Trust & Safety Program Risk Assessments

Guidepost has a substantial practice assisting companies, organizations, and institutions with their Trust & Safety programs. Our solutions in this mission-critical area help protect your stakeholders, including customers, content creators, hosts, and users.

As part of our work, we conduct risk assessments, due diligence analysis, and platform benchmarking. We can evaluate the platform’s current Trust & Safety (T&S) governance, enforcement posture, and the ability to detect and mitigate high-risk behaviors. If needed, we can assist with the implementation of technical upgrades to help enhance your T&S Program.

This includes identifying and addressing behaviors linked to:

  • Human trafficking.
  • CSAM (Child Sexual Abuse Material).
  • Coerced content.
  • Violence.
  • Money laundering.
  • Related exploitation.
  • Moderation of deepfakes.

Contact Us

a group of young businessmen are standing next to each other looking at their cell phones

Pre-Acquisition Due Diligence

We conduct pre-acquisition due diligence for clients who are considering investing in platforms. This specialized work may include:

  • Governance, Compliance, and Process Review
    Examine Community Standards, Terms of Service, enforcement frameworks, appeals processes, and other governance flows.
  • Review processes from CSAM awareness through reporting and 90-day evidence preservation.
  • Evaluate emergency disclosure playbooks, data transfer practices, and other compliance documentation.
  • Validate compliance with legal and reporting obligations, such as CyberTipline intake and evidence preservation—including limited spot checks of report quality.
  • Analyze queue design, triage criteria, dual-control procedures for restores, and key metrics.
  • Establish baselines for category prevalence, reviewer throughput, re-offense rates, and other KPIs (Key Performance Indicators).

Content Moderation Technical Stack Analysis
We analyze the content moderation technical stack, specifically concerning CSAM:

  • Evaluate hash-matching coverage (e.g., PhotoDNA) at upload and at rest.
  • Assess de-duplication and auto-blocking behaviors.

Contact Us

MAGELLAN Monitorship
SBC hotline
Empire/Liberty Review