1. Threat Model
- • Stolen card donations and chargeback abuse
- • Structuring (splitting donations to avoid detection)
- • Impersonation / “fake charity” scams
- • Money laundering and sanctions evasion attempts
- • Exploitation of beneficiaries or diversion of aid
2. Core Controls
3. Donation Screening & Holds
We may temporarily hold or reject donations that appear suspicious (e.g., mismatched identity signals, unusual volume, high-risk regions, repeated declines, abnormal chargeback history, or suspected third-party funding).
4. Verification & KYC-lite
When necessary, we may request minimal verification (e.g., confirming donor identity, confirming authorization, or validating contact details). We keep verification proportional—only what is needed to protect integrity.
5. Sanctions & Restricted Parties
We do not knowingly facilitate prohibited transactions. We may block transactions linked to restricted parties, sanctioned regions, or unlawful purposes. Where required, we cooperate with payment processors and lawful authorities.
6. Reporting Abuse
Report scams, impersonation, or suspicious donation activity via our Contact page. If someone claims to represent us, verify through our official website only.
7. Enforcement Actions
- • Block or suspend suspicious accounts and traffic
- • Refuse or reverse donations where legally/operationally permitted
- • Preserve logs for investigation and cooperate where required