Grounded Truth & News Movement (GTNM)
Effective Date: November 1, 2024
Last Updated: April 10, 2025
1. Introduction
Grounded Truth & News Movement (GTNM) is committed to protecting user data, ensuring website security, and responding to cybersecurity incidents in a timely and transparent manner.
- ✔ GTNM follows best practices for cybersecurity, encryption, and data protection.
- ✔ GTNM implements an incident response plan for potential breaches or cyber threats.
- ✔ GTNM ensures compliance with GDPR, CCPA, and industry standards.
If GTNM detects a security breach affecting user data, impacted users will be notified promptly.
2. GTNM’s Security Measures
✔ Encryption & Data Security
- SSL Encryption – Secures communication between users and GTNM’s website.
- Cloudflare Network Security – Blocks DDoS attacks and cyber threats.
- Encrypted Data Storage – All user data is protected with encrypted storage protocols.
✔ Access Control & User Authentication
- Restricted Data Access – Only GTNM staff with clearance can access user data.
- Two-Factor Authentication (2FA) – Required for administrative access.
- Login Monitoring – Suspicious activity is logged and flagged automatically.
✔ Regular Security Audits & Monitoring
- Daily malware scans and vulnerability detection.
- Firewall implementation to block unauthorized intrusions.
- Automated, secure backups of site data.
GTNM regularly updates security protocols to defend against evolving cyber threats.
3. Incident Response Plan
GTNM follows a structured five-step incident response protocol for any cyber threat:
- Detection & Classification – Monitoring logs and alerts for irregular activity.
- Containment & Mitigation – Isolating affected systems, revoking credentials, and applying fixes.
- Investigation & Forensics – Determining the breach source and scope.
- User Notification & Legal Reporting – Affected users are notified within 72 hours; regulatory agencies contacted if required.
- Remediation & Prevention – Addressing the root cause, retraining staff, and auditing systems.
For security incidents, contact: [email protected]
4. Data Protection from Cyber Threats
- ✔ No financial data stored – GTNM does not collect or store credit card info.
- ✔ Strict authentication protocols – Protects user logins.
- ✔ Automated brute-force detection – Blocks suspicious login attempts in real time.
GTNM encourages users to take extra precautions such as using 2FA and strong passwords.
5. How Users Can Protect Their Accounts
- ✔ Create strong, unique passwords.
- ✔ Enable Two-Factor Authentication when possible.
- ✔ Ignore phishing attempts – GTNM will never request credentials via email.
- ✔ Keep your browser and devices updated.
If your account may be compromised, reset your password and contact GTNM security.
6. Compliance with Cybersecurity Laws
- ✅ GDPR (EU) – 72-hour breach notification and data minimization enforced. Learn more
- ✅ CCPA (California) – Transparency and opt-out rights honored. More info
- ✅ NIST / ISO 27001 – Aligned with U.S. and international cybersecurity standards.
See our Privacy Policy for complete data practices.
7. What Happens If There’s a Breach?
- ✔ Users are notified within 72 hours of a verified breach.
- ✔ GTNM secures affected systems and conducts internal review.
- ✔ Public security notices will be posted on GTNM.org and Substack if large-scale incidents occur.
Report suspicious activity to: [email protected]
8. Updates to This Policy
- ✔ Changes will be posted with an updated “Last Updated” date.
- ✔ Users are encouraged to check this policy regularly.
Critical security changes will be announced via Substack and our main site.
9. Contact Us
Email: [email protected]
Location: Oregon, USA
⚠ GTNM is committed to protecting user privacy and responding to incidents swiftly and transparently.