<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>delbius.com</title>
	<atom:link href="https://delbius.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://delbius.com/</link>
	<description></description>
	<lastBuildDate>Fri, 14 Nov 2025 12:04:17 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9</generator>

<image>
	<url>https://i0.wp.com/delbius.com/wp/wp-content/uploads/2022/09/dh-square-transparent.png?fit=32%2C32&#038;ssl=1</url>
	<title>delbius.com</title>
	<link>https://delbius.com/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">232885246</site>	<item>
		<title>From Self-Regulation to Systemic Responsibility</title>
		<link>https://delbius.com/keynote-from-self-regulation-to-systemic-responsibility/</link>
		
		<dc:creator><![CDATA[Del Harvey]]></dc:creator>
		<pubDate>Thu, 13 Nov 2025 18:00:00 +0000</pubDate>
				<category><![CDATA[Trends]]></category>
		<guid isPermaLink="false">https://delbius.com/wp/?p=966</guid>

					<description><![CDATA[What happens when both private and public sectors no longer trust digital platforms to self-regulate? How should platforms respond?]]></description>
										<content:encoded><![CDATA[<!-- wp:rss-featured-image --><figure class="wp-block-rss-featured-image"><img src="https://i0.wp.com/delbius.com/wp/wp-content/uploads/2025/11/bannerkeynote-scaled.png?fit=2560%2C512&#038;ssl=1" alt="From Self-Regulation to Systemic Responsibility: Opening Keynote at the Digital Platform Trust Forum" class="wp-block-rss-featured-image__image"/></figure><!-- /wp:rss-featured-image -->
<p><em>Note: This post contains the text of my opening keynote at Deloitte&#8217;s <a href="https://www.deloitteconference.com/profile/form/index.cfm?PKformID=0x2869419c549" target="_blank" rel="noreferrer noopener nofollow">Digital Platform Trust Forum 2025</a> (US Edition), which was held in Mountain View, California on November 13, 2025.</em></p>



<blockquote class="wp-block-quote has-large-font-size is-layout-flow wp-block-quote-is-layout-flow">
<p class="has-background has-large-font-size" style="background-color:#008fd112;padding-top:var(--wp--preset--spacing--50);padding-right:var(--wp--preset--spacing--60);padding-bottom:var(--wp--preset--spacing--50)"><strong>tl;dr:</strong> Digital platforms are in their “OSHA moment.&#8221; Just as the passage of the OSH Act of 1970 moved workplace safety from voluntary codes to enforceable standards, recent frameworks like the EU’s Digital Services Act are compelling platforms to make their safety systems auditable while still holding them accountable for safety outcomes. Meeting this challenge requires integrating the Trust &amp; Safety and Compliance disciplines into product design from the start, an investment that’s becoming both legally unavoidable and strategically essential. The platforms that will lead aren’t the ones resisting this shift; rather, the leaders will be the ones turning accountability into a competitive advantage by engineering trust as deliberately as they engineer features.</p>
</blockquote>



<hr class="wp-block-separator has-alpha-channel-opacity is-style-dots"/>



<h3 class="wp-block-heading">Introduction</h3>



<p>It’s a bit surreal to be speaking after seeing a fireside chat with a version of myself that doesn’t technically exist.&nbsp;</p>



<p>But that deepfake demonstration makes the point better than any slide could: we’ve reached a moment where even <em>seeing</em> isn’t necessarily believing.</p>



<p>Likewise, we can’t <em>assume</em> trust. It has to be built, proven, and continually reinforced. That shift – from assuming trust to deliberately engineering it – is exactly what I want to talk about today.&nbsp;</p>



<p>Expectations for digital platforms have changed. It’s no longer enough to make promises about safety, integrity, or responsibility; regulators now expect proof that those promises are being kept.&nbsp;</p>



<p>Accountability has become a complement to reputation – a way to show that integrity isn’t just claimed, but confirmed.&nbsp;</p>



<p>While that may feel new in the digital world, we’ve seen it before in another industry, in another era, and that’s where I want to start.&nbsp;</p>



<div style="height:30px" aria-hidden="true" class="wp-block-spacer"></div>



<hr class="wp-block-separator has-alpha-channel-opacity is-style-dots"/>



<h3 class="wp-block-heading">Workplace Safety and OHSA</h3>



<p>When the <a href="https://www.osha.gov/laws-regs/oshact/completeoshact" target="_blank" rel="noreferrer noopener nofollow">Occupational Safety and Health Administration</a>, also known as OSHA, was created in 1970, it wasn’t because companies suddenly discovered empathy.&nbsp;</p>



<p>It was because in the late 1960s, workplace accidents in the United States were killing about 14,000 people a year and injuring millions more.</p>



<p>Before OSHA, workplace safety was a patchwork of state laws, voluntary codes, and after-the-fact investigations. Every factory, refinery, or mine was essentially on its own, and the result was grim. It was clear that voluntary self-regulation wasn’t working and, instead, a federal standard was required to ensure every worker, regardless of state or industry, was protected (as the law says) “so far as possible.”</p>



<p><strong>OSHA didn’t set out to make companies more </strong><em><strong>caring</strong></em><strong>; it set out to make them more <em>accountable</em>.</strong></p>



<p>It established enforceable national standards, created a framework for inspections, and backed it with penalties. While OSHA didn’t make safety self-sustaining overnight, it did <strong>move safety from being an afterthought to being an expectation</strong>. Today, you don’t need to convince any serious company that safety matters. The only question is how far beyond baseline compliance they choose to go. The rulebook still matters; it’s just no longer the whole story.&nbsp;</p>



<p>Of course, that progress hasn’t made OSHA obsolete. Violations still happen, enforcement still matters, and culture still drifts. But since OSHA began in 1971, <strong>workplace fatality rates in the United States have fallen by roughly eighty percent</strong>. The progress hasn’t been perfect, but the long-term trend is unmistakable: safety became a core expectation.</p>



<p>OSHA showed how clear standards, consistent accountability, and transparency can shift industry norms. In the digital realm, we now have the chance to apply the same principles proactively through the systems and safeguards we design ourselves.</p>



<div style="height:30px" aria-hidden="true" class="wp-block-spacer"></div>



<hr class="wp-block-separator has-alpha-channel-opacity is-style-dots"/>



<h3 class="wp-block-heading">From Safety to Digital Trust</h3>



<p>For the past two decades, online safety has operated primarily through self-regulation. Trust &amp; Safety teams built policies, published transparency reports, ran investigations, and created the world’s first frameworks for digital accountability largely because it was the right thing to do, not because anyone required it. Though let’s be honest: it was also strategic. It’s better to build accountability proactively than to have it imposed reactively.</p>



<p><strong>Where regulation did exist, it reinforced fragmentation</strong>. Privacy over here, payments over there, child safety here, content moderation here, and here, and here . . . The <a href="https://en.wikipedia.org/wiki/Communications_Decency_Act" target="_blank" rel="noreferrer noopener nofollow">Communications Decency Act</a> (CDA) in 1996, the <a href="https://en.wikipedia.org/wiki/Children%27s_Online_Privacy_Protection_Act" target="_blank" rel="noreferrer noopener nofollow">Children’s Online Privacy Protection Act</a> (COPPA) in 1998, the <a href="https://en.wikipedia.org/wiki/Payment_Card_Industry_Data_Security_Standard" target="_blank" rel="noreferrer noopener nofollow">Payment Card Industry Data Security Standard</a> (PCI DSS) in 2004 – each added a layer of responsibility, but each was still narrow and focused on a single category of risk. None required platforms to examine how their systems created or managed risk. That’s what’s changing now.&nbsp;</p>



<p>Around the world, governments are moving toward comprehensive frameworks like the EU <a href="https://digital-strategy.ec.europa.eu/en/policies/digital-services-act-package" target="_blank" rel="noreferrer noopener nofollow">Digital Services Act</a> (DSA), the <a href="https://artificialintelligenceact.eu/" target="_blank" rel="noreferrer noopener nofollow">EU Artificial Intelligence (AI) Act</a>, the <a href="https://www.gov.uk/government/publications/online-safety-act-explainer/online-safety-act-explainer" target="_blank" rel="noreferrer noopener nofollow">UK Online Safety Act</a> (OSA), Australia’s <a href="https://onlinesafety.org.au/codes/" target="_blank" rel="noreferrer noopener nofollow">Industry Codes of Practice for the Online Industry</a>, and Singapore’s <a href="https://sso.agc.gov.sg/Bills-Supp/18-2025/Published/20251015?DocDate=20251015" target="_blank" rel="noreferrer noopener nofollow">Online (Relief and Accountability) Bill</a>. A number of other countries are proposing similar legislation.&nbsp;</p>



<p>Under the DSA, for instance, very large platforms are now required to assess and publish the systemic risks their services create — from how content spreads to how their algorithms influence what people see and share.&nbsp;</p>



<p>We are moving from a world that judged platforms only by visible outcomes to a world that judges them by how safely their systems are designed to operate.&nbsp;</p>



