Overview
The Incidents module provides a secure way to report and track sensitive situations including extortion attempts, system errors, and operational issues. It ensures proper documentation and notification of relevant personnel.Extortion Reporting
Confidential reporting of security threats
System Issues
Report errors and technical problems
Automatic Notifications
Alerts sent to security and management teams
Audit Trail
Complete history of all incident reports
Incident Types
Extortion Incidents
Extortion Incidents
Reports of extortion attempts, threats, or security concerns related to operations.Purpose: Allow employees to confidentially report dangerous situations.Automatic Actions:
- Creates incident record in database
- Notifies security team immediately
- Does NOT send any confirmation to reporter (for safety)
System Issues
System Issues
Technical problems, errors, or bugs encountered in the platform.Purpose: Help IT team identify and fix system issues.Automatic Actions:
- Creates case in system reports table
- Sends notification to IT team and management
- Includes page URL and user information
- Reporter receives confirmation email
Reporting an Extortion Incident
Access Incident Form
Navigate to the incident reporting page or use the quick-access link provided by management.
Enter Incident Details
Provide as much information as safely possible:
- Date and time of incident
- Location or route affected
- Description of threat or situation
- Any identifying information about perpetrators
- Vehicle details (if applicable)
Incident data is stored with restricted access. Only authorized security personnel can view reports.
Reporting a System Issue
Help improve the platform by reporting bugs or errors:Describe the Problem
- What were you trying to do?
- What happened instead?
- Any error messages shown?
- Page URL
- Your user ID and name
- Browser information
- Timestamp
Viewing Incidents (Internal)
Authorized personnel can view incident reports:List All Incidents
List All Incidents
- Incident ID and type
- Report date/time
- Status (pending_review, investigating, resolved)
- Brief description
Incident Detail
Incident Detail
Access full incident details including:
- Complete description
- Location and time information
- Reporter information (if not anonymous)
- Attached evidence or documents
- Action taken log
- Resolution notes
Notifications
Incidents trigger automatic notifications to appropriate teams:Extortion Incidents
Extortion Incidents
Recipients: Security team, managementChannels:
- Email (urgent flag)
- SMS/WhatsApp to security chief
- In-app notification
- Incident summary
- Location and time
- Severity level
- Link to full report (secure)
System Issues
System Issues
Recipients: IT team ([email protected]), managementChannels:
- In-app notification
- Error description
- Page URL where error occurred
- Reporter contact information
- Technical metadata (browser, timestamp)
Incident Lifecycle
System Reports Dashboard
IT staff can view system issue trends:Common Error Pages
Common Error Pages
- 403 Forbidden: Permission issues
- 404 Not Found: Broken links
- 500 Internal Server Error: Backend issues
Metrics
Metrics
- Total reports by error type
- Most reported pages
- Average resolution time
- Repeat issues (not yet fixed)
Security and Privacy
Data Protection
Data Protection
- Incident data is encrypted at rest
- Access logs maintained for all views
- Automatic purging of resolved incidents after retention period
Anonymous Reporting
Anonymous Reporting
- Extortion incidents can be reported anonymously
- Reporter identity is optional and protected
- IP addresses are not logged for security reports
Role-Based Access
Role-Based Access
- Security incidents: Security team and C-level only
- System issues: IT team and management
- Regular users: Cannot view other users’ reports
Best Practices
Report Immediately
Report Immediately
For extortion or security threats, report as soon as it is safe to do so.
Provide Details
Provide Details
More information helps the team respond effectively. Include:
- Exact location (GPS coordinates if possible)
- Time of incident
- Vehicle descriptions
- Any photos (if safe to take)
Don't Investigate Yourself
Don't Investigate Yourself
For security incidents, do not attempt to gather additional information or confront individuals.
Follow Up on System Issues
Follow Up on System Issues
If you report a bug, respond to IT team inquiries to help them reproduce and fix the issue.
Use Appropriate Channel
Use Appropriate Channel
- Security threats: Use incident system
- Feature requests: Contact product team
- Training questions: Contact your manager
Related Features
Dashboard
View incident statistics and trends
Service Requests
Manage service operations and routes