Safe YOU

Free multilingual, safety mobile application for women and girls that assists in response and prevention of violence against women and girls, enabling them to get access to professional consultations, reliable information, and community. It is also a content management and monitoring platform for governmental and non-governmental organizations to raise awareness, educate and empower women and girls.


Type of Digital Public Good

  • Open content
  • Open data
  • ✅  Open software
  • Open standard
  • Open AI model

1. Is it relevant to one of the Sustainable Development Goals?

  • 5. Gender Equality

    Evidence: Our solution - Safe YOU mobile application, is an innovative tool to combat violence against women and girls (VAWG), it also provides tools for stakeholders of the field (govermental and non governmental organizations, international organizations) to create and manage content intended to educate women and girls on differents subjects that can potentially prevent the VAWG, as well as empower them through consolidation of resources, knowledge and community. Thereby our solution is intended to reach most of the targets set out for “Gender Equality” sustainable development goal (targets: 5.1, 5.2, 5.3 5.6, 5b, 5c).

    Link to Evidence:

2. Does it use an appropriate open license?

Yes, this project is licensed under the following license(s):

3. Is ownership clearly defined?

Is the ownership of the project and everything that the project produces clearly defined and documented?


If yes - please link to the relevant copyright, trademarks, or ownership documentation for the project.

4. Does the license of libraries/dependencies undermine the openess of the project?

Does this open project have mandatory dependencies (i.e. libraries, hardware) that create more restrictions than the original license?


If yes - are the open source components able to demonstrate independence from the closed component(s) and/or are there functional, open alternatives?

Not Applicable

If yes - please describe how the open source components are independent and/or list the open alternatives for the closed component:

Not Applicable

5. Is there documentation?

Does some documentation exist of the source code, use cases, and/or functional requirements. For software projects, this should be present as technical documentation that would allow a technical person unfamiliar with the project to launch and run the software. For datasets and data projects, this should be present as documentation that describes all the fields in the set, and provides context on how the data was collected and how it should be interpreted. For content collections, this should indicate any relevant compatible apps, software, hardware required to access the content and any instructions about how to use it.


If yes - please link to the relevant documentation:

6. Is non PII data and/or content accessible?

Does this project collect or use non-personally identifiable information (non-PII) data and/or content?


If yes - is there a mechanism for extracting or importing non-personally identifiable information (non-PII) from the system in a non-proprietary format?


If yes - describe the mechanism for extracting or importing non-personally identifiable information from the system in a non-proprietary format:

Extraction of non PII is made through a manual mechanism from database. It still remains a restricted information and can be extracted only by authorized personnel.

7. Does the project adhere to privacy and other applicable international and domestic laws?

Has this project taken steps to ensure adherence with relevant privacy, domestic, and international laws? For example, the General Data Protection Regulation (GDPR) in the European Union or the Supplementary Act A/SA.1/01/10 on Personal Data Protection for the Economic Community of West African States (ECOWAS) (yes/no)


If yes, please list some of relevant laws that the project complies with:

  • The Project is currently active in Armenia and Georgia. Our Policies comply with Domestic information Security laws, both in Armenia and Georgia. More specifically, this refers to “RA Civil Code” adopted on 5 May 1998, “RA Law on protection of personal data” adopted on 18 May 2015. For Georgia: "Law of Georgia on Information Security" adopted on 01/07/2012. We are currently reviewing our policies to comply with GDPR.

If yes, please describe the steps this project has taken to ensure adherence (include links to terms of service, privacy policy, or other relevant documentation):

8. Does the project adhere to standards and best practices?

Does this project support standards? (i.e. Web Content Accessibility Guidelines (WCAG) 2.1 or other standards such as those listed on W3C)


Which standards does this project support (please list)

  • Web DEsign and Applications: HTML, CSS
  • Web Architecture: URIs
  • Web of Services: HTTP, REST, JSON

Can you point to evidence of your support? (i.e. please link to your validator, open test suite, etc.)

Was this project built and developed according to or in adherence with any design, technical and/or sector best practices or principles? i.e. the Principles for Digital Development?


Which principles and best practices does this project support (please list)

  • Principles for Digital Development

9. Does the project do no harm by design?

Has this project taken steps to anticipate, prevent and do no harm by design?

On the whole, does this project take steps to ensure that it anticipates, prevents and does no harm by design?


Is there any additional information you would like to share about the mechanisms, processes or policies that this project uses to avoid doing harm by design?

