Safeguarding Policy
Our commitment to protecting vulnerable users.
Last Updated: July 21, 2025
Guardian Angel is committed to providing a safe and supportive environment for all users. We recognize our responsibility to safeguard the welfare of vulnerable individuals who use our services. This policy outlines our procedures to prevent harm and to respond to any concerns about the safety of our users.
This policy applies to all staff, volunteers, and partners of the Guardian Angel project. It pertains to all activities and services provided through the application, including the Community Hub and Creative Gallery.
If you have an immediate concern for your safety or the safety of someone else, please contact your local emergency services immediately. For non-emergency concerns related to content or user behavior within the app, please use the reporting features available or contact our support team. All reports will be treated with confidentiality and urgency.
We have moderation processes in place for public-facing features. Any content that violates our community guidelines, including but not limited to harassment, hate speech, or explicit material, will be removed. Users who violate these policies may have their access restricted. Our team is trained to handle sensitive information and will take appropriate action in response to any safeguarding concerns, which may include reporting to relevant authorities if there is a risk of harm.
Our safeguarding strategy is both proactive and collaborative. We provide tools designed to prevent harm and facilitate support when needed. Active Safety Tools: Features like the Safety Check-in, Safe Word, and Parental Controls are designed to provide a layer of automated protection, giving users and their trusted contacts peace of mind. The Agency Portal: The portal remains a cornerstone of our strategy, allowing for secure, consent-driven information sharing between a user and verified support organisations. This enhances a user's safety net by enabling collaboration with professionals, but only when the user explicitly grants permission. All access is logged, and the user retains the ability to revoke access at any time.