<p>It&#8217;s the difference between “<em>Don&#8217;t sell spoiled food</em>” and “<em>Show us your entire supply chain, explain how contamination gets detected, and prove your safety protocols actually prevent it.</em>”&nbsp;</p>



<p><strong>One regulates outcomes. The other regulates systems</strong>.</p>



<p>Let’s be honest: most platforms are still developing the processes and infrastructure needed to understand how their systems create risk, let alone to demonstrate how those risks are being managed.&nbsp;</p>



<p>Here&#8217;s what that looks like in practice:&nbsp;</p>



<ul class="wp-block-list">
<li>a content moderation team removes a video for violating harassment policies;</li>



<li>That same day, the recommendation algorithm promotes fifty more videos with identical characteristics because the enforcement signal never reached the ranking system;</li>



<li>Meanwhile, the policy team is analyzing user appeals in one database;</li>



<li>The machine learning (ML) team is evaluating model performance in another database;</li>



<li>The compliance team is trying to report on “effectiveness” without having access to either.&nbsp;</li>
</ul>



<p>Each team is doing its job. But the platform has no unified view of whether its safeguards are actually working. That fragmentation isn&#8217;t just an operational inconvenience; <strong>it&#8217;s a structural vulnerability that makes harm both more likely and harder to detect</strong>. Digital platforms are fundamentally different from factories – they’re not static. An algorithm update can undo a safety feature overnight. Code ships constantly. The platform you audit today isn’t the platform running tomorrow.&nbsp;</p>



<p><strong>The opportunity in front of us isn’t </strong><strong><em>speed of response</em></strong><strong>; it’s </strong><strong><em>quality of systems</em></strong> – making accountability consistent, reliable, and built-in. Regulators are asking for the same kind of rigor that platforms have been working to develop internally for years – frameworks that make risk management systemic instead of situational.&nbsp;</p>



<p>Trust &amp; Safety’s frameworks are dynamic and operational, designed to detect emerging risks, evaluate harm, and respond in real time. Compliance’s are structural and evidentiary, designed to align those actions with laws, standards, and audit requirements.&nbsp;</p>



<p><strong>The real opportunity now is to connect these frameworks</strong>. When those systems are integrated, accountability becomes continuous rather than episodic, and the organization gains a clear, defensible understanding of how risk is identified, managed, and improved over time. That’s the same evolution we saw in physical safety half a century ago: the shift from patchwork fixes to accountable systems.&nbsp;<br>This is our turning point. </p>



<p><strong>The platforms that learn to do this won’t just meet the new expectations; they’ll define what “trustworthy” looks like for everyone else</strong>.</p>



<div style="height:30px" aria-hidden="true" class="wp-block-spacer"></div>



<hr class="wp-block-separator has-alpha-channel-opacity is-style-dots"/>



<h3 class="wp-block-heading">From Reactive to Preventive</h3>



<p>Compliance isn’t automatic. Most organizations start reactively, interpreting new requirements, fixing issues as they arise, and only gradually learning how to anticipate and prevent them. It’s still rare for systems to be built where robust, effective safeguards are integrated from the beginning.&nbsp;</p>



<p>That was true in workplace safety, too. The hazards that led to OSHA’s standards weren’t mysteries; most were known long before regulation forced change. <strong>The problem wasn’t awareness, but rather, priority. </strong>It took loss, followed by accountability, for prevention to become the default expectation.&nbsp;</p>



<p>Digital platforms are in a similar place now. Trust &amp; Safety and Compliance have built extraordinary capacity to <em>respond</em> – to manage incidents, investigate harms, engage with regulators, and explain what happened. We can evolve that same capability into something systemic and use what we already know about risk not just to validate the past, but also to shape the design of what comes next.&nbsp;</p>



<p>Integrating systems, anticipating risk, embedding accountability into design – these aren’t separate, unrelated tasks. <strong>They’re different dimensions of a single transition: from compliance as a function to trust as an operating principle</strong>.</p>



<p>That transition starts with how we handle what we learn. Every investigation, audit, and user report reveals <em>something</em> about how a system behaves under pressure. When that information is used to inform design and policy rather than just ticking a box, incidents lead to insights that shape how systems work.&nbsp;</p>



<div style="height:30px" aria-hidden="true" class="wp-block-spacer"></div>



<hr class="wp-block-separator has-alpha-channel-opacity is-style-dots"/>



<h3 class="wp-block-heading">Addressing Cost and Resistance</h3>



<p>But here&#8217;s what I haven&#8217;t said yet, and what everyone in this room is thinking: <strong>this shift isn&#8217;t free and it isn&#8217;t easy</strong>. Building systemic accountability requires resources, creates friction, and slows some things down.&nbsp;</p>



<p>When OSHA was created, industry groups predicted it would cripple American manufacturing. They argued that compliance costs would make companies uncompetitive and that federal overreach would stifle innovation.</p>



<p><strong>They were wrong about the ultimate outcome, but they weren&#8217;t wrong about the immediate cost</strong>. Safety did require investment. It did change how products got made. Some companies struggled. Some failed. But the industry that emerged was stronger, more sustainable, and more trustworthy. The ones that survived weren&#8217;t the ones that fought hardest against accountability; instead, they were the ones that learned to integrate it fastest.</p>



<p>Digital platforms face a similar moment. Building the infrastructure for systemic accountability isn&#8217;t cheap. Integrating Trust &amp; Safety with product development adds complexity. Documenting risk assessments takes time. But the alternative – operating without that infrastructure – is becoming both legally untenable and strategically unsustainable.&nbsp;</p>



<p>The platforms that will lead five years from now aren&#8217;t the ones resisting this shift. They&#8217;re the ones figuring out how to make accountability a competitive advantage.</p>



<div style="height:30px" aria-hidden="true" class="wp-block-spacer"></div>



<hr class="wp-block-separator has-alpha-channel-opacity is-style-dots"/>



<h3 class="wp-block-heading">If We Were Starting from Scratch</h3>



<p>If we were starting fresh today, knowing everything we know now, what would we build?</p>



<p>We&#8217;d build platforms where every algorithmic change – every new ranking signal, every content recommendation tweak – would have a documented impact assessment before deployment, not after a crisis. Where enforcement actions automatically generate signals that feed back into the systems that created the risk in the first place. Where product teams have real-time visibility into how their features are being exploited, and policy teams can see immediately whether their rules are having the intended effect.</p>



<p>We&#8217;d design organizations where Compliance isn&#8217;t just the people who write the audit report six months after launch, but also the people in the room when architecture decisions get made. Where “<em>Can we demonstrate this is safe?</em>” isn&#8217;t a question you ask at the end of the development cycle, but a gate you pass through before you build.</p>



<p>We aren&#8217;t lacking insight into where things go wrong. Ask any Trust &amp; Safety team, and they can tell you exactly where the gaps are. The gap isn&#8217;t visibility – it&#8217;s priority. It&#8217;s whether those insights reach the people making resource decisions, architecture choices, and product roadmaps.</p>



<p>If we can turn that awareness into shared responsibility, we can address risks before they become crises and show, in practice, what it means to design for trust.&nbsp;</p>



<p>That&#8217;s what trust by design looks like: not perfect, but provable. Not <em>assumed</em>, but engineered.&nbsp;</p>



<div style="height:30px" aria-hidden="true" class="wp-block-spacer"></div>



<hr class="wp-block-separator has-alpha-channel-opacity is-style-dots"/>



<h3 class="wp-block-heading">The Human Core</h3>



<p>At its center, all of <em>this</em> – accountability, compliance, regulations, safety – has never really been about “frameworks” or “systems.” It’s been about people.</p>



<p><strong>People say OSHA regulations are written in blood</strong> — that every regulation exists because someone, somewhere, got hurt. Many of our digital safeguards were born the same way. We have the opportunity to shift our approach – to build not just safeguards designed to recover from harm, but also safeguards that anticipate the need to protect. Making that shift requires applying the same rigor to anticipating and mitigating impact as we do to driving progress, so that innovation remains sustainable.&nbsp;</p>



<p>That is the next step in our evolution. Not waiting for the next crisis to force change, but building systems that prevent it from happening.&nbsp;Not explaining after the fact what went wrong, but demonstrating in advance what&#8217;s been made right.&nbsp;</p>



<p><strong>Proving, through evidence, design, and practice, that safety and trust can be engineered as intentionally as anything else we build.&nbsp;</strong></p>



<p>That&#8217;s not the future of platform accountability; it&#8217;s the present. The only question is how quickly we move.</p>



<p>Thank you so much.</p>



<div style="height:30px" aria-hidden="true" class="wp-block-spacer"></div>



<p></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">966</post-id>	</item>
		<item>
		<title>7 Rules of Causation for Trust &#038; Safety Incidents</title>
		<link>https://delbius.com/rules-of-causation/</link>
		
		<dc:creator><![CDATA[Del Harvey]]></dc:creator>
		<pubDate>Mon, 30 Dec 2024 19:04:37 +0000</pubDate>
				<category><![CDATA[Toolkit]]></category>
		<guid isPermaLink="false">https://delbius.com/?p=649</guid>