Since the usage of the mobile App may itself become a problem for already vulnerable groups, we have created two advanced security layers to minimize the risk of abusers discovering the app: a Dual PIN and a camouflage icon setting. The Dual PIN acts as a safety measure, allowing users to create a real PIN to access the app and a fake PIN that displays a photo gallery. The camouflage setting hides the app icon by displaying it as an image editing app so that women can use the app without fear of reprisal. The content in Forums is generated through our organization's content creators and by the personnel of governmental and non-governmental organizations who are partnering with us and have access to the tools of content generation and management. Contributors of the Forums section are thoroughly chosen making sure that they adhere to the general principle of “Do no harm”, while they create content and/or consult adolescent girls and women. Our Partner organizations are responsible to make sure that their engaged personnel acts appropriately e.g.:
- Avoids questions, attitudes or comments that are judgmental or insensitive to cultural values or status;
-Does not use language, make suggestions, provide misleading information or offer advice, which is inappropriate, offensive or abusive.
In the Forums users engage with each other in discussions and can ask questions to our partner organizations or to verified consultants, who are identifiable in the forums by a “verified badge”. That is why we clearly define in our Terms and Conditions and relevant policies that the users should refrain from abusing, threatening or otherwise violating the rights of others they are not allowed to publish, post, distribute or disseminate any inappropriate, threatening, infringing, obscene or unlawful topic, material or information. To adhere the principle of “Do no harm” we have moderation access in our “Forums” section, which permits our partner organizations to moderate and remove content (user comments) that violates our terms, in some cases (when the users continue acting the same way after two notifications) the moderators have the right to block the users, who create content violating our terms. For now, the moderation in the platform is done manually by moderating the content daily. We are also currently working on functionality so that the users and contributors can report the abusive comments from mobile App and management dashboard, respectively.
The Terms and Conditions as well as our Privacy Policies clearly describe these circumstances, and the users give consent to such data sharing.

9.a. Data Privacy & Security

Does this project collect or store personally identifiable information (PII) data and/or content?


If yes - please list the types of data and/or content collected and/or stored by the project:

  • Name
  • Surname
  • mobile number
  • marital status (non compulsory)
  • birthdate
  • geolocation (when help function is used)
  • e-mail (when an e-mail is sent to third parties through our platform).

If yes - does this project share this data and/or content with third parties?


Please describe the circumstances with which this project shares data and/or content with third parties. Please add links as relevant.

  • User's name, surname, mobile number, and geolocation are shared with the prechosen contacts: when the user is in danger, she can press the help button of the App, this will send a free alert SMS, with user's Name, Surname, and geolocation to up to 7 directions of prechosen contacts to let them know that the user is in danger. These contacts may be anyone from user's phone's contacts list, NGOs or state authorities that are included in our Apps 'Network' section, as well as the Police, if the 'Contact Police' function is enabled by the user.

If yes - does the project ensure the privacy, security and integrity of this data and/or content collection and has it taken steps to prevent adverse impacts resulting from its collection, storage and distribution.


If yes - please describe the steps, and include a link to the privacy policy and/or terms of service:

We ensure the security of collected data both by technical and policy means, more specifically the number of personnel, who has access to such data is strictly limited, moreover all the personnel has signed non-disclosure agreementS (NDAs), which clearly define user’s personal data as a confidential information subject to confidentiality terms, the NDAs also imply strict monetary penalties in case of breach.
As to the technical level of ensuring security of the data, we use SSL certificates, database connection is private -> connection to the DB is available only via local server (outbound connections are disabled).

9.b. Inappropriate & Illegal Content

Does this project collect, store or distribute content?


If yes - what kinds of content does this project, collect, store or distribute? (i.e. childrens books)

The content in forums are related to vast variety of topics that may interest women (e.g. reproductive health, psychological help, parenting, maternity, law etc.)

If yes - does this project have policies that describe what is considered innappropriate content? (i.e. child sexual abuse materials)


If yes - please link to the relevant policy/guidelines/documentation.

We have included the list (non-exhaustive) of inappropriate content that is not allowed to be distributed through Safe YOU in Ground Rules section of our Terms and Conditions:

If yes - does this project have policies and processes for detecting and moderating innappropriate/illegal content?


If yes - please describe the policies and processes for detecting, reporting and removing innapropriate/illegal content (Please include the average response time for assessment and/or action. Link to any policies or descriptions of how inappropriate content is handled):

We have moderators, who are monitoring users’ comments on a daily basis and reviewing their compliance to our general terms. If an inappropriate content is detected, the author of the content is warned that the comment does not correspond to our ground rules, and it should be removed by moderator.
The users and contributors themselves have the option to contact moderator through e-mail to report the abusive content. The response time usually varies from 24-48 hours. Currently we are developing tools for users and contributors to report comments, which they find inappropriate.
Our Terms and conditions state that Safe YOU can review user’s conduct and content for compliance with the T&C and reserves the right to remove any violating content.

9.c. Protection from harassment

Does this project facilitate interactions with or between users or contributors?


If yes - does the project take steps to address the safety and security of underage users?


If yes - please describe the steps this project takes to address risk or prevent access by underage users:

  • The users can access the content in “Forums” section of the Mobile app, if the content has age restrictions it should be clearly mentioned both in the subject of the Forum and in its banner photo. No age specific age restrictions have been made so far (e.g., blocking limiting access to relevant content for users under specific age). The Project team is currently working on creating a separate environment for users under the age 18.

If yes - does the project help users and contributors protect themselves against grief, abuse, and harassment?


If yes - please describe the steps taken to help users protect themselves.

  • The users and contributors can contact project team and report the issues that they have had related to the App or the content. As mentioned above we are currently working on developing tools for users and contributors to be able to report the content, which they find harassing.
  • Our users are encouraged to hide their identity when they interact in forums with contributors and other users, this is to ensure the anonymity and safety of the users themselves.

Development & deployment countries

List of countries this project was developed in.

  • Armenia

List of countries this project is actively deployed in.

  • Armenia
  • Georgia