Skip to content

Hop And Haul Policy Findings & Remediation Plan

Document ID: PLCY-FRP-001
Assessment Date: December 22, 2025
Assessor: Internal Policy Review
Status: Remediation Complete
Completion Date: December 22, 2025
Version: 1.4
Owner: Hop And Haul Team


CONFIDENTIAL

This document is CONFIDENTIAL and for internal use only. Do not distribute outside the organization.

Executive Summary

This document tracks findings identified during internal policy review and their remediation status. The review assessed alignment with compliance Trust Service Criteria, DOT/FMCSA compliance, litigation readiness, and operational executability.

Total Policy Documents: 23

MetricCount
Total Findings12
Critical2 (2 Remediated)
High4 (4 Remediated)
Medium4 (4 Remediated)
Low2 (1 Closed, 1 Remediated)
StatusAll Remediated

Findings Register

IDFindingSeverityImpacted DocumentsStatusRemediation Action
F-001Inconsistent retention schedules across documentsCriticalPLCY-LIA-001, PLCY-INC-001, PLCY-DATA-001, PLCY-AUD-001, PLCY-SEC-001RemediatedCreated PLCY-RET-001 Records Retention Policy, updated all docs to reference
F-002Emergency voice override lacks recording consent documentationCriticalPLCY-VOI-001RemediatedAdded recording basis logging, emergency categories, audit trail requirements
F-003Manual verification workflow undefinedHighPLCY-VAL-001RemediatedDefined controlled exception process with evidence, approval authority, expiration
F-004Placeholder values throughout all documentsHighAll 15 documentsRemediatedFilled all [DATE], [ROLE], [NAME], [DEFINED] placeholders
F-005No policy index/governance documentHighN/ARemediatedCreated PLCY-IDX-001 policy-index.md with full registry and criteria mapping
F-006DOT push notification language too definitiveHighPLCY-COM-001RemediatedSoftened language, added compliance disclaimer
F-007No global offer rate limitingMediumPLCY-COM-001, PLCY-VOI-001RemediatedAdded Section 8.4 with hourly limits, quiet hours, post-decline suppression
F-008No accident handling RACI matrixMediumPLCY-LIA-001RemediatedCreated Section 5.4 with consolidated RACI matrix
F-009Control testing artifacts undefinedMediumN/ARemediatedCreated PLCY-CTL-001 control-testing-procedures.md with full test definitions
F-010Fuzzification algorithm lacks precision detailMediumPLCY-SEC-001RemediatedAdded algorithm specifications and anti-triangulation measures
F-011Missing dependency claim for safety-buffer-parameters.mdLowPLCY-VOI-001ClosedFile exists (false positive in original review)
F-012Emergency/safety-urgent categories not distinguishedLowPLCY-VOI-001, PLCY-COM-001RemediatedAdded EMERGENCY vs SAFETY_URGENT category definitions in Section 7.2

Detailed Findings

F-001: Inconsistent Retention Schedules (Critical)

Description: Retention periods vary across documents without justification:

  • Accident framework: 7-10 years, some permanent
  • Incident response: 24-36 months
  • Data classification: 6-24 months by category
  • Audit trail specs: 3-24 months by category
  • Security controls: 12-24 months

Risk: compliance auditors will flag as control weakness. Litigation readiness compromised—conflicting retention schedules create discovery confusion.

Remediation: Create canonical Records Retention & Legal Hold Policy (PLCY-RET-001). Update all impacted documents to reference authoritative schedule.


Description: Current policy states "recording consent waived" for emergencies without documenting legal basis or establishing audit trail.

Risk: In all-party consent states (CA, CT, DE, FL, IL, MD, MA, MI, MT, NV, NH, PA, WA), blanket consent waiver may not hold. If recording challenged post-incident, lack of documented basis weakens defense.

Remediation:

  1. Define EMERGENCY vs SAFETY_URGENT categories
  2. Establish recording basis documentation requirements
  3. Create emergency mode audit trail fields
  4. Require post-emergency documentation within 24 hours

F-003: Manual Verification Workflow Undefined (High)

Description: Pre-transaction validation document states "pending verification" escalation exists but lacks:

  • Required evidence by validation type
  • Approval authority matrix
  • Expiration timeline
  • Audit trail requirements

Risk: Creates shadow override pathway. Auditors will flag as control gap.

Remediation: Define complete manual verification workflow with evidence requirements, approval authority, 4-hour expiration, and comprehensive logging.


F-004: Placeholder Values (High)

Description: All 15 policy documents contain unfilled placeholders: [DATE], [ROLE], [NAME], [DEFINED]

Risk: compliance auditors treat as "policy exists but governance not operationalized." Indicates documents are drafts, not production policies.

Remediation: Fill all placeholders with actual values:

  • Effective dates and review dates
  • Role titles (Safety Director, Operations Manager, etc.)
  • Author attribution
  • Contact methods and escalation procedures

F-005: No Policy Index (High)

Description: No master document listing all policies, their owners, review dates, and cross-references to compliance criteria.

Risk: Governance gap. Difficult to demonstrate policy coverage during audits.

Remediation: Create policy-index.md with document registry, ownership matrix, review schedule, and compliance criteria mapping.


F-006: DOT Push Notification Language (High)

Description: Statement "Push notifications are NOT automatically texting" reads as legal conclusion rather than compliance documentation.

Risk: Overstating position invites challenge. Better to document compliance efforts than declare regulatory interpretation.

