Screening (Professional)

Screening (Professional) is a professional domination topic covering id verification and blacklist checking. Safety considerations include data privacy.


Screening is the process by which professional dominants and other sex workers evaluate prospective clients before agreeing to a session, with the goal of establishing identity, assessing risk, and filtering out individuals with known histories of dangerous or abusive behavior. In professional domination specifically, where sessions may involve physical restraint, pain, and significant power exchange, the stakes of seeing an unknown or unvetted client are high enough that screening has become a standard professional practice rather than an optional precaution. The methods used range from informal reference checks among trusted colleagues to formal identity verification through third-party platforms, and the infrastructure supporting these practices has been built largely by workers themselves in the absence of institutional protections.

ID Verification

Identity verification is the foundational layer of client screening, designed to confirm that a prospective client is who they claim to be and to create a record that can be used if something goes wrong. The most basic form involves requesting a government-issued photo identification, such as a driver's license or passport, and cross-referencing it against the name, phone number, or email address the client provided when making contact. Some practitioners request that clients photograph themselves holding the ID, which makes it significantly harder to submit stolen or borrowed documents.

The rationale for ID verification extends beyond simple identity confirmation. When a client knows that a record of their real identity exists with the provider, the deterrent effect against misconduct is substantial. Individuals who intend to harass, assault, or defraud are far less likely to proceed through a process that creates a traceable record. This is sometimes described within professional communities as the 'paper trail' function of screening, which serves both preventative and evidentiary purposes.

Professional dominants vary in how they handle the physical or digital storage of identification documents. Some photograph the ID and store it in an encrypted file associated with the client's session history; others use third-party platforms designed specifically for sex worker client management that handle storage and encryption on the provider's behalf. The choice of method carries privacy implications for both parties. A client's ID contains sensitive personal information, and responsible practitioners treat that data with the same security standards they would want applied to their own information.

Some practitioners request professional references in addition to or instead of government ID. This typically means asking a prospective client to provide the name and contact information of one or two other professional dominants or sex workers they have seen previously, then reaching out to those providers to confirm the client's identity and conduct. Reference-based verification relies on an existing network of colleagues who communicate openly about client experiences, and it is therefore more accessible to established practitioners with broad professional networks than to those who are newer to the industry. For this reason, many practitioners use both ID and references in combination, treating them as complementary rather than interchangeable methods.

Blacklist Checking

Blacklist checking refers to the practice of consulting databases, shared lists, or peer networks to determine whether a prospective client has been flagged by other workers for dangerous, abusive, or dishonest behavior. This practice is one of the most significant examples of worker-led safety infrastructure in the professional BDSM and broader sex work community, predating the digital age in the form of informal telephone trees and handwritten lists shared between colleagues.

The development of formal blacklist systems accelerated significantly with internet access in the 1990s and early 2000s. Online forums and email lists allowed sex workers to share client information across cities and countries in ways that had previously been impossible. Platforms emerged specifically to serve this function, creating searchable databases where providers could submit reports about clients who had assaulted, stalked, extorted, or otherwise harmed them. These systems were built and maintained almost entirely by workers themselves, reflecting a broader pattern in which occupational safety in sex work has been achieved through community self-organization rather than through employer mandates or regulatory frameworks.

LGBTQ+ communities, particularly transgender women and gay male sex workers, were early and active contributors to these networks. Facing compounded risks from both clients and hostile law enforcement, workers in these communities developed robust informal information-sharing cultures out of necessity. The knowledge that a dangerous client had been flagged by a trans woman worker in one city could protect a cisgender woman worker in another, and vice versa, creating an interdependent safety infrastructure that cut across lines of identity and specialty.

Contemporary blacklist resources include both open and closed platforms. Some databases are publicly searchable by client phone number or email address, allowing any provider to check a prospective client without submitting their own information or joining a membership group. Others operate as closed networks requiring a provider to be vetted and approved before gaining access, on the theory that the quality and reliability of the information is higher when submissions come from a confirmed community of professionals. Many practitioners use both types, running a prospective client's contact information through open databases first and then cross-referencing within private professional networks.