					<description><![CDATA[Demystify the "art" of writing effective incident reports. Learn the 7 Rules of Causation for Trust &#038; Safety incidents.]]></description>
										<content:encoded><![CDATA[<!-- wp:rss-featured-image --><figure class="wp-block-rss-featured-image"><img src="https://i0.wp.com/delbius.com/wp/wp-content/uploads/2024/12/rulesofcausation-artdecodominos-scaled-1.png?fit=1800%2C300&#038;ssl=1" alt="Rules of Causation" class="wp-block-rss-featured-image__image"/></figure><!-- /wp:rss-featured-image -->
<p><em>Note: The 7 Rules of Causation are part of my upcoming Root Cause Analysis guide, a resource in the <a href="https://delbius.com/toolkit" target="_blank" rel="noreferrer noopener">Trust &amp; Safety Toolkit</a>. </em></p>



<div id="toc" class="simple-toc" data-levels='["2","3","4"]' data-exclude='[""]' data-label="Contents"></div>



<hr class="wp-block-separator has-alpha-channel-opacity is-style-dots"/>



<h3 class="wp-block-heading">Introduction</h3>



<p>We’ve all been there: an incident has occurred. Something that should not have happened <em>did</em> happen, and now you’re faced with explaining how, exactly, that situation came to pass. </p>



<p>A retro, a post-mortem, a debriefing—whatever you call it, it’s got to be done.</p>



<h4 class="wp-block-heading">Why Causation Matters in Trust &amp; Safety</h4>



<p>Robust and accurate evaluations of the root causes and contributing factors that led to an incident are essential for informed decision-making, preventing future incidents, and improving communication. They also play a key role in maintaining user trust by demonstrating accountability, transparency, and a commitment to safety.</p>



<p>When done right, a Root Cause Analysis strengthens the integrity and effectiveness of Trust &amp; Safety (T&amp;S) operations. As the name implies, an effective Root Cause Analysis identifies and documents the often complex and interconnected sequence of causes and effects that led to the incident.</p>



<h3 class="wp-block-heading">Determining Causation: <br>7 Rules for Better Incident Reports</h3>



<p>Adapted from David Marx’s 5 Rules of Causation for aviation safety incidents<sup data-fn="3ad88e57-a885-402c-b61c-eab4e4841237" class="fn"><a href="#3ad88e57-a885-402c-b61c-eab4e4841237" id="3ad88e57-a885-402c-b61c-eab4e4841237-link">1</a></sup>, below are the 7 Rules of Causation for documenting the root causes and contributing factors of a T&amp;S incident.</p>



<p>While aviation safety and Trust &amp; Safety may seem quite different at a glance, they share common challenges: complex systems, human decision-making under pressure, and the need to prevent recurring incidents.</p>



<p>When followed, these 7 rules ensure that incident descriptions are accurate, precise, and unemotional. They reflect human factors engineering (HFE) principles because they require us to examine how people interact with systems and to determine how we can make these interactions more reliable, efficient, and error-resistant. </p>



<p>Collectively, the 7 Rules of Causation help us analyze incidents through the lens of human-system interaction rather than treating technical and human factors separately.</p>



<div style="height:44px" aria-hidden="true" class="wp-block-spacer"></div>



<div class="wp-block-group is-vertical is-nowrap is-layout-flex wp-container-core-group-is-layout-fc43baa9 wp-block-group-is-layout-flex">
<figure class="wp-block-image size-full is-resized is-style-rounded wp-duotone-grayscale"><img data-recalc-dims="1" fetchpriority="high" decoding="async" width="660" height="660" src="https://i0.wp.com/delbius.com/wp/wp-content/uploads/2024/12/Rule1.png?resize=660%2C660&#038;ssl=1" alt="Rule 1. Causal statements must clearly show the &quot;cause and effect&quot; relationship" class="wp-image-716" style="width:120px" srcset="https://i0.wp.com/delbius.com/wp/wp-content/uploads/2024/12/Rule1.png?w=1024&amp;ssl=1 1024w, https://i0.wp.com/delbius.com/wp/wp-content/uploads/2024/12/Rule1.png?resize=300%2C300&amp;ssl=1 300w, https://i0.wp.com/delbius.com/wp/wp-content/uploads/2024/12/Rule1.png?resize=150%2C150&amp;ssl=1 150w, https://i0.wp.com/delbius.com/wp/wp-content/uploads/2024/12/Rule1.png?resize=768%2C768&amp;ssl=1 768w" sizes="(max-width: 660px) 100vw, 660px" /></figure>



<h4 class="wp-block-heading" style="font-size:34px">Rule 1. Causal statements must clearly show the &#8220;cause and effect&#8221; relationship</h4>
</div>



<p><em>Ensure clear identification of the chain of events that led to the incident.</em></p>



<p><strong>SCENARIO</strong>: A violative post remained visible on the platform for several hours.</p>



<ul class="wp-block-list">
<li><strong>Incorrect</strong>: “The system failed.”</li>



<li><strong>Correct</strong>: “The violative post remained visible because the moderation algorithm was not updated, which caused the violative content to go undetected.”</li>
</ul>



<p><strong>Why It Matters</strong>:</p>



<ul class="wp-block-list">
<li>The rule forces clear thinking about the actual chain of events;</li>



<li>The rule helps us avoid vague conclusions (e.g., &#8220;the system failed&#8221;) that don&#8217;t help prevent future incidents; and</li>



<li>The rule enables teams to identify specific points of failure that can be addressed.</li>
</ul>



<div style="height:44px" aria-hidden="true" class="wp-block-spacer"></div>



<div class="wp-block-group is-vertical is-nowrap is-layout-flex wp-container-core-group-is-layout-fc43baa9 wp-block-group-is-layout-flex">
<figure class="wp-block-image size-full is-resized is-style-rounded wp-duotone-grayscale"><img data-recalc-dims="1" decoding="async" width="660" height="660" src="https://i0.wp.com/delbius.com/wp/wp-content/uploads/2024/12/Rule2-1.png?resize=660%2C660&#038;ssl=1" alt="Rule 2. Negative descriptors are not used in causal statements" class="wp-image-720" style="width:120px" srcset="https://i0.wp.com/delbius.com/wp/wp-content/uploads/2024/12/Rule2-1.png?w=1024&amp;ssl=1 1024w, https://i0.wp.com/delbius.com/wp/wp-content/uploads/2024/12/Rule2-1.png?resize=300%2C300&amp;ssl=1 300w, https://i0.wp.com/delbius.com/wp/wp-content/uploads/2024/12/Rule2-1.png?resize=150%2C150&amp;ssl=1 150w, https://i0.wp.com/delbius.com/wp/wp-content/uploads/2024/12/Rule2-1.png?resize=768%2C768&amp;ssl=1 768w" sizes="(max-width: 660px) 100vw, 660px" /></figure>



<h4 class="wp-block-heading" style="font-size:34px">Rule 2. Negative descriptors are not used in causal statements</h4>
</div>



<p><em>Replace subjective or vague terms with factual and specific language.</em></p>



<p><strong>SCENARIO</strong>: User reports are not being resolved in a timely manner.</p>



<ul class="wp-block-list">
<li><strong>Incorrect</strong>: “Poor user communication.”</li>



<li><strong>Correct</strong>: “User reports were not resolved promptly because the notification system did not send alerts to the moderation team on time.”</li>
</ul>



<p><strong>Why It Matters</strong>:</p>



<ul class="wp-block-list">
<li>Negative descriptors such as &#8220;poor,&#8221; &#8220;inadequate,&#8221; or &#8220;bad&#8221; are subjective and don&#8217;t describe what actually happened;</li>



<li>The rule keeps the focus on specific, actionable issues rather than judgmental language; and</li>



<li>The rule keeps the analysis professional and factual rather than emotional or blame-oriented.</li>
</ul>



<div style="height:44px" aria-hidden="true" class="wp-block-spacer"></div>



<div class="wp-block-group is-vertical is-nowrap is-layout-flex wp-container-core-group-is-layout-fc43baa9 wp-block-group-is-layout-flex">
<figure class="wp-block-image size-full is-resized is-style-rounded wp-duotone-grayscale"><img data-recalc-dims="1" decoding="async" width="660" height="660" src="https://i0.wp.com/delbius.com/wp/wp-content/uploads/2024/12/Rule3.png?resize=660%2C660&#038;ssl=1" alt="Rule 3. Each human error must have a preceding cause" class="wp-image-719" style="width:120px" srcset="https://i0.wp.com/delbius.com/wp/wp-content/uploads/2024/12/Rule3.png?w=1024&amp;ssl=1 1024w, https://i0.wp.com/delbius.com/wp/wp-content/uploads/2024/12/Rule3.png?resize=300%2C300&amp;ssl=1 300w, https://i0.wp.com/delbius.com/wp/wp-content/uploads/2024/12/Rule3.png?resize=150%2C150&amp;ssl=1 150w, https://i0.wp.com/delbius.com/wp/wp-content/uploads/2024/12/Rule3.png?resize=768%2C768&amp;ssl=1 768w" sizes="(max-width: 660px) 100vw, 660px" /></figure>



