OUR SECURITY MEASURES

How We Protect Anonymity

Simple, Secure, and Truly Anonymous

At Share a Concern, anonymity isn’t just an option—it’s built into our design. Employees never need to register or create an account. Instead, they access their employer’s submission page using a unique Employer ID.

When a concern is shared, our system automatically generates a random 7-digit Concern ID. The employee then selects a 4-digit PIN, creating a secure way to check back on their concern without revealing their identity. This combination results in 100 billion unique possible Concern ID and PIN pairings, ensuring a high level of security and anonymity. With just their Concern ID and PIN, employees can log in later to exchange anonymous messages, share files, and track progress.

For those who want updates, employees can choose to provide Share a Concern with their email or mobile number to receive real-time alerts when the employer takes action. However, this information is never shared with the employer, ensuring privacy while keeping employees informed.

How we keep our systems secure and your data safe

State-of-the-Art Data Centers

Our data is hosted in world-class, ISO 27001, SOC II, and PCI/DSS certified centers with top-tier physical security and 24/7 monitoring to ensure your data's safety.

Comprehensive Network Security

Our network security features layered protection with firewalls, intrusion detection, and continuous monitoring. We also implement advanced application security to guard against SQL injections and cross-site scripting.

Access control and permissions

We provide granular data access controls, allowing you to set user-specific permissions and ensure only authorized individuals can manage sensitive information, ensuring data confidentiality.

End-to-end encryption

We protect your data with strong encryption, using TLS for data in transit and AES-256 for data at rest, ensuring sensitive information stays secure and confidential.

Redundancy and backup

We perform daily encrypted backups stored in multiple locations, ensuring your data remains accessible and recoverable in case of a disaster.

View Frequently Asked Questions