Privacy & Safety
After Rounds exists because healthcare workers need a safe space to share honest information. Privacy isn't a feature - it's the foundation of everything we build.
Our Privacy Commitments
Anonymous by Default
You never have to use your real name. Your identity is never displayed to other users, and we never require identifying information to participate.
No Employer Access
Hospitals, agencies, and employers cannot access the platform. They cannot create accounts, view data, or identify individuals. Period.
Aggregated Data Only
Individual responses are never shown publicly. We only display patterns and aggregated insights. Your specific contribution is never identifiable.
Zero Tolerance for Doxxing
Any attempt to identify individuals - whether workers, managers, or others - results in immediate and permanent ban. We actively monitor for this.
What We Collect
Account Information
- Email address - Used only for account access and essential communications. Never shared.
- Role and experience - General category (e.g., "ICU Nurse, 5-10 years"). Used to verify healthcare worker status.
- License state - Optionally collected for verification. License numbers are hashed immediately.
Content You Share
- Unit reviews - Pay ranges, ratings, and comments about hospitals and units.
- Posts and comments - Contributions to discussions, which are anonymous by default.
Technical Data
- IP addresses - Hashed for rate limiting and abuse prevention. We don't store raw IPs.
- Usage analytics - Aggregated, anonymous metrics to improve the product.
What We Never Do
Legal Requests
We will only disclose user information in response to valid legal process (subpoenas, court orders, or warrants). Even then:
- We will challenge any request we believe to be overbroad or invalid
- We will notify affected users unless legally prohibited
- We minimize the data we collect, so there's less to disclose
We publish an annual transparency report detailing any government requests received.
How We Protect Your Data
Encryption at rest
All data is encrypted when stored
Encryption in transit
All connections use TLS 1.3
Access controls
Strict internal access policies
Regular audits
Third-party security reviews
Minimal retention
We only keep what's necessary
Secure infrastructure
SOC 2 compliant hosting
Your Rights
You have the right to:
- Access - Request a copy of your data
- Correction - Fix inaccurate information
- Deletion - Delete your account and associated data
- Portability - Export your data in a standard format
To exercise any of these rights, contact us at [email protected]
Questions?
If you have any questions about our privacy practices or how we handle your data, we're here to help.
[email protected]Last updated: January 2026