<h4 class="wp-block-heading" style="font-size:34px">Rule 3. Each human error must have a preceding cause</h4>
</div>



<p><em>Highlight the systemic or environmental factors that led to human mistakes rather than blaming individuals</em>.</p>



<p><strong>SCENARIO</strong>: A moderator incorrectly flags a harmless post as harmful.</p>



<ul class="wp-block-list">
<li><strong>Incorrect</strong>: “The moderator made an error.”</li>



<li><strong>Correct</strong>: “The moderator incorrectly flagged the post because they were not properly trained on the new policy guidelines.”</li>
</ul>



<p><strong>Why It Matters</strong>:</p>



<ul class="wp-block-list">
<li>Humans rarely make mistakes for no reason;</li>



<li>The rule forces us to identify systemic issues (such as training gaps or unclear procedures) that can be fixed; and</li>



<li>The rule moves us beyond blaming individuals to understanding why they acted or handled the situation the way they did.</li>
</ul>



<div style="height:44px" aria-hidden="true" class="wp-block-spacer"></div>



<div class="wp-block-group is-vertical is-layout-flex wp-container-core-group-is-layout-8cf370e7 wp-block-group-is-layout-flex">
<figure class="wp-block-image size-full is-resized is-style-rounded wp-duotone-grayscale"><img data-recalc-dims="1" loading="lazy" decoding="async" width="660" height="660" src="https://i0.wp.com/delbius.com/wp/wp-content/uploads/2024/12/Rule4.png?resize=660%2C660&#038;ssl=1" alt="Rule 4. Each violation of procedure must have a preceding cause" class="wp-image-721" style="width:120px" srcset="https://i0.wp.com/delbius.com/wp/wp-content/uploads/2024/12/Rule4.png?w=1024&amp;ssl=1 1024w, https://i0.wp.com/delbius.com/wp/wp-content/uploads/2024/12/Rule4.png?resize=300%2C300&amp;ssl=1 300w, https://i0.wp.com/delbius.com/wp/wp-content/uploads/2024/12/Rule4.png?resize=150%2C150&amp;ssl=1 150w, https://i0.wp.com/delbius.com/wp/wp-content/uploads/2024/12/Rule4.png?resize=768%2C768&amp;ssl=1 768w" sizes="auto, (max-width: 660px) 100vw, 660px" /></figure>



<h4 class="wp-block-heading" style="font-size:34px">Rule 4. Each violation of procedure must have a preceding cause</h4>
</div>



<p><em>Examine why a procedure was not followed, addressing unclear or impractical guidelines.</em></p>



<p><strong>SCENARIO</strong>: A reviewer skips a step in the content review process.</p>



<ul class="wp-block-list">
<li><strong>Incorrect</strong>: “Procedure was not followed.”</li>



<li><strong>Correct</strong>: “The reviewer skipped a step in the content review process because the guidelines were unclear and the training provided was incomplete.”</li>
</ul>



<p><strong>Why It Matters</strong>:</p>



<ul class="wp-block-list">
<li>People rarely deviate from a prescribed procedure without a reason;</li>



<li>The rule helps identify if procedures are unclear, impractical, or poorly communicated; and</li>



<li>The rule can reveal when &#8220;workarounds&#8221; have become normalized due to system issues.</li>
</ul>



<div style="height:44px" aria-hidden="true" class="wp-block-spacer"></div>



<div class="wp-block-group is-vertical is-nowrap is-layout-flex wp-container-core-group-is-layout-fc43baa9 wp-block-group-is-layout-flex">
<figure class="wp-block-image size-full is-resized is-style-rounded wp-duotone-grayscale"><img data-recalc-dims="1" loading="lazy" decoding="async" width="660" height="660" src="https://i0.wp.com/delbius.com/wp/wp-content/uploads/2024/12/Rule5a.png?resize=660%2C660&#038;ssl=1" alt="Rule 5. Failure to act is only causal when there is a pre-existing duty to act" class="wp-image-759" style="width:120px" srcset="https://i0.wp.com/delbius.com/wp/wp-content/uploads/2024/12/Rule5a.png?w=1024&amp;ssl=1 1024w, https://i0.wp.com/delbius.com/wp/wp-content/uploads/2024/12/Rule5a.png?resize=300%2C300&amp;ssl=1 300w, https://i0.wp.com/delbius.com/wp/wp-content/uploads/2024/12/Rule5a.png?resize=150%2C150&amp;ssl=1 150w, https://i0.wp.com/delbius.com/wp/wp-content/uploads/2024/12/Rule5a.png?resize=768%2C768&amp;ssl=1 768w" sizes="auto, (max-width: 660px) 100vw, 660px" /></figure>



<h4 class="wp-block-heading" style="font-size:34px">Rule 5. Failure to act is only causal when there is a pre-existing duty to act</h4>
</div>



<p><em>Assign responsibility only where there is a legitimate expectation for the person or group to act, avoiding unwarranted blame based on hindsight.</em></p>



<p><strong>SCENARIO</strong>: Harmful content was not escalated for review.</p>



<ul class="wp-block-list">
<li><strong>Incorrect</strong>: “The reviewer failed to escalate the content.”</li>



<li><strong>Correct</strong>: “The harmful content was not escalated because the reviewer was not aware of the escalation protocol even though they had a duty to monitor for and escalate such content.”</li>
</ul>



<p><strong>Why It Matters</strong>:</p>



<ul class="wp-block-list">
<li>We can’t accurately assess causation if we attribute duties that are not specifically assigned to a role;</li>
</ul>



<ul class="wp-block-list">
<li>The rule helps us distinguish between actual responsibilities and hindsight bias;</li>



<li>The rule prevents unfairly attributing blame when someone wasn&#8217;t responsible; and</li>



<li>The rule helps identify gaps in role definitions and responsibilities.</li>
</ul>



<div style="height:44px" aria-hidden="true" class="wp-block-spacer"></div>



<div class="wp-block-group is-vertical is-nowrap is-layout-flex wp-container-core-group-is-layout-fc43baa9 wp-block-group-is-layout-flex">
<figure class="wp-block-image size-full is-resized is-style-rounded wp-duotone-grayscale"><img data-recalc-dims="1" loading="lazy" decoding="async" width="660" height="660" src="https://i0.wp.com/delbius.com/wp/wp-content/uploads/2024/12/Rule6a.png?resize=660%2C660&#038;ssl=1" alt="Rule 6. Causal search must focus on information transfers, control actions, and human or system interfaces" class="wp-image-762" style="width:120px" srcset="https://i0.wp.com/delbius.com/wp/wp-content/uploads/2024/12/Rule6a.png?w=1024&amp;ssl=1 1024w, https://i0.wp.com/delbius.com/wp/wp-content/uploads/2024/12/Rule6a.png?resize=300%2C300&amp;ssl=1 300w, https://i0.wp.com/delbius.com/wp/wp-content/uploads/2024/12/Rule6a.png?resize=150%2C150&amp;ssl=1 150w, https://i0.wp.com/delbius.com/wp/wp-content/uploads/2024/12/Rule6a.png?resize=768%2C768&amp;ssl=1 768w" sizes="auto, (max-width: 660px) 100vw, 660px" /></figure>



<h4 class="wp-block-heading" style="font-size:34px">Rule 6. Causal search must focus on information transfers, control actions, and human or system interfaces</h4>
</div>



<p><em>Identify points where communication, controls, or system interfaces broke down.</em></p>



<p><strong>SCENARIO</strong>: Harmful content is not removed promptly.</p>



<ul class="wp-block-list">
<li><strong>Incorrect</strong>: “The content was not removed because of a system error.”</li>



<li><strong>Correct</strong>: “The harmful content was not removed because the user interface of the agent tool’s review queue did not highlight the violation to the moderator, leading to a delay in action.”</li>
</ul>



<p><strong>Why It Matters</strong>:</p>



<ul class="wp-block-list">
<li>The rule directs attention to specific points where interventions can be made;</li>



<li>The rule helps identify breakdowns in communication or system design; and</li>



<li>The rule focuses attention on actionable elements rather than abstract concepts.</li>
</ul>



<div style="height:44px" aria-hidden="true" class="wp-block-spacer"></div>



<div class="wp-block-group is-vertical is-nowrap is-layout-flex wp-container-core-group-is-layout-fc43baa9 wp-block-group-is-layout-flex">
<figure class="wp-block-image size-full is-resized is-style-rounded wp-duotone-grayscale"><img data-recalc-dims="1" loading="lazy" decoding="async" width="660" height="660" src="https://i0.wp.com/delbius.com/wp/wp-content/uploads/2024/12/Rule7.png?resize=660%2C660&#038;ssl=1" alt="Rule 7. Specific descriptors are necessary to identify what failed" class="wp-image-724" style="width:120px" srcset="https://i0.wp.com/delbius.com/wp/wp-content/uploads/2024/12/Rule7.png?w=1024&amp;ssl=1 1024w, https://i0.wp.com/delbius.com/wp/wp-content/uploads/2024/12/Rule7.png?resize=300%2C300&amp;ssl=1 300w, https://i0.wp.com/delbius.com/wp/wp-content/uploads/2024/12/Rule7.png?resize=150%2C150&amp;ssl=1 150w, https://i0.wp.com/delbius.com/wp/wp-content/uploads/2024/12/Rule7.png?resize=768%2C768&amp;ssl=1 768w" sizes="auto, (max-width: 660px) 100vw, 660px" /></figure>



