What it shows
-
Facilitator logs
-
Completion integrity flags
-
Incident reports
Elements
-
Dropdown: #ddCohortCompliancePick
-
Repeater: #repFacLogs
-
Text: #logTs
-
Text: #logFacilitator
-
Text: #logPortal
-
Text: #logType
-
Text: #logSeverity
-
Text: #logSummary
-
Button: #btnOpenLog
-
-
Repeater: #repIntegrityFlags
-
Text: #flagTitle
-
Text: #flagDetail
-
Text: #flagRisk
-
Button: #btnResolveFlag
-
-
Button: #btnNewIncident
-
Box/Form: #boxIncidentForm (collapsed)
-
Dropdown: #ddIncidentSeverity
-
Input: #inIncidentTitle
-
TextBox: #txtIncidentDetail
-
Button: #btnSubmitIncident
-
Powell-Rad Path™ Readiness Index (PRP-RI)
What it is:
A structured readiness snapshot that checks whether a cohort/institution has the minimum conditions required for truth to be safe (psychologically, socially, and procedurally).
What it measures
(fact-based, observable conditions):
-
Policy readiness: documented reporting pathways, confidentiality rules, retaliation protections, and escalation steps exist in writing.
-
Facilitator readiness: facilitators completed required onboarding, fidelity checks, and incident protocols.
-
Environment readiness: a “truth-safe” code is visible in cohort spaces (e.g., rules against doxxing, mocking, coercion).
-
Operational readiness: support desk and response windows are defined; severity triage exists.
-
Data readiness: consent and redaction rules are active; logs capture what matters (events, incidents, follow-ups).
Why it matters:
If these conditions are missing,
truth disclosure becomes unsafe and the system reproduces the same harm patterns it claims to heal.
Integrity Risk Index (IRI)
What it is:
An integrity monitor that flags when a cohort is at risk of producing “compliance theater” (appearing healed without true repair).
Integrity risks
(verifiable signals):
-
False completion risk: completion recorded without participation evidence (attendance, reflection submissions, check-ins).
-
Retaliation risk: reports of backlash after truth disclosure (social exclusion, punishment, threats, intimidation).
-
Suppression patterns: “don’t talk about that,” “not here,” “not now,” or “keep the peace” enforcement.
-
Facilitator drift: facilitation deviates from protocol (shaming, coercive questioning, invalidation).
-
Narrative capture: group protects image over impact (“we’re fine,” “it’s not that serious”) despite harm signals.
What integrity means here:
Not perfection—repair capacity: the system can see harm, name it, and correct it.
Incident Reporting
(Truth-Safety Critical Events)
Definition (factual):
An incident is any event that increases risk of harm during truth work
—psychological, social, reputational, or physical.
Incident categories
-
Retaliation / intimidation (post-disclosure punishment, threats, coercion)
-
Harassment / bullying (mocking truth tellers, targeted hostility, coercive group pressure)
-
Confidentiality breach (sharing someone’s disclosure or identifiable details)
-
Coercive facilitation (pressure to disclose; shame-based confrontation)
-
Escalation risk (self-harm language, violence threats, stalking)
-
Institutional obstruction (reports blocked, evidence destroyed, “handle it internally” used to silence)
-
Data integrity breach (tampering with logs, falsifying completion, unauthorized access)
Incident minimum data
(audit-friendly)
-
Timestamp (UTC)
-
Severity level (S1–S4)
-
Category
-
Cohort + portal/phase
-
What happened (facts only)
-
Who was impacted (anonymized role-based)
-
Immediate safety action taken
-
Escalation path used (support/admin/emergency)
-
Resolution notes + follow-up date
SLA Breaches
(Support Desk Trust Infrastructure)
Definition (factual):
An SLA breach occurs when support response time exceeds published time windows for the assigned severity. SLA is a trust mechanism—when response fails, truth becomes unsafe.
Severity levels
(publish these)
-
S1 — Critical safety risk: threats, self-harm language, violence, stalking, doxxing
Target: acknowledge quickly + escalate immediately per protocol -
S2 — High risk: retaliation, coercion, confidentiality breach
Target: same-day triage + safety plan steps -
S3 — Moderate: repeated conflict, facilitator drift, unresolved harm reports
Target: next-business-day handling -
S4 — Low: access issues, documentation requests, general help
Target: standard support window
What you can state truthfully now
-
You operate an SLA model tied to severity triage.
-
SLA breach logs are stored as events/incidents with timestamps and resolution notes.
-
SLA compliance is measurable because the system logs createdAt, firstResponseAt, resolvedAt (or equivalents).
“Truth-Safe by Design” Operating Claims (fact-safe)
-
Confidentiality is operational, not symbolic: disclosures are protected through redaction rules and role-based visibility.
-
Safety precedes analysis: if a report indicates danger, the system triggers escalation protocols before interpretation.
-
No forced disclosure: participants can engage through structured reflection without revealing identifying details.
-
Auditability is built-in: completion, incidents, and escalations are tracked in logs so integrity can be verified.
-
Repair is the metric: success isn’t “quiet”; success is demonstrated repair actions and reduced suppression signals over time.