WAG

Provider Guide

How to Screen Clients Effectively

Screening is the single most important thing you can do for your safety. A solid screening process filters out dangerous individuals, time-wasters, and law enforcement stings — and attracts the kind of respectful, verified clients you actually want to see.

Non-negotiable: Never skip screening because a client is pushy, offers more money, or claims to be "well known." The clients who pressure you to skip screening are exactly the ones you need to screen the hardest. Your safety is worth more than any single booking.

Why Screening Matters

Screening is your first and most effective line of defense. Before a client ever enters your space or meets you in person, screening gives you the information you need to make an informed decision about whether to see them. It deters bad actors (most dangerous individuals won't submit to verification), creates an evidence trail (if something does go wrong, you have identifying information), and signals professionalism (serious clients expect and respect screening).

Think of screening as the bouncer at the door of your business. You wouldn't run a bar without checking IDs. Your business is far more intimate, and the stakes are far higher.


ID Verification Methods

Photo ID Check

The most straightforward screening method. Ask the client to send a photo of a government-issued ID (driver's license, passport, or state ID). You can allow them to cover the ID number and address — what you need is the name, photo, and date of birth. This confirms they're a real person willing to attach their identity to the booking.

Best practices for ID verification:

  • Request the photo via your secure communication channel (encrypted messaging is ideal)
  • Verify the ID looks legitimate — check for obvious signs of editing (mismatched fonts, blurry name area, inconsistent backgrounds)
  • Cross-reference the name with the phone number or email they contacted you from
  • Store verification data securely and delete it after a reasonable retention period (more on this in data handling below)
  • Never accept photos of IDs that are clearly photographed from a screen (someone showing you someone else's ID)

Selfie Verification

Ask the client to send a selfie holding their ID, or a selfie alongside a piece of paper with your working name and today's date written on it. This confirms the person contacting you is the same person on the ID. It's one of the most effective verification methods because it's nearly impossible to fake in real-time.

Video Call Verification

For higher-end bookings or when you want extra assurance, a brief video call lets you confirm the person matches their photos and ID. Keep it short — 30 seconds to a minute is plenty. You don't need to show your face; you can keep your camera off while the client shows theirs. Some providers use this for outcall bookings specifically, since you're going to their space rather than them coming to yours.

Data handling: Whatever verification information you collect, treat it like the sensitive data it is. Store it in an encrypted folder or app (not in your regular photo gallery). Delete it after a set period — many providers purge non-regular client data after 30-90 days. Never share client verification data with anyone except law enforcement if required for your safety.


Reference Systems

How References Work

A reference is a recommendation from another provider who has seen the client before. The client gives you the contact information (working name, email, or phone number) of 1-2 providers they've previously seen. You contact those providers and ask if the client was respectful, safe, and professional.

How to Ask for References

Include your reference requirement in your booking instructions so clients know upfront. A simple statement works:

"For new clients, I require two references from verified providers. Please provide the provider's working name and a way to contact them (email, website contact form, or social media). If you're a first-timer without references, I accept [alternative screening method]."

How to Verify References

When you receive reference information:

  • Look up the reference provider independently — find their website or ad listing yourself rather than using contact information the client provides (a scammer could give you a fake "provider's" number that's actually an accomplice)
  • Contact the provider through their official channels
  • Ask simple, direct questions: "Did you see [client name/description]? Was the experience safe and respectful? Would you see them again?"
  • Be wary if the reference provider responds instantly with effusive praise — real providers give measured, honest responses
  • Two references from established, verifiable providers is the gold standard

Giving References

When other providers contact you for references, respond promptly and honestly. If a client was safe and respectful, say so. If there were issues — boundary pushing, hygiene problems, late payment — share that information. The reference system only works when providers participate honestly. You're not doing anyone a favor by covering for a bad client.

Keep your reference responses factual and brief. You don't need to share intimate details — just confirm or deny that the client was safe, respectful, and a good booking.


Deposit Policies

Why Deposits Matter

Deposits protect you from no-shows, which are one of the biggest revenue killers in this industry. A client who won't put down a deposit is far more likely to cancel or ghost. Deposits also serve as an additional screening layer — scammers and time-wasters rarely want to send money before they've even met you.

Setting Your Deposit Policy

  • Amount: 20-50% of the session fee is standard. Some providers charge a flat deposit amount (e.g., one hour's rate regardless of booking length). For extended bookings (multi-hour, overnight, travel), higher deposits are appropriate — up to 50% or even full prepayment for travel dates.
  • Timing: Require deposits at least 24 hours before the appointment. For same-day bookings, require the deposit immediately upon confirmation.
  • Method: Use payment methods that are difficult to reverse. Cash apps (CashApp, Venmo) can be reversed; cryptocurrency, gift cards, or direct bank transfers are more secure. Never accept deposits via PayPal — chargebacks are trivially easy.
  • Refund policy: Clearly state your refund terms. A common policy: deposits are non-refundable but can be applied to a rescheduled appointment within a set timeframe (e.g., 7-14 days). If the client cancels with adequate notice (24+ hours), offer to reschedule once. Repeated cancellations forfeit the deposit.

