55.2 F
Portland

Grounded Truth & News Movement (GTNM)
Effective Date: November 1, 2024
Last Updated: April 10, 2025


1. Introduction

Grounded Truth & News Movement (GTNM) is committed to protecting user data, ensuring website security, and responding to cybersecurity incidents in a timely and transparent manner.

  • GTNM follows best practices for cybersecurity, encryption, and data protection.
  • GTNM implements an incident response plan for potential breaches or cyber threats.
  • GTNM ensures compliance with GDPR, CCPA, and industry standards.

If GTNM detects a security breach affecting user data, impacted users will be notified promptly.


2. GTNM’s Security Measures

✔ Encryption & Data Security

  • SSL Encryption – Secures communication between users and GTNM’s website.
  • Cloudflare Network Security – Blocks DDoS attacks and cyber threats.
  • Encrypted Data Storage – All user data is protected with encrypted storage protocols.

✔ Access Control & User Authentication

  • Restricted Data Access – Only GTNM staff with clearance can access user data.
  • Two-Factor Authentication (2FA) – Required for administrative access.
  • Login Monitoring – Suspicious activity is logged and flagged automatically.

✔ Regular Security Audits & Monitoring

  • Daily malware scans and vulnerability detection.
  • Firewall implementation to block unauthorized intrusions.
  • Automated, secure backups of site data.

GTNM regularly updates security protocols to defend against evolving cyber threats.


3. Incident Response Plan

GTNM follows a structured five-step incident response protocol for any cyber threat:

  1. Detection & Classification – Monitoring logs and alerts for irregular activity.
  2. Containment & Mitigation – Isolating affected systems, revoking credentials, and applying fixes.
  3. Investigation & Forensics – Determining the breach source and scope.
  4. User Notification & Legal Reporting – Affected users are notified within 72 hours; regulatory agencies contacted if required.
  5. Remediation & Prevention – Addressing the root cause, retraining staff, and auditing systems.

For security incidents, contact: [email protected]


4. Data Protection from Cyber Threats

  • No financial data stored – GTNM does not collect or store credit card info.
  • Strict authentication protocols – Protects user logins.
  • Automated brute-force detection – Blocks suspicious login attempts in real time.

GTNM encourages users to take extra precautions such as using 2FA and strong passwords.


5. How Users Can Protect Their Accounts

  • Create strong, unique passwords.
  • Enable Two-Factor Authentication when possible.
  • Ignore phishing attempts – GTNM will never request credentials via email.
  • Keep your browser and devices updated.

If your account may be compromised, reset your password and contact GTNM security.


6. Compliance with Cybersecurity Laws

  • GDPR (EU) – 72-hour breach notification and data minimization enforced. Learn more
  • CCPA (California) – Transparency and opt-out rights honored. More info
  • NIST / ISO 27001 – Aligned with U.S. and international cybersecurity standards.

See our Privacy Policy for complete data practices.


7. What Happens If There’s a Breach?

  • ✔ Users are notified within 72 hours of a verified breach.
  • ✔ GTNM secures affected systems and conducts internal review.
  • ✔ Public security notices will be posted on GTNM.org and Substack if large-scale incidents occur.

Report suspicious activity to: [email protected]


8. Updates to This Policy

  • ✔ Changes will be posted with an updated “Last Updated” date.
  • ✔ Users are encouraged to check this policy regularly.

Critical security changes will be announced via Substack and our main site.


9. Contact Us

Email: [email protected]
Location: Oregon, USA

GTNM is committed to protecting user privacy and responding to incidents swiftly and transparently.