<h4 class="wp-block-heading" style="font-size:34px">Rule 7. Specific descriptors are necessary to identify what failed</h4>
</div>



<p><em>Avoid vague descriptions like “system error” and provide detailed explanations.</em></p>



<p><strong>SCENARIO</strong>: A violative post is not removed.</p>



<ul class="wp-block-list">
<li><strong>Incorrect</strong>: “The system had a bug.”</li>



<li><strong>Correct</strong>: “The violative post was not removed because the content filtering system had a bug that misclassified the post, preventing it from being flagged.”</li>
</ul>



<p><strong>Why It Matters</strong>:</p>



<ul class="wp-block-list">
<li>Vague descriptions like &#8220;had a bug&#8221; don&#8217;t go into enough specific detail to understand why things went wrong;</li>



<li>The rule forces us to identify precisely what, why, and how things went wrong; and</li>



<li>The rule enables us to deploy targeted fixes rather than broad, ineffective solutions.</li>
</ul>



<div style="height:44px" aria-hidden="true" class="wp-block-spacer"></div>



<h3 class="wp-block-heading">Applying the Rules: An Example</h3>



<p>Let’s take an incident write-up and see how applying the 7 Rules of Causation makes a world of difference.&nbsp;<br></p>



<h4 class="wp-block-heading" style="font-size:34px">Initial Draft</h4>



<p>Here’s the initial write-up:</p>



<p style="padding-left:3.75rem">The content moderation tool was misclassifying user posts, leading to a significant number of false positives for harmful content. Users reported being wrongly flagged for content violations, resulting in temporary account restrictions. The issue was first identified due to an influx of user complaints received on September 2, 2024, across multiple regions.</p>



<p style="padding-left:3.75rem">The moderation team immediately halted auto-classification and reverted to manual review. Users affected by the misclassification were notified, and account restrictions were lifted after verifying that no actual violations had occurred.</p>



<p>A cursory read shows us what has happened, but it has not explained why and how it happened.</p>



<div style="height:22px" aria-hidden="true" class="wp-block-spacer"></div>



<h4 class="wp-block-heading" style="font-size:34px">Reviewing the Draft</h4>



<p><strong>Let’s review how well the write-up abides by the rules of causation</strong>.&nbsp;</p>



<p>In the annotated image below, we see right away how Rule 1 and Rule 7 are not fully implemented.</p>


<div class="wp-block-image">
<figure class="aligncenter size-full is-resized"><img data-recalc-dims="1" loading="lazy" decoding="async" width="660" height="473" src="https://i0.wp.com/delbius.com/wp/wp-content/uploads/2024/12/example-incident-1.png?resize=660%2C473&#038;ssl=1" alt="Annotated incident write-up showing where 3 of the 7 rules of causation need to be applied." class="wp-image-790" style="width:840px;height:auto" srcset="https://i0.wp.com/delbius.com/wp/wp-content/uploads/2024/12/example-incident-1.png?w=754&amp;ssl=1 754w, https://i0.wp.com/delbius.com/wp/wp-content/uploads/2024/12/example-incident-1.png?resize=300%2C215&amp;ssl=1 300w" sizes="auto, (max-width: 660px) 100vw, 660px" /><figcaption class="wp-element-caption">Annotated incident write-up</figcaption></figure>
</div>


<p>We also note that nowhere in this write-up was there a mention of system-level factors (Rule 6) that may have contributed to the incident.</p>



<div style="height:22px" aria-hidden="true" class="wp-block-spacer"></div>



<h4 class="wp-block-heading" style="font-size:34px">Improving the Draft</h4>



<p><strong>To improve the write-up, we first apply Rule 7</strong> (<strong>Specificity</strong>)</p>



<p>By examining the specifics, we can better understand the incident’s scope (number of users) and what was misclassified (new allow-listed terms).&nbsp;</p>



<p style="padding-left:3.75rem">On 28 August 2024, the Policy team published OPSUPDATE-037 to add a new set of slang/terms to the Allow List. This policy change is intended to reflect how different marginalized communities have reappropriated these terms.&nbsp;</p>



<p style="padding-left:3.75rem">The policy change was scheduled to take effect on 2 September 2024 at noon PT. Unexpectedly, the auto-classification bots continued to classify user posts that included the slang/terms as violative.</p>



<p style="padding-left:3.75rem">From noon PT on 2 September 2024 until the auto-classification bots were paused, a total of 94,673 posts were wrongly flagged for content violations, affecting 43,862 unique users and resulting in these user accounts being placed under temporary account restrictions.</p>



<p style="padding-left:3.75rem">The issue was first identified because Anjali Bahri (T&amp;S Policy) noticed on 3 September that user complaints about their accounts being restricted due to these slang/terms continued despite the planned policy change.</p>



<div style="height:22px" aria-hidden="true" class="wp-block-spacer"></div>



<p><strong>Next, we apply Rule 1 (Cause and Effect)</strong></p>



<p>We dig deeper into what happened and identify the surprising series of events that led to the misclassification:</p>



<p style="padding-left:3.75rem">The moderation tool’s algorithm was not updated to handle the new slang and context variations documented in OPSUPDATE-037 because the Heuristics team member who was auto-assigned the ticket based on the on-call rotation had started parental leave earlier than expected.</p>



<p style="padding-left:3.75rem">There is no established process to ensure that already-assigned tickets are reassigned when the on-call rotation is retroactively updated. As such, OPSUPDATE-037 was not bundled with other planned updates and did not ship as scheduled.</p>



<p style="padding-left:3.75rem">There is also no established process within the Policy team for confirming that planned policy updates shipped as scheduled.</p>



<div style="height:22px" aria-hidden="true" class="wp-block-spacer"></div>



<h4 class="wp-block-heading" style="font-size:34px">Assessing the Result</h4>



<p>Notice how the improved write-up now abides by the 7 Rules:</p>



<ul class="wp-block-list">
<li>[Rule 1] Causal statements show the cause of the misclassification (approved policy change was not implemented as expected);</li>



<li>[Rule 2] There are no negative descriptors used;</li>



<li>[Rule 3] The human error (not deploying the allowlist update) has a preceding cause (ticket was not reassigned despite early parental leave);</li>



<li>[Rule 4] The violation of procedure (failure to deploy the allowlist changes) has a preceding cause;</li>



<li>[Rule 5] The lack of a pre-existing duty to act (no established process within the Policy team to confirm deployment of new policies) is noted explicitly;</li>



<li>[Rule 6] The search for the cause identified gaps in hand-offs between people and systems; and</li>



<li>[Rule 7] Specific descriptors now indicate who, when, how many, how long, and why.</li>
</ul>



<p>More importantly, <strong>the write-up now describes the root causes and contributing factors in sufficient detail</strong> so we can easily <strong>identify the specific actions needed</strong> to prevent a similar incident from occurring again.</p>



<div style="height:22px" aria-hidden="true" class="wp-block-spacer"></div>



<h3 class="wp-block-heading">Wrapping Up</h3>



<p>The 7 Rules demystify the “art” of writing incident reports. Instead of fatalistically believing that “only a good writer can produce decent incident reports,” we now have a rigorous framework for analysis that moves beyond simple blame to an in-depth understanding of system issues.&nbsp;</p>



<p>While the rules are listed as separate statements, our example clearly shows how applying a handful of rules leads to improvements across all seven.</p>



<p>By applying the 7 Rules of Causation to any incident write-up, we can:</p>



<ul class="wp-block-list">
<li>Better understand what <em>really</em> happened during incidents;</li>



<li>Identify concrete points for tactical interventions and improvements;</li>



<li>Share what we’ve learned effectively across teams; and</li>



<li>Build more robust systems and processes.</li>
</ul>



<p>The next time you need to write an incident report, use these rules as your guide. They’ll help you move from “What went wrong” to “Here’s how we can make it better.” Ultimately, that’s what effective Trust &amp; Safety work is all about.</p>



<p></p>



<p><strong>Author’s note</strong>: Special thanks and everlasting gratitude to <a href="https://mdynotes.com/" target="_blank" rel="noreferrer noopener">mdy</a>, who’s helped me both with this and so much else over the years.</p>



<div style="height:11px" aria-hidden="true" class="wp-block-spacer"></div>



<h3 class="wp-block-heading">Resources</h3>



<h4 class="wp-block-heading" style="font-size:34px">Downloadable Rules</h4>



<p>[ <a href="https://groups.google.com/a/delbius.com/g/resources/about" target="_blank" rel="noreferrer noopener nofollow">Join this Google Group</a> (free) to gain access. ] <br><a href="https://drive.google.com/file/d/1hRtG6KQFnwEu95UaLmMJ_0kn8vVn9V-k/view" target="_blank" rel="noreferrer noopener nofollow">Download the 7 Rules of Causation as a compact, two-page PDF</a>.</p>