The limitations of blacklist systems are real and worth understanding clearly. A client who has not yet harmed anyone will not appear in any database. A client who uses different names, phone numbers, or email addresses across different providers may evade detection even if they have been reported before. Some reports are inaccurate, whether due to honest mistaken identity, personal conflict, or deliberate malice, and most platforms have limited mechanisms for disputed entries. These limitations do not undermine the value of blacklist checking; they simply mean that a clean result is not a guarantee of safety, and that blacklist checking works best as one layer within a broader screening protocol rather than as a standalone measure.

Safety Apps and Third-Party Verification

The past decade has seen the emergence of purpose-built digital platforms and mobile applications designed to support client screening for sex workers, including professional dominants. These tools range from identity verification services that use document scanning and biometric matching to community-based apps that centralize both blacklist functionality and reference management in a single interface. The development of this software category reflects growing recognition within the technology sector that sex workers have specific safety needs that general-purpose tools do not address.

Third-party verification services operate by acting as an intermediary between the client and the provider. Rather than submitting identification directly to a worker, a client submits their ID to the platform, which verifies its authenticity through document analysis or database cross-referencing and then issues the worker a confirmation that the client has been verified. This approach has several advantages. It reduces the amount of sensitive client data that individual providers must store and secure, it provides a standardized verification result that workers can interpret consistently, and it adds a layer of institutional credibility to the verification process that may make clients who are new to professional BDSM more willing to complete screening.

Well-known platforms in this space have included Preferred411, which operated for many years as one of the most widely used screening and reference services in the North American professional sex work community, and NCSF's community resources, though dedicated commercial screening apps have come and gone with varying degrees of community adoption and trust. The landscape shifts as platforms close, as legal environments change, and as communities consolidate around tools that have demonstrated reliability and data security. Following the passage of FOSTA-SESTA in the United States in 2018, which imposed legal liability on platforms hosting content related to sex work, a number of screening and community safety platforms shut down or restricted their services, creating a significant gap in the infrastructure that workers had come to rely on. The effect on safety was widely documented by researchers and advocates, with many providers reporting that the loss of these tools made it substantially harder to screen clients and that they had subsequently experienced higher rates of dangerous encounters.

Data privacy is a central concern in the use of any third-party screening tool. Providers submitting client information to a platform are trusting that platform to store it securely, to use it only for the stated purpose, and to protect it from data breaches or disclosure to law enforcement. Clients submitting identification are trusting that their data will not be misused or exposed. Neither form of trust is unconditional, and evaluating the data practices of any platform before using it is a professional obligation for practitioners who take their clients' information security seriously.

Practical data hygiene recommendations within professional BDSM communities include encrypting any locally stored client files, using a separate email address and phone number for professional contact that is not linked to personal accounts, storing ID images in encrypted folders rather than standard photo libraries, and periodically purging records for clients who are unlikely to return. Some practitioners use password-protected spreadsheets or dedicated client management software with access controls rather than generic cloud storage. The goal is to maintain enough information to protect oneself and colleagues while minimizing the exposure of that information to unauthorized parties.

The broader principle underlying all screening technology is that no tool is more effective than the practitioner's willingness to use it consistently. Workers who screen some clients thoroughly and others not at all because they seem 'safe' or because the administrative burden feels inconvenient create gaps in their own protection. Community consensus within professional BDSM holds that screening is most effective as a universal practice applied to all new clients regardless of how they present, since dangerous individuals are often skilled at presenting as trustworthy. The consistency of the practice is itself part of its protective function, both because it eliminates the cognitive work of deciding case-by-case and because it signals to all clients, including those with harmful intentions, that the practitioner is serious about knowing who they are seeing.