Governance applies across all phases.
Scope, Approval & "Do-Not-Ask" Rules — Define approved target groups, call windows, escalation paths, and strict boundaries. Establish prohibited requests (passwords, OTPs, banking info, national IDs, or other regulated data).
Scenario Design (Process-Focused, Non-Coercive) — Build realistic call scripts aligned to internal workflows designed to test verification and escalation, not to trick people into harmful actions.
Controlled Call Execution (Operator or Automated) — Conduct calls using approved caller IDs/lines where possible, with live supervision and a kill switch. Follow agreed playbooks and stop conditions if distress or operational impact appears.
Safe Telemetry & Workflow Findings — Measure verification compliance, disclosure category, escalation/report actions, and time-to-report using minimal data. Call recording is optional and only used if explicitly approved; otherwise store non-content metadata and operator notes.
Remediation, TPRM Alignment & Playbooks — Convert findings into controls: out-of-band verification for payment/vendor changes, strengthened remote-access approvals, and inputs to TPRM scoring and contract security requirements.