for our unique environment
    • Conflict of interest screening – Identification of potential conflicts that could compromise integrity

The depth of this assessment varies by professional category and role, with heightened scrutiny for those seeking access to especially vulnerable populations.

  1. Reference Verification

Professional references provide important perspective on the applicant’s work and ethical approach:

    • Colleague references – Confirmation from professional peers about work history and approach
    • Institutional references – Verification from organizations about affiliation and standing
    • Subject matter experts – Input from recognized experts in relevant fields when appropriate
    • Previous collaboration partners – Feedback from those with direct experience working with the applicant

These references help establish not just technical qualifications but also the applicant’s approach to working with sensitive sources and information.

  1. Code of Conduct Commitment

All professional users must explicitly agree to our comprehensive code of conduct, which includes:

    • Ethical engagement standards for interacting with victim users
    • Confidentiality requirements for handling sensitive information
    • Appropriate use guidelines for platform features and data
    • Reporting obligations for concerning behavior or content
    • Consequences for violations of platform policies

This agreement creates clear expectations and accountability for all professional activity on the platform.

Category-Specific Verification Examples

To illustrate how our process works in practice, here are examples of verification for different professional categories:

Investigative Journalist Verification

For a journalist seeking access to connect with victims for potential stories, our process includes:

  1. Verification of identity through government-issued ID and employment records
  2. Confirmation of position with recognized news organization or established independent journalism credentials
  3. Review of published work history to confirm relevant experience
  4. Verification of editorial oversight and journalistic standards adherence
  5. Reference checks with editors or colleagues
  6. Specialized training requirement for trauma-informed reporting approaches

Academic Researcher Verification

For researchers studying patterns of victimization or system responses, verification includes:

  1. Confirmation of academic position or research institution affiliation
  2. Verification of appropriate research ethics board approvals
  3. Review of research focus and relevance to platform purpose
  4. Validation of publication history in relevant fields
  5. Confirmation of data handling protocols and privacy safeguards
  6. Verification of funding sources and research integrity

Law Enforcement Verification

For law enforcement professionals working on cold cases or pattern investigations:

  1. Verification of current law enforcement credentials and jurisdiction
  2. Confirmation of departmental authorization for platform use
  3. Case relevance assessment to confirm legitimate investigative purpose
  4. Verification of appropriate case handling protocols
  5. Supervisory confirmation and oversight verification
  6. Specialized training confirmation for victim-centered approaches

The Verification Timeline

We understand that professionals need timely access to the platform while also recognizing that thorough verification takes time. Our typical verification timeline includes:

  1. Initial application review: 1-2 business days
  2. Identity verification: 2-3 business days
  3. Credential verification: 3-5 business days
  4. Reference checks: 3-7 business days (depending on response time)
  5. Final review and decision: 1-2 business days

For most professional applicants, the entire process takes approximately 3-10 business days. We offer expedited verification in certain circumstances where there’s a time-sensitive need, such as active investigations with imminent safety concerns. During the verification process, professional users are granted limited access to the platform.

Ongoing Verification and Monitoring

Verification isn’t a one-time event—it’s an ongoing process that continues throughout a professional’s time on the platform:

  • Regular re-verification – Credentials are reverified periodically
  • Activity monitoring – Professional activity is reviewed for appropriate platform use
  • Feedback integration – Victim user feedback contributes to professional standing
  • Credential updates – Professionals must notify us of relevant changes to their professional status
  • Periodic review – Random spot checks ensure continued compliance with standards

This ongoing process ensures that changes in professional status or behavior are identified and addressed promptly.

When Verification Is Denied

Not all professional applications are approved. Common reasons for verification denial include:

  • Insufficient or unverifiable professional credentials
  • Concerning professional history or ethical violations
  • Inability to confirm identity or professional status
  • Conflict of interest that cannot be mitigated
  • Inappropriate approach to victim engagement

When verification is denied, applicants receive specific feedback about the decision and, when appropriate, guidance on what would be needed for future reconsideration. These users also receive a prorated refund for their subscription.

The Human Element in Verification

While we leverage technology to streamline parts of our verification process, human judgment remains essential. Our team of verification consultants includes:

  • Security specialists with background in identity verification
  • Subject matter experts in different professional fields
  • Ethics advisors focusing on appropriate use cases
  • Legal counsel for complex verification decisions
  • Platform leadership for policy development and oversight

This team regularly reviews and refines our verification approach, ensuring it remains both rigorous and fair as the platform evolves.

Verification Transparency

We believe in transparency about our verification process while maintaining the security of the system itself. Professional users receive:

  • Clear explanation of verification requirements before applying
  • Regular updates on their verification status during the process
  • Specific feedback if additional information is needed
  • Detailed explanation of any verification limitations or conditions
  • Clear indication of reverification requirements and timelines

This transparency builds trust with our professional users while maintaining the integrity of the verification system.

Verification as Trust Infrastructure

Our comprehensive verification process is more than just a security measure—it’s the essential infrastructure that enables trust throughout the Not Just One ecosystem. By ensuring that only qualified, legitimate professionals gain access to victim narratives, we create an environment where meaningful connections can occur safely.

For victims, our verification process provides confidence that their experiences are shared only with properly vetted professionals who approach their stories with the appropriate expertise and ethical foundation. For professionals, the process creates a community of verified peers and access to valuable narratives from victims who feel secure sharing with them.

If you’re a professional interested in joining our platform, we invite you to begin the verification process here. Our team is available to guide you through each step and answer any questions about our approach.

Have questions about our verification process? Contact our verification team at verification@notjustone.org.

Note: While this blog provides a comprehensive overview of our verification approach, some specific security details have been omitted to protect the integrity of the verification system.

Apply for Access

Ready to join our community of verified professionals?

Start your application today and gain access to valuable insights that can transform your work while respecting and empowering victims.

Not Just One provides a secure, controlled environment where survivors can share their experiences with qualified professionals who can help amplify their voices and potentially drive change. Our platform was built with safety, privacy, and well-being as our highest priorities.

Copyright © 2025 Not Just One, LLC | A North Carolina Limited Liability Company | Registered Address: 4030 Wake Forest Road Ste 349, Raleigh, NC 27609