<figure class="wp-block-image size-large is-resized has-lightbox"><a href="https://drive.google.com/file/d/1hRtG6KQFnwEu95UaLmMJ_0kn8vVn9V-k/view" target="_blank" rel=" noreferrer noopener"><img data-recalc-dims="1" loading="lazy" decoding="async" width="660" height="419" src="https://i0.wp.com/delbius.com/wp/wp-content/uploads/2024/12/7-Rules-TwoPageSpread.png?resize=660%2C419&#038;ssl=1" alt="Thumbnail image of The 7 Rules of Causation in a compact two-page PDF." class="wp-image-711" style="width:449px;height:auto" srcset="https://i0.wp.com/delbius.com/wp/wp-content/uploads/2024/12/7-Rules-TwoPageSpread.png?resize=1024%2C650&amp;ssl=1 1024w, https://i0.wp.com/delbius.com/wp/wp-content/uploads/2024/12/7-Rules-TwoPageSpread.png?resize=300%2C190&amp;ssl=1 300w, https://i0.wp.com/delbius.com/wp/wp-content/uploads/2024/12/7-Rules-TwoPageSpread.png?resize=768%2C487&amp;ssl=1 768w, https://i0.wp.com/delbius.com/wp/wp-content/uploads/2024/12/7-Rules-TwoPageSpread.png?w=1362&amp;ssl=1 1362w" sizes="auto, (max-width: 660px) 100vw, 660px" /></a></figure>



<div style="height:11px" aria-hidden="true" class="wp-block-spacer"></div>



<h4 class="wp-block-heading" style="font-size:34px"><em>Causify It!</em> Custom GPT</h4>



<p>Need a little help getting used to the 7 Rules of Causation? Try <a href="https://chatgpt.com/g/g-CthdPEGPo-causify-it" target="_blank" rel="noreferrer noopener nofollow"><em><strong>Causify It</strong></em>, an experimental Custom GPT</a> powered by this blog post. See a <a href="https://chatgpt.com/share/67725f95-5e10-8009-a24b-67bec8358f53" target="_blank" rel="noreferrer noopener nofollow">sample chat</a>. See also <a href="https://openai.com/policies/privacy-policy/" target="_blank" rel="noreferrer noopener nofollow">OpenAI&#8217;s Privacy Policy</a>.</p>



<div style="height:11px" aria-hidden="true" class="wp-block-spacer"></div>



<h4 class="wp-block-heading" style="font-size:34px">Related Template</h4>



<p><a href="https://delbius.com/resources#rca-guide" target="_blank" rel="noreferrer noopener">Root Cause Analysis: A Lightweight Template</a></p>



<div style="height:11px" aria-hidden="true" class="wp-block-spacer"></div>



<h3 class="wp-block-heading">References</h3>


<ol class="wp-block-footnotes"><li id="3ad88e57-a885-402c-b61c-eab4e4841237">Marx, D. (1999). <a href="https://www.faa.gov/sites/faa.gov/files/about/initiatives/maintenance_hf/losa/faa_(1998)_human_factors_in_aviation_maintenance_and_support.pdf" target="_blank" rel="noreferrer noopener nofollow">Maintenance error causation</a>. Chapter 2. In Human Factors in Aviation Maintenance &#8211; Phase XI, Progress Report. Washington, D.C: FAA, Office of Aviation Medicine. <a href="#3ad88e57-a885-402c-b61c-eab4e4841237-link" aria-label="Jump to footnote reference 1">↩︎</a></li></ol>


<p></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">649</post-id>	</item>
		<item>
		<title>Trust &#038; Safety as Preventative Healthcare</title>
		<link>https://delbius.com/trust-and-safety-as-preventative-healthcare/</link>
		
		<dc:creator><![CDATA[Del Harvey]]></dc:creator>
		<pubDate>Sat, 10 Aug 2024 06:07:15 +0000</pubDate>
				<category><![CDATA[Foundations]]></category>
		<guid isPermaLink="false">https://delbius.com/?p=459</guid>

					<description><![CDATA[Looking to increase the impact of your Trust &#038; Safety work? Here’s my prescription.]]></description>
										<content:encoded><![CDATA[<!-- wp:rss-featured-image --><figure class="wp-block-rss-featured-image"><img src="https://i0.wp.com/delbius.com/wp/wp-content/uploads/2024/08/trustandsafety-preventativehealthcare-scaled-1.png?fit=1800%2C300&#038;ssl=1" alt="Trust &amp; Safety as Preventative Healthcare" class="wp-block-rss-featured-image__image"/></figure><!-- /wp:rss-featured-image -->
<p><em>Note: I presented a version of this post as the opening keynote (see </em><a href="https://docs.google.com/presentation/d/1WGwwkh9Xzui2vrHNCxWbYlOE0QpuFHiVQdnFTjN2HiQ/edit" target="_blank" rel="noreferrer noopener nofollow"><em>keynote deck</em></a><em>) at TrustCon’s inaugural conference in 2022.</em> <em>Have feedback on this post? <a href="https://bsky.app/profile/delbius.bsky.social/" target="_blank" rel="noreferrer noopener nofollow">@ me on Bluesky</a></em>.</p>



<div id="toc" class="simple-toc" data-levels='["1","2"]' data-exclude='[""]' data-label="Outline"></div>



<h2 class="wp-block-heading">Introduction</h2>



<p>Back in 2018, I began looking at other fields that dealt with challenges similar to Trust &amp; Safety (T&amp;S) – multidisciplinary, high velocity, high stakes, murky information environments, global in reach – to see if I could draw any inspiration for the issues we were struggling with.</p>



<p>I found myself increasingly intrigued by some of the overlaps I noticed with epidemiology (the study of how diseases and health-related conditions spread, occur, and are controlled within populations), and, in turn, with the field of preventative healthcare and with public health more broadly.</p>



<p>The more I learned, the more similarities I found, and I eventually came to the realization that at its core, <strong>Trust &amp; Safety’s purpose is to work in service of health</strong> – of the company, the platform, the people who use it, the people whose lives are impacted by it, and (possibly idealistically) the world writ large.</p>



<p>Now, when I say Trust &amp; Safety’s purpose is to work in service of health, I’m not just talking about defining what is bad and addressing the bad things. In healthcare, “health” isn’t just the absence of disease, disorder, illness, or injury. Rather, in its ideal state, <strong>health refers to complete physical, mental, and social well-being</strong>. Ultimately, we must work in service of that broader meaning of health. </p>



<p>As such, T&amp;S professionals have five important and distinct responsibilities, each of which tracks closely to what is called an “intervention level” in preventative healthcare.</p>



<hr class="wp-block-separator has-alpha-channel-opacity is-style-dots"/>



<h2 class="wp-block-heading">T&amp;S Responsibilities and Healthcare Intervention Levels</h2>



<p>The diagram below provides an overview of the five responsibilities that we must fulfill in service of Health.</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img data-recalc-dims="1" loading="lazy" decoding="async" width="660" height="304" src="https://i0.wp.com/delbius.com/wp/wp-content/uploads/2024/08/dh-trustcon-health-intervention-levels.png?resize=660%2C304&#038;ssl=1" alt="T&amp;S Responsibilities mapped to Healthcare Intervention Levels" class="wp-image-538" srcset="https://i0.wp.com/delbius.com/wp/wp-content/uploads/2024/08/dh-trustcon-health-intervention-levels.png?resize=1024%2C471&amp;ssl=1 1024w, https://i0.wp.com/delbius.com/wp/wp-content/uploads/2024/08/dh-trustcon-health-intervention-levels.png?resize=300%2C138&amp;ssl=1 300w, https://i0.wp.com/delbius.com/wp/wp-content/uploads/2024/08/dh-trustcon-health-intervention-levels.png?resize=768%2C353&amp;ssl=1 768w, https://i0.wp.com/delbius.com/wp/wp-content/uploads/2024/08/dh-trustcon-health-intervention-levels.png?resize=1536%2C706&amp;ssl=1 1536w, https://i0.wp.com/delbius.com/wp/wp-content/uploads/2024/08/dh-trustcon-health-intervention-levels.png?resize=2048%2C941&amp;ssl=1 2048w, https://i0.wp.com/delbius.com/wp/wp-content/uploads/2024/08/dh-trustcon-health-intervention-levels.png?w=1320&amp;ssl=1 1320w, https://i0.wp.com/delbius.com/wp/wp-content/uploads/2024/08/dh-trustcon-health-intervention-levels.png?w=1980&amp;ssl=1 1980w" sizes="auto, (max-width: 660px) 100vw, 660px" /><figcaption class="wp-element-caption">Figure 1. T&amp;S Responsibilities mapped to Healthcare Intervention Levels</figcaption></figure>
</div>


<p>As T&amp;S professionals, we must:</p>



<ul class="wp-block-list">
<li><strong>Prevent Risk Factors</strong>. We <em>identify and target situations and conditions</em> that are likely to create the factors that put people at risk of harm and work to stop the risk factors from ever developing. This work maps to the <strong>Primordial</strong> intervention level in healthcare.&nbsp;</li>



