Report a problem
Judy's Book takes violations of our Terms of Use very seriously. We encourage
you to read through our
Terms of Use
before filling report with us.
After careful review, we may remove content or replace a content warning page before
viewing content deemed offensive, harmful, or dangerous.
Additionally, we are aware that there may be content on Judy's Book that is personal
in nature or feels invasive. Please note that Judy's Book is a provider of content
creation tools, not a mediator of content. We allow our users express their opinions,
but we don't make any claims about the content of these pages. We strongly believe
in freedom of expression, even if a review contains unappealing or distasteful
content or present negative viewpoints. We realize that this may be frustrating,
and we regret any inconvenience this may cause you. In cases where contact information
for the author is listed on the page, we recommend that you work directly with this
person to have the content in question removed or changed.
Here are some examples of content we will not remove unless provided with a court
order:
Personal attacks or alleged defamation
Political or social commentary
Distasteful imagery or language
If we've read the Terms of Use and believe that this review below violates our Terms
of Use, please complete the following short form.
Businiess name:
Sally Leboy MFT
|
Review by:
daniel l.
|
Review content:
SecurityWe take precautions to protect your information. When you submit sensitive information via the website, your information is protected both online and offline. Wherever we collect sensitive information (such as credit card data), that information is encrypted and transmitted to us in a secure way. You can verify this by looking for a closed lock icon at the bottom of your web browser, or looking for "https" at the beginning of the address of the web page. While we use encryption to protect sensitive information transmitted online, we also protect your information offline. Only employees who need the information to perform a specific job (for example, billing or customer service) are granted access to personally identifiable information. The computers/servers in which we store personally identifiable information are kept in a secure environment.
|
Reasons for reporting (512 characters left):
|
Reasons are required.
|
or
Cancel
|