Skip to main content

Below are our most frequently asked questions and terms associated with the VictimsVoice tool. They are categorized by topic. If you do not see your question below and would like to reach out to us, please do so using our corporate CONTACT US page.



Are you in the App Store or Google Play?

No. We take privacy and security very seriously and therefore are not in the App Store, Google Play, or any other 3rd party application distribution site, as this would trigger an email receipt and force you to save an app icon to your device. It would also force you to use it on one device only. Ours can be used from any device or computer from anywhere, anytime.

Can I save the app on my phone?

Yes. Doing so will save our anonymous logo that you can name whatever you want. For instructions on how to do this for most devices, go to

What if my phone is destroyed?

Because nothing is stored on any device, you can log into your account using any computer or mobile device, even a public library.

Can I access my account from any computer?

Yes. Your information is NEVER stored on any device, so you can use any computer or mobile device.

Can kids use this app too?

Because of the Children’s Online Privacy Protection Act (COPPA), our application is allowable to those 13 years and older (it’s in our Terms of Service).

Why don't you allow video and audio recordings?

Each state’s laws on audio and video surveillance differ greatly. In some states, it is legal for one party to consent without the other. In some states, the same action may be a felony offense. In order to eliminate the risk of contaminating the user’s record for use in a legal setting, we chose to only allow for photographs.

If you have an audio file, you can transcribe the conversation and enter it as text.

If you have a video file, we recommend you screen capture different video frames and upload them as photos, creating a “video” without an actual video file.

You should always consult an attorney to best understand the legal outcomes of recording or videotaping a conversation or abusive situation.

Does your app report anything automatically?

No. Complete control has been given to the user who decides if, when, and to whom the report is sent.


Is my information safe?

We use the same proven security standards used by government entities and banks. Your information is encrypted and stored off-device, ensuring that even if your account was accessed, none of your entries or uploads can be seen, accessed, edited, deleted, or destroyed.

How long do you keep my information?

We will keep your information safe as long as your account is active. If your account becomes inactive, we store your evidence as long as is required by law, taking into consideration the furthest statute of limitations.


What happens if my account expires? Can I still access it later?

Yes. Your information is stored permanently and you only pay for the account when you need to use it.

How long are the Activation Cards good for?

They are good for five (5) years from the date we ship them to you. Once activated, they are good for one year’s usage.

What if I'm given an activation card - who controls the account?

Regardless of who pays for the license, the account user is in control – always.

Why do you charge for access to VictimsVoice?

We get this question often. We are not outside funded. This means that all the staff, systems to keep the data secure, development to build and update the tool, marketing… you get the picture – it all costs money and it’s not cheap. We have to be able to pay our bills to offer a tool of this caliber.

That said, we offer multiple ways to get free licenses into the hands of those who can’t afford the $39.95 per year fee, such as our donor, gifting, and Partner programs. If you need a license and cannot access one, we are happy to work with you to make sure you have access to VictimsVoice.


Can I pay for a license for someone else?

You can and we encourage this! We call it our “Gifting Program.” It’s a pretty powerful gift to give someone their legal voice.

There are a couple of ways to do this: (1) you can order a card to be shipped to you or them to give them a physical card, or (2) you can order an individual license and have an activation code emailed to you so you can discretely give it to them.

How can I donate cards?

You can order cards and designate them to a non-government Partner in our Partner Program or you can donate a card directly to an individual.


Who can be a Partner in the Partner Program?

Any victim/survivor-serving entity can be a partner in the VictimsVoice Partner Program. Most common partners include District Attorneys/Prosecutors, victim advocates, nonprofits, family law attorneys, law enforcement, and forensic nurses.

Why do you call it a Partner Program?

It is important for us to support both sides – the victim/survivor and those who have programs and resources to help them move forward. As we are a tool, we can help encourage those who need help to get in front of the right people and see what resources are available to them by offering access to VictimsVoice at no charge through those agencies and organizations.

What's the difference between a Resource and a Partner?

