Our Policies

/

Safety & Security Policy

Safety & Security Policy

Account Security Infrastructure

We implement multi-layered security measures to protect user accounts from unauthorized access and malicious activities. Our security infrastructure includes advanced encryption protocols, secure authentication systems, and continuous monitoring for suspicious activities. All user passwords are hashed using industry-standard algorithms, and we regularly update our security protocols to address emerging threats.

We offer multi-factor authentication (MFA) to all users and strongly encourage its use, particularly for high-profile accounts and content creators. Our MFA system supports various authentication methods, including SMS, email, authenticator apps, and hardware security keys. We also implement adaptive authentication that considers factors such as device recognition, location, and behavioral patterns to identify potentially unauthorized access attempts

Fraud Prevention and Detection

Our fraud prevention systems use machine learning algorithms to analyze patterns of behavior and identify potentially fraudulent activities, including fake account creation, coordinated inauthentic behavior, and financial fraud. These systems operate in real-time to prevent harmful activities before they can impact other users or our platform's integrity.

We maintain databases of known malicious actors and use this information to prevent banned users from creating new accounts. Our systems also detect and prevent various forms of platform manipulation, including vote manipulation, artificial engagement, and coordinated campaigns designed to spread misinformation or harass users.

User Safety Tools and Features

We provide users with comprehensive tools to control their safety and privacy on our platform. These include robust blocking and muting features that prevent unwanted contact and content from specific users. Users can also filter content based on keywords, topics, or other criteria to avoid potentially disturbing or triggering material.

Our reporting system allows users to quickly report safety concerns, with specialized reporting flows for different types of issues such as harassment, impersonation, or immediate safety threats. Priority is given to reports involving potential violence, self-harm, or other urgent safety concerns, with these reports being reviewed by specially trained safety specialists.

Data Protection and Privacy Security

We employ comprehensive data protection measures to safeguard user information from unauthorized access, theft, or misuse. All user data is encrypted both in transit and at rest using industry-standard encryption protocols. Our data centers feature multiple layers of physical and digital security, including biometric access controls, surveillance systems, and environmental monitoring.

We conduct regular security audits and penetration testing to identify and address potential vulnerabilities in our systems. Our security team includes certified experts who monitor global threat intelligence and implement protective measures against emerging security threats. We also maintain incident response procedures to quickly contain and mitigate any security breaches that may occur.

Third-Party Security and Vendor Management

All third-party service providers who have access to user data must undergo comprehensive security assessments and agree to strict contractual obligations regarding data protection. We regularly audit our vendors' security practices and require them to notify us immediately of any security incidents that could affect our users' data.

We maintain detailed records of all third-party data sharing arrangements and ensure that these arrangements comply with applicable privacy laws and regulations. Our vendor management program includes regular security reviews, contract updates, and termination procedures for vendors who fail to meet our security standards.

Incident Response and Communication

In the event of a security incident, we have established procedures to quickly assess the scope and impact of the incident, contain any ongoing threats, and notify affected users as required by law. Our incident response team includes technical experts, legal counsel, and communications specialists who work together to manage all aspects of incident response.

We are committed to transparency about security incidents and will provide clear, accurate information to affected users about what happened, what information may have been involved, and what steps we are taking to prevent similar incidents in the future. We also work closely with law enforcement and regulatory authorities when incidents involve criminal activity or violations of applicable laws.

Copyright © 2025 Digizenship.

Contact Information

Digizenship Ltd, 86-90 Paul Street, London, England, EC2A 4NE

support@digizenship.com

Home

Get help

Our Policies

Copyright © 2025 Digizenship.

Contact Information

Digizenship Ltd, 86-90 Paul Street, London, England, EC2A 4NE

support@digizenship.com

Our Policies

/

Safety & Security Policy

Safety & Security Policy

Account Security Infrastructure

We implement multi-layered security measures to protect user accounts from unauthorized access and malicious activities. Our security infrastructure includes advanced encryption protocols, secure authentication systems, and continuous monitoring for suspicious activities. All user passwords are hashed using industry-standard algorithms, and we regularly update our security protocols to address emerging threats.

We offer multi-factor authentication (MFA) to all users and strongly encourage its use, particularly for high-profile accounts and content creators. Our MFA system supports various authentication methods, including SMS, email, authenticator apps, and hardware security keys. We also implement adaptive authentication that considers factors such as device recognition, location, and behavioral patterns to identify potentially unauthorized access attempts

Fraud Prevention and Detection

Our fraud prevention systems use machine learning algorithms to analyze patterns of behavior and identify potentially fraudulent activities, including fake account creation, coordinated inauthentic behavior, and financial fraud. These systems operate in real-time to prevent harmful activities before they can impact other users or our platform's integrity.

We maintain databases of known malicious actors and use this information to prevent banned users from creating new accounts. Our systems also detect and prevent various forms of platform manipulation, including vote manipulation, artificial engagement, and coordinated campaigns designed to spread misinformation or harass users.

User Safety Tools and Features

We provide users with comprehensive tools to control their safety and privacy on our platform. These include robust blocking and muting features that prevent unwanted contact and content from specific users. Users can also filter content based on keywords, topics, or other criteria to avoid potentially disturbing or triggering material.

Our reporting system allows users to quickly report safety concerns, with specialized reporting flows for different types of issues such as harassment, impersonation, or immediate safety threats. Priority is given to reports involving potential violence, self-harm, or other urgent safety concerns, with these reports being reviewed by specially trained safety specialists.

Data Protection and Privacy Security

We employ comprehensive data protection measures to safeguard user information from unauthorized access, theft, or misuse. All user data is encrypted both in transit and at rest using industry-standard encryption protocols. Our data centers feature multiple layers of physical and digital security, including biometric access controls, surveillance systems, and environmental monitoring.

We conduct regular security audits and penetration testing to identify and address potential vulnerabilities in our systems. Our security team includes certified experts who monitor global threat intelligence and implement protective measures against emerging security threats. We also maintain incident response procedures to quickly contain and mitigate any security breaches that may occur.

Third-Party Security and Vendor Management

All third-party service providers who have access to user data must undergo comprehensive security assessments and agree to strict contractual obligations regarding data protection. We regularly audit our vendors' security practices and require them to notify us immediately of any security incidents that could affect our users' data.

We maintain detailed records of all third-party data sharing arrangements and ensure that these arrangements comply with applicable privacy laws and regulations. Our vendor management program includes regular security reviews, contract updates, and termination procedures for vendors who fail to meet our security standards.

Incident Response and Communication

In the event of a security incident, we have established procedures to quickly assess the scope and impact of the incident, contain any ongoing threats, and notify affected users as required by law. Our incident response team includes technical experts, legal counsel, and communications specialists who work together to manage all aspects of incident response.

We are committed to transparency about security incidents and will provide clear, accurate information to affected users about what happened, what information may have been involved, and what steps we are taking to prevent similar incidents in the future. We also work closely with law enforcement and regulatory authorities when incidents involve criminal activity or violations of applicable laws.