Remediation: Reframe as "designed to minimize risk of being considered texting" with supporting controls enumerated.


F-007: No Global Offer Rate Limiting (Medium)

Description: Individual offer retry limits exist but no system-wide throttling:

  • No maximum offers per hour
  • No quiet hours
  • No post-decline suppression period (inconsistent with voice policy 30-min rule)

Risk: Volume-based coercion still possible. Inconsistent treatment across communication methods.

Remediation: Add global rate limits: max 3/hour, quiet hours 10PM-6AM, 30-min post-decline suppression.


F-008: No Accident RACI Matrix (Medium)

Description: Accident handling responsibilities distributed across multiple documents without consolidated responsibility assignment.

Risk: Real incidents get messy when ownership unclear. Multiple teams may assume others are handling critical actions.

Remediation: Create single RACI matrix covering: scene safety, evidence capture, insurer notification, DOT reportability, driver communication, legal hold, workers' comp, post-incident review.


F-009: Control Testing Undefined (Medium)

Description: Policies state controls exist but don't define how they're tested:

  • What queries/reports validate controls
  • Test frequency and ownership
  • Expected outputs
  • Results storage

Risk: "How do you test controls actually work?" is standard compliance auditor question.

Remediation: Create control testing procedures document defining test method, frequency, owner, and results storage for each key control.


F-010: Fuzzification Algorithm Imprecise (Medium)

Description: Security controls mention "1-2 mile radius" fuzzification but don't specify:

  • Deterministic vs random offset
  • Refresh cadence
  • Whether repeated offers leak position through triangulation

Risk: Auditors will ask for precision. Position leakage through sampling is valid privacy concern.

Remediation: Document: random offset, new offset per offer, non-deterministic, cannot triangulate from <10 samples.


F-011: Missing safety-buffer-parameters.md (Low) - CLOSED

Description: Review claimed voice policy references missing file.

Finding: File exists at /docs/policies/safety-buffer-parameters.md with Document ID PLCY-BUF-001. Reference is valid.

Status: Closed - false positive in original review.


F-012: Emergency Category Undefined (Low)

Description: No clear criteria distinguishing "emergency" (bypass all gates) from "safety urgent" (elevated priority, standard rules).

Risk: Operator discretion without guidance. May over-trigger or under-trigger emergency mode.

Remediation: Define categories with explicit criteria in voice agent and communication protocol documents.


Remediation Timeline

PhaseTargetFindingsDeliverables
Phase 1ImmediateF-004, F-005Fill placeholders, create policy-index.md
Phase 2Week 1F-001, F-002Create retention policy, update emergency override
Phase 3Week 2F-003, F-006, F-007Manual verification workflow, DOT language, rate limits
Phase 4Week 3F-008, F-009, F-010, F-012RACI matrix, control testing, fuzzification, emergency categories

Policy Enhancements

The following policies were added proactively to strengthen compliance posture:

Document IDTitlePurpose
PLCY-GOV-001Governance & AssumptionsSaaS model, team roles, customer vs platform responsibility, liability boundaries
PLCY-DRP-001Disaster Recovery PlanSingle-box AMI architecture, RDS Multi-AZ, recovery objectives (RTO/RPO), backup strategy
PLCY-RSK-001Risk Assessment PolicyRisk framework, tabletop exercise program, scenario library, continuous risk monitoring
PLCY-INF-001Infrastructure SizingEC2/RDS capacity sizing, WebSocket limits, cost estimation, scaling triggers
PLCY-ORG-001Organization & Domain PolicyMulti-tenant model, domain verification, self-registration, JWT claims

Infrastructure Architecture Documented

  • Single EC2 instance (r6g.xlarge, 32GB) behind Cloudflare Tunnel
  • No public ports exposed (all traffic via Cloudflare Tunnel)
  • Swift Vapor application runtime (compiled, memory-safe)
  • RDS PostgreSQL Multi-AZ (db.t3.small/medium, 2-4GB) with automatic failover
  • AMI-based deployment and recovery (not container/ECR)
  • Stateless JWT authentication with role-based access control
  • Multi-tenant organization-scoped data isolation with domain verification

Recovery Objectives Established

TierSystemsRTO
Tier 1 - CriticalAuthentication, Core API, Driver matching1 hour
Tier 2 - EssentialReporting, Notifications, Voice agent4 hours
Tier 3 - StandardAnalytics, Admin dashboards24 hours

Tabletop Exercise Schedule

Exercise TypeFrequency
Security incidentQuarterly
Infrastructure failureQuarterly
Data breachBi-annually
Business continuityAnnually

Approval & Sign-Off

RoleNameDateSignature
Safety Director
Operations Director
Legal Counsel
Final Approval

Document Control

VersionDateAuthorChanges
1.0December 22, 2025Hop And Haul TeamInitial findings register
1.1December 22, 2025Hop And Haul TeamAll findings remediated, status updated
1.2December 22, 2025Hop And Haul TeamAdded PLCY-DRP-001 Disaster Recovery Plan, PLCY-RSK-001 Risk Assessment Policy
1.3December 22, 2025Hop And Haul TeamUpdated to single-box AMI architecture, added PLCY-INF-001, PLCY-ORG-001
1.4December 22, 2025Hop And Haul TeamAdded PLCY-GOV-001 Governance & Assumptions

CONFIDENTIAL - Internal Use Only - Hop And Haul Policy Documentation