A resource is an organization or entity that has programs, services, or tools to help victims and survivors navigate the healing process and potentially the justice system. A Partner is an organization or agency that commits to providing access to our VictimsVoice tool to those who might not be able to afford it or safely access a license on their own.

How do I become or recommend a resource listed in your directory?

Visit and fill out the form. Each applicant goes through an initial vetting process to ensure they are a legitimate resource. Once the review process is done, we will post your information and you will receive an email to review the information.


2-Factor Authentication / 2-Step Authentication (SECURITY)

Also known as multi-factor authentication, it is an electronic authorization method in which the user is given access to a website or application only after successfully presenting two or more pieces of evidence to prove they should be granted access. Common methods are logging in with a username and password, then texted a code to enter at the site/application, accessing a code using an authenticator app (such as Google or Microsoft Authenticator), or accepting a prompt from another device, such as double-clicking the button on an Apple watch.

ADA - Americans with Disabilities Act (LEGAL)

The Americans with Disabilities Act of 1990 or ADA is a civil rights law that prohibits discrimination based on disability. This includes accessibility for websites and applications.

App - Mobile Application (TECHNOLOGY)

A mobile application (also referred to as a mobile app or simply an app) is a computer program or software application designed to run on a mobile device such as a phone, tablet, or watch. Wikipedia


App or ‘application” icons are a picture representation that identifies a specific app on your mobile device or computer. When tapped or clicked, it will open that application (or program).

Authentication (SECURITY)

Authentication is the process or action of proving or showing something to be true, genuine, or valid. It is also the process of verifying the identity of a person or device. The most commonly used authentication for technology access is username and password.


A backup or data backup is a copy of computer data taken and stored elsewhere so that it may be used to restore the original after a data loss event. Wikipedia

Biometrics (SECURITY)

Biometrics or biometric authentication in our context is used as a form of identification and access control, such as fingerprints or facial recognition.


A browser is a software that is used to access the internet. Commonly used browsers are Chrome, Firefox, Safari, and Edge. DuckDuckGo offers a mobile browser (see Browser Tracking).

Browser Tracking (SECURITY)

Whenever you use the Internet, you leave a record of the websites you visit, along with each and everything you click. To track this information, many websites save a small piece of data—known as a cookie—to your web browser. In addition to cookies, many websites can use your user accounts to track browsing activity. GCFGlobal

For a no-track option, DuckDuckGo offers a search engine, Google Extension, and mobile app browser.

CCPA - California Consumer Privacy Act (LEGAL)

The California Consumer Privacy Act is a state statute intended to enhance privacy rights and consumer protection for residents of California, United States. Wikipedia

Chain of Custody (EVIDENCE)

Chain of custody (CoC), in legal contexts, is the chronological documentation or paper trail that records the sequence of custody, control, transfer, analysis, and disposition of physical or electronic evidence. In other words, being able to prove from the time the information (data) was created until the time it is delivered to the intended recipient (court, attorneys, etc.), it can be proven without a doubt who had access to that information and whether it was accessed, altered, or deleted in part or in whole.

If you cannot prove the chain of custody for your evidence, it likely will not be allowed as evidence.

Cloud Server - aka, "The Cloud" (TECHNOLOGY)

“The cloud” refers to servers that are accessed over the Internet, and the software and databases that run on those servers. Cloud servers are located in data centers all over the world. By using cloud computing, users and companies don’t have to manage physical servers themselves or run software applications on their own machines. Cloudflare


A cookie (also referred to as web cookies, browser cookies, HTML cookies, or tracking cookies) is a tiny little file that’s stored on your computer and contains the address of the Web site and codes that your browser sends back to the Web site each time you visit a web page.


When information (data) collects in one place, it is called data at rest. It is not actively moving from device to device or network to network such as data stored on a hard drive, laptop, flash drive, or archived/stored in some other way. Data protection at rest aims to secure inactive data stored on any device or network.

Hearsay (EVIDENCE)

Hearsay, also called hearsay evidence is evidence based on information received from another.

In most courts, hearsay evidence is inadmissible unless an exception to the Hearsay Rule applies.

Translate »