Script for deposit requests: "To confirm your appointment, I require a [amount] deposit via [payment method]. This is non-refundable but can be applied to a rescheduled session with 24 hours' notice. I'll send payment details once screening is complete. The remaining balance is due at the start of our session."


Blacklists and Shared Databases

Checking Blacklists

Before accepting any new client, run their information against known blacklists. Several community-maintained databases exist where providers report dangerous, abusive, or problematic clients. Check the client's phone number, email address, and name against these resources. Some are regional; others are international.

Common blacklist resources include provider-run forums with "bad date" sections, regional warning networks shared via encrypted group chats, and dedicated safety databases. Ask trusted colleagues in your area which specific resources they use — these vary significantly by region and change over time.

Contributing to Blacklists

If you have a dangerous or seriously problematic experience with a client, report them. Include as much verifiable information as possible: phone number, email, physical description, vehicle description, behavior details, and the date of the incident. Be factual, not emotional. "Client attempted to remove condom during session, became verbally aggressive when confronted, left without paying full amount" is more useful than "AVOID THIS CREEP."

Only report genuinely dangerous or seriously problematic behavior. The system loses credibility if it's used for petty grievances. Bad hygiene is annoying but not a blacklist offense. Attempted stealthing is.


Red Flags During Screening

Learn to recognize these warning signs during the screening process. Any one of these is a reason to decline; multiple red flags together should be an automatic no.

Communication Red Flags

  • Refuses to screen: "I'm a busy professional, I don't have time for this" or "I've never had to do this before." Real busy professionals understand that security measures exist for a reason.
  • Pushes for immediate meeting: Urgency is a manipulation tactic. Legitimate clients plan ahead.
  • Asks for bareback/unprotected services: Anyone asking for this during screening will push for it in person. Decline immediately.
  • Haggles aggressively on price: If they're negotiating before they've even met you, they'll be difficult throughout the booking.
  • Overly explicit in first contact: Detailed descriptions of what they want to do to you in the first message signals someone who doesn't understand boundaries.
  • Won't share any identifying information: Not even a first name and face photo. Everyone has a right to privacy, but you have a right to safety.
  • Sends unsolicited explicit photos: Boundary violation from the start.
  • Asks about law enforcement: "You're not a cop, right?" or similar. This is not how stings work, but it is how paranoid or unstable individuals talk.

Logistical Red Flags

  • Wants to meet in an unusual location: Parking lots, parks, or addresses that don't correspond to hotels or residences.
  • Keeps changing the plan: Different times, different locations, different durations. Indecisive or testing your flexibility to find a vulnerability.
  • Claims to be a provider's "regular" but the provider doesn't confirm: Fabricated social proof.
  • Phone number doesn't match claimed location: Says they're local but has an out-of-state or out-of-country number without explanation.

Trust Your Gut

This deserves its own section because it might be the most important screening tool you have. If something feels wrong — even if you can't articulate exactly what — trust that feeling and decline the booking. You do not owe anyone an explanation for why you're declining.

Your subconscious picks up on patterns and inconsistencies that your conscious mind hasn't processed yet. That vague feeling of unease? It's your brain's threat detection system doing its job. Years of evolutionary development went into that gut feeling. Use it.

Practical ways to honor your intuition:

  • Keep a simple "decline" script ready: "Thank you for your interest, but I don't think we'd be a good match. I wish you well." No further explanation needed.
  • Don't let financial pressure override your instincts. A missed booking is an inconvenience. Seeing a dangerous client can change your life.
  • After declining, don't second-guess yourself. Don't re-engage if they push back or try to reassure you. Your decision is final.
  • If a client triggers your gut feeling, share the information (phone number, communication style) with your trusted provider network so others can be aware.

Digital Screening Tools

Phone Number Lookup

Run the client's phone number through lookup services. Free and paid options exist. You're looking for: whether the number is a landline, mobile, or VoIP number (VoIP numbers like Google Voice or TextNow are a yellow flag — not automatic disqualifiers, but worth noting). Some lookup services will show the name associated with the number, which you can cross-reference with the name the client gave you.

