Report a problem
Judy's Book takes violations of our Terms of Use very seriously. We encourage you to read through our Terms of Use before filling report with us.
After careful review, we may remove content or replace a content warning page before viewing content deemed offensive, harmful, or dangerous.
Additionally, we are aware that there may be content on Judy's Book that is personal in nature or feels invasive. Please note that Judy's Book is a provider of content creation tools, not a mediator of content. We allow our users express their opinions, but we don't make any claims about the content of these pages. We strongly believe in freedom of expression, even if a review contains unappealing or distasteful content or present negative viewpoints. We realize that this may be frustrating, and we regret any inconvenience this may cause you. In cases where contact information for the author is listed on the page, we recommend that you work directly with this person to have the content in question removed or changed.
Here are some examples of content we will not remove unless provided with a court order:
Personal attacks or alleged defamation
Political or social commentary
Distasteful imagery or language
If we've read the Terms of Use and believe that this review below violates our Terms of Use, please complete the following short form.

Businiess name:  Sally Leboy MFT
Review by:  daniel l.
Review content: 
SecurityWe take precautions to protect your information. When you submit sensitive information via the website, your information is protected both online and offline. Wherever we collect sensitive information (such as credit card data), that information is encrypted and transmitted to us in a secure way. You can verify this by looking for a closed lock icon at the bottom of your web browser, or looking for "https" at the beginning of the address of the web page. While we use encryption to protect sensitive information transmitted online, we also protect your information offline. Only employees who need the information to perform a specific job (for example, billing or customer service) are granted access to personally identifiable information. The computers/servers in which we store personally identifiable information are kept in a secure environment.

Reasons for reporting (512 characters left):
 or  Cancel