<li><strong>Reduce Risk</strong>. When risk factors <em>already</em> exist, we work to<em> reduce or remove them</em>, empower people to control their experiences, and increase protective factors to build people’s resilience in situations where they encounter risk. This work maps to the <strong>Primary</strong> intervention level in healthcare.&nbsp;</li>



<li><strong>Detect Harm and Intervene</strong>. We <em>proactively identify harms</em> <em>and intervene</em> to stop them when they occur. This work maps to the <strong>Secondary</strong> intervention level in healthcare.</li>



<li><strong>Mitigate Harm</strong>. We <em>reduce the impact of experienced harms</em> through direct action and provide remediations to avoid reoccurrences. This work maps to the <strong>Tertiary</strong> intervention level in healthcare.</li>



<li><strong>Do It the Right Way</strong>. Last but not least, we strive to fulfill these responsibilities<em> the</em> <em>right way</em>. As both a responsibility and a cross-cutting principle, we balance potential risks and harms against the benefits of a given intervention or approach. We make sure we don’t inadvertently do more harm than good. This work maps to the <strong>Quaternary</strong> intervention level in healthcare.&nbsp;</li>
</ul>



<hr class="wp-block-separator has-alpha-channel-opacity is-style-dots"/>



<h2 class="wp-block-heading">Mapping Healthcare Interventions to a Trust &amp; Safety Scenario</h2>



<p>Let’s consider a specific scenario – say, losing log-in access to your account – and examine the goals and actions we can take at each intervention level.</p>



<h3 class="wp-block-heading">A. Primordial</h3>



<p>Our first responsibility – <strong>preventing risk factors from developing</strong> – tracks closely to preventative healthcare’s <strong>primordial</strong> level.<strong> </strong>By identifying the underlying conditions that lead to risk factors or that prevent protective factors from developing, we can design and implement system-wide interventions to either inhibit or promote the development of a given factor.</p>



<p><strong>Healthcare Example</strong>: In healthcare, increasing neighborhood walkability to encourage physical activity is an example of a primordial intervention. The broader population benefits because physical activity is more easily accessible and, as a result, more likely to become a consistent part of someone’s lifestyle.</p>



<p><strong>T&amp;S Example</strong>: In our account access scenario, we want an intervention that will cut down on the number of people who inadvertently lose account log-in access and can’t regain it without human assistance. At this level, we aren’t trying to identify specific groups or individuals in need; rather, we’re looking for broader conditions that could lead to risk factors developing that can be targeted across the system. For example, we might try requiring that people confirm their email addresses as part of the sign-up process to ensure that the email addresses they provide don’t have any inadvertent typos. Another option could be to display a user prompt informing them of the required correction when a known invalid email address is entered – say, an email address that has a comma instead of a period or no @ sign.</p>



<h3 class="wp-block-heading">B. Primary</h3>



<p>Now, realistically, there is no way that we can prevent every possible risk factor from developing. In preventative healthcare, <strong><em>primary</em> </strong>prevention maps to our responsibility to <strong>reduce risk</strong>. By reducing or eliminating<strong> </strong>existing risk factors, we can lower the likelihood of people experiencing a given harm. If risk reduction is not possible, we instead must work to enhance protective factors and build capacity for and resilience to harm.</p>



<p><strong>Healthcare Example</strong>: In preventative healthcare, a vaccine that lowers your likelihood of getting a specific disease is an example of risk reduction, while a law mandating the use of seatbelts in cars is an example of an intervention that enhances protective factors.</p>



<p><strong>T&amp;S Example</strong>: In our account access scenario, we want to reduce the number of people who inadvertently lose log-in access to their accounts and can’t regain it without human assistance. However, we’re no longer trying to address underlying conditions; rather, we’re attempting to either reduce risk or enhance protective factors. Let’s say, for example, that we’ve seen a significant increase in account compromises lately. We might consider requiring people to confirm they’re still in control of their account via an in-app or email prompt whenever we see an account login attempt from a new device. This intervention provides an additional layer of protection against account compromise.</p>



<h3 class="wp-block-heading">C. Secondary</h3>



<p>Much as we can’t prevent every possible risk factor from developing, there’s also no feasible way to eliminate all existing risk factors or prevent all harm. As such, we also need to <strong>detect harm and intervene</strong> – actions that fall within the <strong>secondary-level</strong> interventions in preventative healthcare. We want to take action at the earliest possible point where doing so can be effective, ideally before the full impact of the harm is experienced.&nbsp;</p>



<p><strong>Healthcare Example</strong>: In preventative healthcare, these interventions involve screening for and identifying unrecognized diseases in healthy-appearing people and treating them before the onset of symptoms or at the earliest possible point where detection and intervention can be effective, as well as reversing the communicability of infectious disease. These interventions are not implemented for the whole population; rather, the focus is on specific individuals or groups who are likely at risk. Regular mammography screenings to detect early-stage breast cancer are an example of a secondary-level intervention.&nbsp;</p>



<p><strong>T&amp;S Example</strong>: In our account access scenario, the regular monitoring of credential dumps resulting from various data breaches and cross-referencing those credentials with our records to identify accounts that have direct password exposure will allow us to implement forced password resets <em>before</em> an account is compromised. This intervention identifies and halts the progression of harm for at-risk accounts before the full impact of the harm is experienced.</p>



<h3 class="wp-block-heading">D. Tertiary</h3>



<p>With the previous level, we focused on halting the progression of harm. To effectively<em> </em><strong>mitigate harm</strong> – known as <strong>tertiary</strong> <strong>interventions</strong> in healthcare – we must <em>not only</em> reduce the damage caused by the harm, with the goal of restoring the account to a healthy state, <em>but also</em> devise ways to prevent the harm from reoccurring or causing further damage.&nbsp;</p>



<p><strong>Healthcare Example</strong>: In healthcare, tertiary<strong> </strong>interventions take place once a disease has entered the clinical stage and symptoms are present. These interventions focus on reducing the damage caused by symptomatic disease, including mitigating current pain or damage, preventing additional pain or damage, and restoring the health and functions of individuals affected by disease. Examples of tertiary interventions in healthcare include stroke rehabilitation programs and outpatient support programs.&nbsp;</p>



<p><strong>T&amp;S Example</strong>: In our Account Access scenario, a tertiary intervention could be to have a guided account restoration process in place so that people can easily regain access to their accounts. Similarly, having multi-factor authentication (MFA) reset tools so that people can reset their MFA settings after losing access to their authentication device (e.g., a lost phone or a broken hardware token) would also be a tertiary intervention.</p>



<h3 class="wp-block-heading">E. Quaternary</h3>



<p>Finally, as both a responsibility <em>and</em> a cross-cutting principle, we want to ensure that any actions we take and interventions we deploy are <strong>done</strong> <strong>the right way</strong> – preventative healthcare’s <strong>quaternary</strong> level. We need to weigh benefits against risks and potential ramifications <em>before</em> an action is taken. If the risks and potential ramifications outweigh the benefits, we need to figure out a different approach.</p>



<p><strong>Healthcare Example</strong>: In healthcare, these interventions include actions taken to identify and protect individuals from medical interventions that are more likely to cause harm than good. These steps include identifying patients at risk of overtesting or overmedicalization, protecting them from excessive medical invasion, preventing the use of therapies that have not been adequately assessed, and suggesting interventions that <em>are</em> ethically acceptable.</p>



<p>Ultimately, such initiatives are informed by the principle of nonmaleficence – the obligation to not inflict harm on others – which is closely tied to the maxim of “first do no harm.” An example of a quaternary intervention in healthcare is avoiding excessive antibiotic use because overuse could lead to the development of drug-resistant diseases.</p>



<p><strong>T&amp;S Example</strong>: How might this play out for our account access scenario? Let’s say we’re planning to force password resets for all accounts that have had their passwords exposed through data breaches elsewhere. As we’re evaluating potential risks and ramifications, we realize that a significant number of affected accounts don’t have confirmed email addresses. If there is no way for people to regain access to their account without access to their email, we could consider either implementing a special account access flow for those accounts or limiting our forced password reset to those that have confirmed email addresses, then falling back on in-app notifications for other accounts to let them know that they need to change their password.</p>



<p>By providing effective and reliable mechanisms for people to regain access to their accounts if and when they need help – <em>particularly</em> if they need that help because of an intervention we’ve initiated – we give ourselves more freedom to implement other types of interventions because there is still a path back to health for those affected.</p>



<p>When we keep the five intervention levels in mind as we evaluate how to tackle a given T&amp;S challenge, we can identify optimal intervention points and, when possible, shift our focus to earlier levels to maximize their impact.</p>



<hr class="wp-block-separator has-alpha-channel-opacity is-style-dots"/>



<h2 class="wp-block-heading">Using Intervention Objectives to Identify Gaps in T&amp;S Work</h2>



<p>In the preceding section, I’ve focused primarily on Trust &amp; Safety interventions that aim to either preserve health (i.e., <strong>health protection</strong>) or prevent, slow, or repair harm (i.e., <strong>harm reduction</strong>).&nbsp;</p>



