Security & Anonymity

Our commitment to protecting your identity and data is at the core of our mission.

In the field of human rights, data security is not just a feature—it is a fundamental requirement for protecting the lives and well-being of the people we serve. Our platform is built on a "security-first" philosophy.

End-to-End Encryption

When you submit an incident report, the data is encrypted on your device before it is sent to our servers. This means only authorized personnel with the decryption key can read it.

Anonymous Reporting Protocol

For reports submitted anonymously, we do not log IP addresses or any other potentially identifying metadata. Your connection is routed through a secure, stateless node to protect your identity.

Secure Case ID System

After submitting a report, you receive a unique, randomly generated Case ID. This ID is the only way to track your case status, allowing you to follow up without ever revealing your personal information.

Volunteer Data Protection

Personal information from volunteer and member applications, such as CNIC numbers, is stored in a separate, highly restricted database with AES-256 encryption. Access is strictly controlled and audited.

How We Handle Evidence

Any files (images, documents) uploaded as evidence are encrypted and stored in a secure, isolated storage bucket with strict access controls. The files are detached from the original report metadata to prevent accidental correlation. Only the assigned case officer can temporarily access this evidence for verification purposes.

Reporting Security Vulnerabilities

If you believe you have found a security vulnerability in our platform, we urge you to contact us immediately and confidentially at jewaypakistanfoundation1906@gmail.com. We are committed to working with the security community to ensure our platform remains a safe haven.