For Social Workers

Vulnerable lives
deserve encrypted files.

Case notes about abused children, domestic violence survivors, at-risk families — these files describe the most vulnerable members of society. A data breach doesn't just expose information; it can endanger lives. Writtt encrypts case files locally with AES-256.

Download — it's free
Critical risks

Your case files carry life-or-death weight.

Vulnerable data on cloud servers

Case files on cloud platforms put the most sensitive personal information — abuse reports, child welfare assessments — on servers managed by tech companies.

Safety risks from breaches

A leaked domestic violence case file can reveal a survivor's location to their abuser. The stakes aren't just about privacy — they're about physical safety.

Institutional over-access

Agency-managed cloud accounts may give administrators, contractors, or IT staff unnecessary access to sensitive case details.

How Writtt protects case files

Protection that matches the vulnerability.

Case-level encryption

Each case file can be individually encrypted with AES-256-GCM. Even if your device is compromised, locked files are unreadable.

No server, no breach surface

Case files exist only on your device. No cloud copy, no agency server backup, no third-party exposure.

Field work ready

Home visits, shelters, rural areas — Writtt works without internet. Document on-site without connectivity concerns.

Zero tracking

No analytics on which cases you open, how long you spend, or what you write. Your workflow reveals nothing about your clients.

When a file can endanger the person it describes, the security of that file is not a convenience — it's a responsibility.

Frequently asked questions

Writtt is ideal for working notes, field observations, and case reflections that need encryption. For official agency records, use your mandated systems — but keep your sensitive notes encrypted locally.

Writtt provides AES-256 encryption with zero data transmission. Files never leave your device, eliminating cloud-based breach risks for the most sensitive case types.

Only if you explicitly share the decrypted content. Encrypted files require your password. There is no administrative backdoor or remote access.

Protect the people you serve.

Military-grade encryption for case files that describe vulnerable lives. Free, offline, open source.

Download — it's free