<p>To use a video game metaphor, I’ve described actions that are designed to prevent our character from taking damage (shield), slow the rate of damage experienced (armor), or heal them (potion).</p>


<div class="wp-block-image">
<figure class="aligncenter size-full"><img data-recalc-dims="1" decoding="async" src="https://i0.wp.com/delbius.com/wp/wp-content/uploads/2022/08/dh-trustcon-lifemeter-interventions.png?w=660&#038;ssl=1" alt="Health protection and harm reduction interventions aim to keep the Life Meter full" class="wp-image-487"/><figcaption class="wp-element-caption">Figure 2. <strong>Health protection</strong> and <strong>harm reduction</strong> interventions aim to keep the Life Meter full</figcaption></figure>
</div>


<p>For Trust &amp; Safety work to be successful and sustainable, however, our efforts must also include interventions that promote health and build resiliency – or, to go back to the video game analogy, interventions that will make our character’s life meter longer and give us more health capacity (i.e., <strong>health promotion</strong>).</p>


<div class="wp-block-image">
<figure class="aligncenter size-full"><img data-recalc-dims="1" loading="lazy" decoding="async" width="660" height="187" src="https://i0.wp.com/delbius.com/wp/wp-content/uploads/2022/08/dh-trustcon-lifemeter.gif?resize=660%2C187&#038;ssl=1" alt="Health promotion interventions extend the Life Meter" class="wp-image-516"/><figcaption class="wp-element-caption">Figure 3. Health promotion interventions extend the Life Meter</figcaption></figure>
</div>


<p></p>



<h3 class="wp-block-heading">Why does this matter?&nbsp;</h3>



<p>Health promotion interventions empower people to engage in responsible behaviors, which enhances harm prevention and strengthens protection measures. Because health promotion encourages individuals to adopt healthy behaviors before issues arise, these types of interventions increase resilience, further strengthening harm prevention and health protection interventions.&nbsp;</p>



<p>By developing interventions that span all three areas, we can break the cycle of being trapped in the endless whack-a-mole of reacting to harm after it has already occurred and instead begin to shift towards a more holistic pursuit of health.</p>



<p>Consider the Account Access examples we covered in the previous section. The table below maps the aforementioned interventions (denoted with a green checkbox) to the three intervention objectives and five intervention levels.&nbsp;A quick glance at the table below shows that our previously identified interventions all fall squarely under the <strong>health protection</strong> and <strong>harm prevention</strong> objectives only. It’s clear that we have gaps in <strong>health promotion</strong> and have an opportunity to expand our work on the first two objectives.</p>


<div class="wp-block-image">
<figure class="aligncenter size-full is-resized"><img data-recalc-dims="1" loading="lazy" decoding="async" width="660" height="425" src="https://i0.wp.com/delbius.com/wp/wp-content/uploads/2022/08/dh-trustcon-map-1.png?resize=660%2C425&#038;ssl=1" alt="Partial List of Account Access Interventions mapped to the three Objectives and the five Intervention Levels" class="wp-image-523" style="width:900px" srcset="https://i0.wp.com/delbius.com/wp/wp-content/uploads/2022/08/dh-trustcon-map-1.png?w=1043&amp;ssl=1 1043w, https://i0.wp.com/delbius.com/wp/wp-content/uploads/2022/08/dh-trustcon-map-1.png?resize=300%2C193&amp;ssl=1 300w, https://i0.wp.com/delbius.com/wp/wp-content/uploads/2022/08/dh-trustcon-map-1.png?resize=1024%2C660&amp;ssl=1 1024w, https://i0.wp.com/delbius.com/wp/wp-content/uploads/2022/08/dh-trustcon-map-1.png?resize=768%2C495&amp;ssl=1 768w" sizes="auto, (max-width: 660px) 100vw, 660px" /><figcaption class="wp-element-caption">Table 1. Partial list of Account Access Interventions mapped to the three Objectives and the five Intervention Levels</figcaption></figure>
</div>


<p><strong>What might a comprehensive set of interventions look like</strong>? Let’s fill out the rest of the table and consider how other interventions might work in service of preserving Account Access for our rightful users.&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-full is-resized"><img data-recalc-dims="1" loading="lazy" decoding="async" width="660" height="685" src="https://i0.wp.com/delbius.com/wp/wp-content/uploads/2022/08/dh-trustcon-map-2.png?resize=660%2C685&#038;ssl=1" alt="Comprehensive list of Account Access Interventions mapped to the three Objectives and the five Intervention Levels" class="wp-image-524" style="width:900px" srcset="https://i0.wp.com/delbius.com/wp/wp-content/uploads/2022/08/dh-trustcon-map-2.png?w=1043&amp;ssl=1 1043w, https://i0.wp.com/delbius.com/wp/wp-content/uploads/2022/08/dh-trustcon-map-2.png?resize=289%2C300&amp;ssl=1 289w, https://i0.wp.com/delbius.com/wp/wp-content/uploads/2022/08/dh-trustcon-map-2.png?resize=987%2C1024&amp;ssl=1 987w, https://i0.wp.com/delbius.com/wp/wp-content/uploads/2022/08/dh-trustcon-map-2.png?resize=768%2C797&amp;ssl=1 768w" sizes="auto, (max-width: 660px) 100vw, 660px" /><figcaption class="wp-element-caption">Table 2. Comprehensive list of Account Access Interventions mapped to the three Objectives and the five Intervention Levels</figcaption></figure>
</div>


<h2 class="wp-block-heading">Conclusion</h2>



<p>As Trust &amp; Safety professionals, our focus cannot solely be on mitigating harm. Instead, our interventions must be in service of all three objectives:</p>



<ul class="wp-block-list">
<li><strong>Health protection </strong>&nbsp;–&nbsp; eliminate risk factors and reduce the number of potential risks people encounter.</li>



<li><strong>Harm prevention</strong>&nbsp; –&nbsp; maintain current health capacity, mitigate the impact of harm, and repair damage.</li>



<li><strong>Health promotion</strong>&nbsp; –&nbsp; empower people to take control of their own experiences, build resilience, and increase their capacity to handle encountered risks.</li>
</ul>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img data-recalc-dims="1" loading="lazy" decoding="async" width="660" height="313" src="https://i0.wp.com/delbius.com/wp/wp-content/uploads/2022/08/dh-trustcon-interventionobjectives-1.png?resize=660%2C313&#038;ssl=1" alt="By pursuing all three intervention objectives, we create a Virtuous Cycle" class="wp-image-505" srcset="https://i0.wp.com/delbius.com/wp/wp-content/uploads/2022/08/dh-trustcon-interventionobjectives-1.png?resize=1024%2C486&amp;ssl=1 1024w, https://i0.wp.com/delbius.com/wp/wp-content/uploads/2022/08/dh-trustcon-interventionobjectives-1.png?resize=300%2C142&amp;ssl=1 300w, https://i0.wp.com/delbius.com/wp/wp-content/uploads/2022/08/dh-trustcon-interventionobjectives-1.png?resize=768%2C364&amp;ssl=1 768w, https://i0.wp.com/delbius.com/wp/wp-content/uploads/2022/08/dh-trustcon-interventionobjectives-1.png?w=1402&amp;ssl=1 1402w, https://i0.wp.com/delbius.com/wp/wp-content/uploads/2022/08/dh-trustcon-interventionobjectives-1.png?w=1320&amp;ssl=1 1320w" sizes="auto, (max-width: 660px) 100vw, 660px" /><figcaption class="wp-element-caption">Figure 4. By pursuing all three intervention objectives, we create a Virtuous Cycle</figcaption></figure>
</div>


<p>When our work spans the three intervention objectives and is across all five intervention levels, we create a virtuous cycle that allows us to identify optimal intervention points, discover gaps in our T&amp;S work, and better support the development of a balanced <em>and sustainable</em> path in our pursuit of health.</p>



<p><strong>Author&#8217;s note</strong>: Special thanks and everlasting gratitude to <a href="https://mdynotes.com" target="_blank" rel="noreferrer noopener">mdy</a>, who’s helped me both with this and so much else over the years.</p>



<hr class="wp-block-separator has-alpha-channel-opacity is-style-dots"/>



<h2 class="wp-block-heading">References</h2>



<p>Association of Faculties of Medicine of Canada. &#8220;Introduction to Epidemiology.&#8221; Public Health Primer. Accessed August 9, 2024. <a href="https://phprimer.afmc.ca/en/part-i/chapter-4/">https://phprimer.afmc.ca/en/part-i/chapter-4/</a>.</p>



<p>Mendes, René, and Elizabeth Costa Dias. &#8220;Health Protection, Health Promotion, and Disease Prevention at the Workplace.&#8221; In Global Occupational Health, edited by Tee L. Guidotti. Oxford University Press, 2011.<a href="https://doi.org/10.1093/acprof:oso/9780195380002.003.0018"> https://doi.org/10.1093/acprof:oso/9780195380002.003.0018</a>. Accessed August 9, 2024.</p>



<p></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">459</post-id>	</item>
	</channel>
</rss>
