Below are our most frequently asked questions and terms associated with the VictimsVoice tool. They are categorized by topic. If you do not see your question below and would like to reach out to us, please do so using our corporate CONTACT US page.
FREQUENTLY ASKED QUESTIONS (FAQ)
ACCESS & USAGE
No. We take privacy and security very seriously and therefore are not in the App Store, Google Play, or any other 3rd party application distribution site, as this would trigger an email receipt and force you to save an app icon to your device. It would also force you to use it on one device only. Ours can be used from any device or computer from anywhere, anytime.
Yes. Doing so will save our anonymous logo that you can name whatever you want. For instructions on how to do this for most devices, go to https://www.howtogeek.com/196087/how-to-add-websites-to-the-home-screen-on-any-smartphone-or-tablet/
Because nothing is stored on any device, you can log into your account using any computer or mobile device, even a public library.
Yes. Your information is NEVER stored on any device, so you can use any computer or mobile device.
Each state’s laws on audio and video surveillance differ greatly. In some states, it is legal for one party to consent without the other. In some states, the same action may be a felony offense. In order to eliminate the risk of contaminating the user’s record for use in a legal setting, we chose to only allow for photographs.
If you have an audio file, you can transcribe the conversation and enter it as text.
If you have a video file, we recommend you screen capture different video frames and upload them as photos, creating a “video” without an actual video file.
You should always consult an attorney to best understand the legal outcomes of recording or videotaping a conversation or abusive situation.
No. Complete control has been given to the user who decides if, when, and to whom the report is sent.
PRIVACY & SECURITY
We use the same proven security standards used by government entities and banks. Your information is encrypted and stored off-device, ensuring that even if your account was accessed, none of your entries or uploads can be seen, accessed, edited, deleted, or destroyed.
We will keep your information safe as long as your account is active. If your account becomes inactive, we store your evidence as long as is required by law, taking into consideration the furthest statute of limitations.
ACCOUNT INFORMATION & BILLING
Yes. Your information is stored permanently and you only pay for the account when you need to use it.
They are good for five (5) years from the date we ship them to you. Once activated, they are good for one year’s usage.
Regardless of who pays for the license, the account user is in control – always.
We get this question often. We are not outside funded. This means that all the staff, systems to keep the data secure, development to build and update the tool, marketing… you get the picture – it all costs money and it’s not cheap. We have to be able to pay our bills to offer a tool of this caliber.
That said, we offer multiple ways to get free licenses into the hands of those who can’t afford the $39.95 per year fee, such as our donor, gifting, and Partner programs. If you need a license and cannot access one, we are happy to work with you to make sure you have access to VictimsVoice.
GIFTING & DONATIONS
You can and we encourage this! We call it our “Gifting Program.” It’s a pretty powerful gift to give someone their legal voice.
There are a couple of ways to do this: (1) you can order a card to be shipped to you or them to give them a physical card, or (2) you can order an individual license and have an activation code emailed to you so you can discretely give it to them.
You can order cards and designate them to a non-government Partner in our Partner Program or you can donate a card through our VictimsVoice Halo Fund. This not only provides a free license, but it also contributes to a cash fund that delivers interest-free loans so victims can get out and feel safe. For more information about our VictimsVoice Halo Fund program, CLICK HERE.
PARTNER PROGRAM & RESOURCE DIRECTORY
Any victim/survivor-serving entity can be a partner in the VictimsVoice Partner Program. Most common partners include District Attorneys/Prosecutors, victim advocates, nonprofits, family law attorneys, law enforcement, and forensic nurses.
It is important for us to support both sides – the victim/survivor and those who have programs and resources to help them move forward. As we are a tool, we can help encourage those who need help to get in front of the right people and see what resources are available to them by offering access to VictimsVoice at no charge through those agencies and organizations.
A resource is an organization or entity that has programs, services, or tools to help victims and survivors navigate the healing process and potentially the justice system. A Partner is an organization or agency that commits to providing access to our VictimsVoice tool to those who might not be able to afford it or safely access a license on their own.
Visit https://victimsvoice.app/find-a-resource/submit-a-resource/ and fill out the form. Each applicant goes through an initial vetting process to ensure they are a legitimate resource. Once the review process is done, we will post your information and you will receive an email to review the information.
TERMS TO KNOW
Also known as multi-factor authentication, it is an electronic authorization method in which the user is given access to a website or application only after successfully presenting two or more pieces of evidence to prove they should be granted access. Common methods are logging in with a username and password, then texted a code to enter at the site/application, accessing a code using an authenticator app (such as Google or Microsoft Authenticator), or accepting a prompt from another device, such as double-clicking the button on an Apple watch.
The Americans with Disabilities Act of 1990 or ADA is a civil rights law that prohibits discrimination based on disability. This includes accessibility for websites and applications.
App or ‘application” icons are a picture representation that identifies a specific app on your mobile device or computer. When tapped or clicked, it will open that application (or program).
Authentication is the process or action of proving or showing something to be true, genuine, or valid. It is also the process of verifying the identity of a person or device. The most commonly used authentication for technology access is username and password.
Whenever you use the Internet, you leave a record of the websites you visit, along with each and everything you click. To track this information, many websites save a small piece of data—known as a cookie—to your web browser. In addition to cookies, many websites can use your user accounts to track browsing activity. GCFGlobal
For a no-track option, DuckDuckGo offers a search engine, Google Extension, and mobile app browser.
Chain of custody (CoC), in legal contexts, is the chronological documentation or paper trail that records the sequence of custody, control, transfer, analysis, and disposition of physical or electronic evidence. In other words, being able to prove from the time the information (data) was created until the time it is delivered to the intended recipient (court, attorneys, etc.), it can be proven without a doubt who had access to that information and whether it was accessed, altered, or deleted in part or in whole.
If you cannot prove the chain of custody for your evidence, it likely will not be allowed as evidence.
“The cloud” refers to servers that are accessed over the Internet, and the software and databases that run on those servers. Cloud servers are located in data centers all over the world. By using cloud computing, users and companies don’t have to manage physical servers themselves or run software applications on their own machines. Cloudflare
When information (data) collects in one place, it is called data at rest. It is not actively moving from device to device or network to network such as data stored on a hard drive, laptop, flash drive, or archived/stored in some other way. Data protection at rest aims to secure inactive data stored on any device or network.