Social Media Check

If the client provides their real name (or you obtain it through ID verification), a quick search on LinkedIn, Facebook, or other platforms can confirm they're a real person with a real life. You're not stalking — you're verifying that the human being asking to be alone with you in a private space actually exists. Providers who screen this way report that clients who are findable on professional networks are statistically far less likely to be problematic.

Reverse Image Search

If a client sends a selfie or photos, run them through Google Images or TinEye. You're checking whether the photo is stolen from someone else's social media — a common tactic used by people who don't want to reveal their real identity. If the selfie appears on someone else's profile, the person contacting you isn't who they claim to be.

Email Verification

A professional email address (firstname.lastname@company.com) provides more assurance than a throwaway Gmail or Protonmail. While clients have legitimate reasons to use anonymous email, an identifiable email is a positive signal. You can sometimes verify a professional email by checking the company's website or LinkedIn.


Building Your Screening SOP

A Standard Operating Procedure turns your screening process from an ad hoc series of checks into a reliable, consistent system. Write yours down and follow it for every single client, every single time. Consistency is what makes screening effective — the one time you skip a step is the one time it matters.

Template SOP

Here's a framework you can adapt to your specific needs and comfort level:

  1. Initial contact review: Read the first message. Does it follow your booking instructions? Is it respectful and complete? If not, send your standard booking info and give them one chance to try again.
  2. Information collection: Request your screening requirements (ID, references, employment info — whatever you use). Set a deadline for submission: "Please send your screening information within 24 hours to hold your requested time slot."
  3. Verification: Check ID for authenticity. Contact references independently. Run phone number and name through your tools. Check blacklists.
  4. Gut check: Review the entire interaction so far. Does anything feel off? Are you comfortable proceeding?
  5. Confirmation: If everything checks out, confirm the appointment, request the deposit, and send logistics (location, parking instructions, arrival protocol).
  6. Documentation: Log the client's verified information in your encrypted records for future reference.

Handling First-Timers

Clients who have never seen a provider before won't have references. This doesn't automatically disqualify them, but it does mean you need to compensate with additional verification. For first-timers, consider requiring:

  • Photo ID plus selfie verification (both, not either/or)
  • Employment verification or LinkedIn profile
  • A higher deposit amount
  • A phone or video call before the booking
  • Starting with a shorter booking to establish trust

Remember: Screening is not about being paranoid — it's about being professional. Every legitimate business verifies its customers before providing a service. Banks check credit. Hotels take deposits. Landlords run background checks. You're simply applying the same principle to your business, where the stakes for your personal safety are far higher.


When Screening Alone Isn't Enough

Screening reduces risk, but it doesn't eliminate it entirely. A client can pass every screening check and still be problematic in person. That's why screening is just the first layer of your safety system. Pair it with the protocols in our Personal Safety Protocols guide — safe calls, check-ins, incall security, and emergency procedures — for comprehensive protection.

Think of your safety as layers: screening is the outermost layer that filters out the most obvious threats. Each subsequent layer — safe calls, physical security, exit strategies — catches what the previous layer missed. No single layer is sufficient on its own, but together they create a robust safety net.

Your screening process will evolve as you gain experience. You'll develop an instinct for which clients will be good bookings and which to avoid. But never let experience make you complacent. Follow your SOP every time, even for clients who "seem fine." Consistency is your greatest protection.


Screening and Legal Considerations

The legality of screening methods varies by jurisdiction. In some areas, requiring photo ID can create complications if that information is subpoenaed. In others, certain screening questions could be interpreted as negotiating specific illegal acts. Understand the legal framework in your area and design your screening process accordingly. Some providers consult with sex-work-friendly attorneys to ensure their screening SOP doesn't inadvertently create legal exposure.

Regardless of the legal landscape, the fundamental goal remains the same: verify that the person you're meeting is who they claim to be, has a track record of respectful behavior, and is not a safety risk. How you achieve that verification can be adapted to your specific legal and market context without compromising the principle behind it.

Keep your screening communications professional and avoid discussing specific sexual acts. Your screening process is about identity verification and safety assessment — keep it framed that way in all written communication. This protects you legally while still accomplishing the safety goals that make screening essential.


Quick Reference: Screening Checklist

Use this as a quick-reference checklist before confirming any new client:

  1. First message reviewed for red flags and basic respect
  2. Screening information received (ID, references, or alternative verification)
  3. ID verified for authenticity (not edited, matches the person)
  4. References contacted through independently verified channels
  5. Phone number checked through lookup service
  6. Name/number checked against blacklist databases
  7. Gut check passed — nothing feels off about the interaction
  8. Deposit received and confirmed
  9. Appointment details confirmed and safe call person briefed

Related guides: Safety Essentials · Digital OPSEC · Communication Templates · Client Types Guide · Setting Boundaries