Back to feed

Trust Centre Operations

Review Queues And Lines Of Defence

How reports, corrections, source issues, and escalations should be routed.

Source-Controlled Doc

This public page is rendered from product-development/trust-and-safety/public-operations/review-queues-and-lines-of-defence.md.

Queue Taxonomy

Planned queues cover AI output concerns, source and provenance concerns, editorial framing concerns, wrong attribution, correction requests, appeal or reconsideration requests, transparency-log review, source-ingestion or data-quality issues, prompt/model/pipeline change review, incident review, legal-sensitive escalation, and future user-conduct moderation.

Each queue should identify intake source, likely content classes, first reviewer role, evidence required, possible outcomes, escalation triggers, and transparency-log consideration.

First Line Of Defence

AI and system triage should catch missing provenance, broken source mappings, missing generation records, failed prompt/model outputs, duplicate reports, and publication blockers. It should route reports by category and severity.

Second Line Of Defence

Fact-check or editorial review should compare output with source material, check attribution and omitted context, apply the Editorial Integrity Code, and decide whether to correct, regenerate, rewrite, remove, escalate, or record no action.

Third Line Of Defence

Safety lead, trained moderator, escalation reviewer, legal reviewer, or senior decision-maker should handle high-risk, contested, repeat, legal-sensitive, public-figure, incident, and future user-conduct appeal cases.

Evidence Record

Review records should connect report ID, content ID, content class, source object ID, generation ID where applicable, source snapshot or URL, output snapshot, issue category, severity, reviewer role, decision, rationale, action taken, escalation status, transparency-log decision, and restricted evidence references.